From 651d026f1bd093240876abb8e522911e5b62fd83 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 13 Apr 2025 02:04:23 +0000 Subject: [PATCH] Auto-Update: 2025-04-13T02:00:19.312868+00:00 --- CVE-2003/CVE-2003-200xx/CVE-2003-20001.json | 39 +- .../CVE-2016-10003xx/CVE-2016-1000338.json | 2 +- CVE-2017/CVE-2017-00xx/CVE-2017-0037.json | 4 +- CVE-2017/CVE-2017-01xx/CVE-2017-0146.json | 4 +- CVE-2017/CVE-2017-201xx/CVE-2017-20197.json | 4 + CVE-2017/CVE-2017-56xx/CVE-2017-5689.json | 2 +- CVE-2017/CVE-2017-85xx/CVE-2017-8543.json | 60 +- CVE-2018/CVE-2018-08xx/CVE-2018-0878.json | 34 +- CVE-2018/CVE-2018-208xx/CVE-2018-20839.json | 2 +- CVE-2018/CVE-2018-251xx/CVE-2018-25109.json | 6 +- CVE-2018/CVE-2018-43xx/CVE-2018-4301.json | 2 +- CVE-2018/CVE-2018-57xx/CVE-2018-5729.json | 2 +- CVE-2018/CVE-2018-57xx/CVE-2018-5730.json | 2 +- CVE-2018/CVE-2018-81xx/CVE-2018-8120.json | 32 +- CVE-2018/CVE-2018-84xx/CVE-2018-8406.json | 89 +- CVE-2018/CVE-2018-84xx/CVE-2018-8414.json | 59 +- CVE-2018/CVE-2018-85xx/CVE-2018-8581.json | 16 +- CVE-2019/CVE-2019-05xx/CVE-2019-0543.json | 91 +- CVE-2019/CVE-2019-08xx/CVE-2019-0803.json | 4 +- CVE-2019/CVE-2019-08xx/CVE-2019-0808.json | 4 +- CVE-2019/CVE-2019-13xx/CVE-2019-1322.json | 54 +- CVE-2019/CVE-2019-14xx/CVE-2019-1429.json | 2 +- CVE-2019/CVE-2019-161xx/CVE-2019-16149.json | 4 + CVE-2019/CVE-2019-161xx/CVE-2019-16151.json | 6 +- CVE-2019/CVE-2019-190xx/CVE-2019-19049.json | 2 +- CVE-2019/CVE-2019-190xx/CVE-2019-19064.json | 2 +- CVE-2019/CVE-2019-38xx/CVE-2019-3821.json | 2 +- CVE-2019/CVE-2019-89xx/CVE-2019-8900.json | 2 +- CVE-2019/CVE-2019-99xx/CVE-2019-9978.json | 2 +- CVE-2020/CVE-2020-07xx/CVE-2020-0796.json | 40 +- CVE-2020/CVE-2020-08xx/CVE-2020-0878.json | 2 +- CVE-2020/CVE-2020-10xx/CVE-2020-1054.json | 122 +- CVE-2020/CVE-2020-110xx/CVE-2020-11023.json | 560 ++- CVE-2020/CVE-2020-120xx/CVE-2020-12069.json | 2 +- CVE-2020/CVE-2020-14xx/CVE-2020-1464.json | 4 +- CVE-2020/CVE-2020-226xx/CVE-2020-22628.json | 2 +- CVE-2020/CVE-2020-226xx/CVE-2020-22653.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22654.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22655.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22656.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22657.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22659.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22660.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22661.json | 32 +- CVE-2020/CVE-2020-226xx/CVE-2020-22662.json | 36 +- CVE-2020/CVE-2020-232xx/CVE-2020-23256.json | 32 +- CVE-2020/CVE-2020-243xx/CVE-2020-24370.json | 2 +- CVE-2020/CVE-2020-255xx/CVE-2020-25502.json | 32 +- CVE-2020/CVE-2020-292xx/CVE-2020-29297.json | 32 +- CVE-2020/CVE-2020-357xx/CVE-2020-35730.json | 2 +- CVE-2020/CVE-2020-85xx/CVE-2020-8515.json | 2 +- CVE-2021/CVE-2021-201xx/CVE-2021-20193.json | 2 +- CVE-2021/CVE-2021-240xx/CVE-2021-24008.json | 4 + CVE-2021/CVE-2021-256xx/CVE-2021-25635.json | 6 +- CVE-2021/CVE-2021-270xx/CVE-2021-27065.json | 2 +- CVE-2021/CVE-2021-290xx/CVE-2021-29098.json | 2 +- CVE-2021/CVE-2021-292xx/CVE-2021-29256.json | 26 +- CVE-2021/CVE-2021-312xx/CVE-2021-31207.json | 2 +- CVE-2021/CVE-2021-374xx/CVE-2021-37497.json | 32 +- CVE-2021/CVE-2021-374xx/CVE-2021-37499.json | 32 +- CVE-2021/CVE-2021-381xx/CVE-2021-38118.json | 2 +- CVE-2021/CVE-2021-381xx/CVE-2021-38135.json | 2 +- CVE-2021/CVE-2021-381xx/CVE-2021-38160.json | 2 +- CVE-2021/CVE-2021-404xx/CVE-2021-40444.json | 4 +- CVE-2021/CVE-2021-44xx/CVE-2021-4454.json | 4 + CVE-2021/CVE-2021-450xx/CVE-2021-45046.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47165.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47169.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47186.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47188.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47196.json | 2 +- CVE-2021/CVE-2021-472xx/CVE-2021-47205.json | 2 +- CVE-2021/CVE-2021-472xx/CVE-2021-47219.json | 2 +- CVE-2021/CVE-2021-473xx/CVE-2021-47339.json | 2 +- CVE-2021/CVE-2021-473xx/CVE-2021-47346.json | 2 +- CVE-2021/CVE-2021-474xx/CVE-2021-47407.json | 2 +- CVE-2021/CVE-2021-474xx/CVE-2021-47436.json | 2 +- CVE-2021/CVE-2021-475xx/CVE-2021-47517.json | 2 +- CVE-2022/CVE-2022-12xx/CVE-2022-1271.json | 2 +- CVE-2022/CVE-2022-215xx/CVE-2022-21587.json | 2 +- CVE-2022/CVE-2022-227xx/CVE-2022-22706.json | 16 +- CVE-2022/CVE-2022-256xx/CVE-2022-25631.json | 32 +- CVE-2022/CVE-2022-263xx/CVE-2022-26324.json | 2 +- CVE-2022/CVE-2022-268xx/CVE-2022-26878.json | 2 +- CVE-2022/CVE-2022-26xx/CVE-2022-2658.json | 22 +- CVE-2022/CVE-2022-364xx/CVE-2022-36449.json | 22 +- CVE-2022/CVE-2022-403xx/CVE-2022-40319.json | 32 +- CVE-2022/CVE-2022-406xx/CVE-2022-40657.json | 2 +- CVE-2022/CVE-2022-406xx/CVE-2022-40663.json | 2 +- CVE-2022/CVE-2022-407xx/CVE-2022-40704.json | 24 +- CVE-2022/CVE-2022-428xx/CVE-2022-42826.json | 2 +- CVE-2022/CVE-2022-42xx/CVE-2022-4244.json | 2 +- CVE-2022/CVE-2022-42xx/CVE-2022-4299.json | 22 +- CVE-2022/CVE-2022-439xx/CVE-2022-43977.json | 32 +- CVE-2022/CVE-2022-44xx/CVE-2022-4431.json | 22 +- CVE-2022/CVE-2022-451xx/CVE-2022-45185.json | 2 +- CVE-2022/CVE-2022-451xx/CVE-2022-45186.json | 2 +- CVE-2022/CVE-2022-454xx/CVE-2022-45449.json | 2 +- CVE-2022/CVE-2022-468xx/CVE-2022-46889.json | 32 +- CVE-2022/CVE-2022-468xx/CVE-2022-46890.json | 32 +- CVE-2022/CVE-2022-46xx/CVE-2022-4645.json | 14 +- CVE-2022/CVE-2022-46xx/CVE-2022-4658.json | 22 +- CVE-2022/CVE-2022-471xx/CVE-2022-47105.json | 32 +- CVE-2022/CVE-2022-484xx/CVE-2022-48425.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48632.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48647.json | 2 +- CVE-2022/CVE-2022-487xx/CVE-2022-48701.json | 2 +- CVE-2022/CVE-2022-487xx/CVE-2022-48702.json | 2 +- CVE-2022/CVE-2022-487xx/CVE-2022-48703.json | 2 +- CVE-2022/CVE-2022-487xx/CVE-2022-48717.json | 2 +- CVE-2022/CVE-2022-488xx/CVE-2022-48805.json | 2 +- CVE-2022/CVE-2022-48xx/CVE-2022-4883.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49524.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49733.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49738.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49739.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49740.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49741.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49742.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49743.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49744.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49745.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49746.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49747.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49748.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49749.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49750.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49751.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49752.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49754.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49756.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49757.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49758.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49759.json | 4 + CVE-2022/CVE-2022-497xx/CVE-2022-49760.json | 4 + CVE-2023/CVE-2023-07xx/CVE-2023-0714.json | 2 +- CVE-2023/CVE-2023-07xx/CVE-2023-0788.json | 2 +- CVE-2023/CVE-2023-07xx/CVE-2023-0789.json | 2 +- CVE-2023/CVE-2023-07xx/CVE-2023-0791.json | 2 +- CVE-2023/CVE-2023-07xx/CVE-2023-0794.json | 2 +- CVE-2023/CVE-2023-08xx/CVE-2023-0881.json | 4 + CVE-2023/CVE-2023-09xx/CVE-2023-0921.json | 2 +- CVE-2023/CVE-2023-10xx/CVE-2023-1035.json | 2 +- CVE-2023/CVE-2023-14xx/CVE-2023-1401.json | 2 +- CVE-2023/CVE-2023-18xx/CVE-2023-1841.json | 2 +- CVE-2023/CVE-2023-223xx/CVE-2023-22331.json | 32 +- CVE-2023/CVE-2023-226xx/CVE-2023-22697.json | 2 +- CVE-2023/CVE-2023-235xx/CVE-2023-23574.json | 2 +- CVE-2023/CVE-2023-241xx/CVE-2023-24163.json | 2 +- CVE-2023/CVE-2023-241xx/CVE-2023-24164.json | 4 + CVE-2023/CVE-2023-244xx/CVE-2023-24468.json | 2 +- CVE-2023/CVE-2023-258xx/CVE-2023-25832.json | 2 +- CVE-2023/CVE-2023-258xx/CVE-2023-25833.json | 4 +- CVE-2023/CVE-2023-258xx/CVE-2023-25834.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2567.json | 2 +- CVE-2023/CVE-2023-260xx/CVE-2023-26083.json | 10 +- CVE-2023/CVE-2023-26xx/CVE-2023-2603.json | 2 +- CVE-2023/CVE-2023-286xx/CVE-2023-28656.json | 2 +- CVE-2023/CVE-2023-294xx/CVE-2023-29429.json | 2 +- CVE-2023/CVE-2023-321xx/CVE-2023-32110.json | 2 +- CVE-2023/CVE-2023-32xx/CVE-2023-3205.json | 2 +- CVE-2023/CVE-2023-32xx/CVE-2023-3210.json | 2 +- CVE-2023/CVE-2023-32xx/CVE-2023-3246.json | 2 +- CVE-2023/CVE-2023-333xx/CVE-2023-33302.json | 4 + CVE-2023/CVE-2023-338xx/CVE-2023-33844.json | 4 + CVE-2023/CVE-2023-34xx/CVE-2023-3444.json | 2 +- CVE-2023/CVE-2023-362xx/CVE-2023-36238.json | 2 +- CVE-2023/CVE-2023-364xx/CVE-2023-36479.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36505.json | 2 +- CVE-2023/CVE-2023-374xx/CVE-2023-37405.json | 4 + CVE-2023/CVE-2023-379xx/CVE-2023-37930.json | 4 + CVE-2023/CVE-2023-382xx/CVE-2023-38272.json | 4 + CVE-2023/CVE-2023-383xx/CVE-2023-38366.json | 2 +- CVE-2023/CVE-2023-383xx/CVE-2023-38388.json | 2 +- CVE-2023/CVE-2023-39xx/CVE-2023-3906.json | 2 +- CVE-2023/CVE-2023-39xx/CVE-2023-3907.json | 2 +- CVE-2023/CVE-2023-39xx/CVE-2023-3909.json | 2 +- CVE-2023/CVE-2023-39xx/CVE-2023-3920.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40275.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40276.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40277.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40278.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40279.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40280.json | 2 +- CVE-2023/CVE-2023-402xx/CVE-2023-40283.json | 2 +- CVE-2023/CVE-2023-404xx/CVE-2023-40492.json | 2 +- CVE-2023/CVE-2023-407xx/CVE-2023-40714.json | 4 + CVE-2023/CVE-2023-416xx/CVE-2023-41665.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41747.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42282.json | 2 +- CVE-2023/CVE-2023-430xx/CVE-2023-43029.json | 6 +- CVE-2023/CVE-2023-436xx/CVE-2023-43655.json | 2 +- CVE-2023/CVE-2023-438xx/CVE-2023-43892.json | 32 +- CVE-2023/CVE-2023-444xx/CVE-2023-44472.json | 2 +- CVE-2023/CVE-2023-455xx/CVE-2023-45503.json | 2 +- CVE-2023/CVE-2023-455xx/CVE-2023-45596.json | 2 +- CVE-2023/CVE-2023-455xx/CVE-2023-45599.json | 2 +- CVE-2023/CVE-2023-456xx/CVE-2023-45600.json | 2 +- CVE-2023/CVE-2023-458xx/CVE-2023-45802.json | 2 +- CVE-2023/CVE-2023-458xx/CVE-2023-45871.json | 2 +- CVE-2023/CVE-2023-458xx/CVE-2023-45898.json | 2 +- CVE-2023/CVE-2023-469xx/CVE-2023-46988.json | 39 +- CVE-2023/CVE-2023-46xx/CVE-2023-4647.json | 2 +- CVE-2023/CVE-2023-477xx/CVE-2023-47786.json | 6 +- CVE-2023/CVE-2023-478xx/CVE-2023-47846.json | 2 +- CVE-2023/CVE-2023-478xx/CVE-2023-47873.json | 2 +- CVE-2023/CVE-2023-483xx/CVE-2023-48319.json | 2 +- CVE-2023/CVE-2023-491xx/CVE-2023-49109.json | 2 +- CVE-2023/CVE-2023-492xx/CVE-2023-49250.json | 2 +- CVE-2023/CVE-2023-495xx/CVE-2023-49539.json | 2 +- CVE-2023/CVE-2023-495xx/CVE-2023-49540.json | 2 +- CVE-2023/CVE-2023-499xx/CVE-2023-49988.json | 2 +- CVE-2023/CVE-2023-499xx/CVE-2023-49989.json | 2 +- CVE-2023/CVE-2023-502xx/CVE-2023-50270.json | 2 +- CVE-2023/CVE-2023-503xx/CVE-2023-50312.json | 2 +- CVE-2023/CVE-2023-503xx/CVE-2023-50324.json | 2 +- CVE-2023/CVE-2023-512xx/CVE-2023-51297.json | 2 +- CVE-2023/CVE-2023-517xx/CVE-2023-51779.json | 2 +- CVE-2023/CVE-2023-521xx/CVE-2023-52160.json | 2 +- CVE-2023/CVE-2023-526xx/CVE-2023-52640.json | 2 +- CVE-2023/CVE-2023-526xx/CVE-2023-52675.json | 2 +- CVE-2023/CVE-2023-526xx/CVE-2023-52686.json | 2 +- CVE-2023/CVE-2023-526xx/CVE-2023-52690.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52745.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52794.json | 2 +- CVE-2023/CVE-2023-527xx/CVE-2023-52799.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52805.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52807.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52847.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52878.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52925.json | 2 +- CVE-2023/CVE-2023-529xx/CVE-2023-52928.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52929.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52930.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52932.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52933.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52934.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52936.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52937.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52938.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52939.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52940.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52941.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52942.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52976.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52977.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52978.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52979.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52980.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52981.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52982.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52984.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52985.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52986.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52987.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52988.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52989.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52991.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52992.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52993.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52994.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52995.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52996.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52997.json | 4 + CVE-2023/CVE-2023-529xx/CVE-2023-52998.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53000.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53001.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53002.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53004.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53005.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53006.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53007.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53008.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53009.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53010.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53011.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53012.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53013.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53014.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53015.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53016.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53017.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53018.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53019.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53020.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53022.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53024.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53026.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53028.json | 6 +- CVE-2023/CVE-2023-530xx/CVE-2023-53029.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53030.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53031.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53032.json | 4 + CVE-2023/CVE-2023-530xx/CVE-2023-53033.json | 4 + CVE-2023/CVE-2023-58xx/CVE-2023-5825.json | 2 +- CVE-2023/CVE-2023-59xx/CVE-2023-5993.json | 2 +- CVE-2023/CVE-2023-60xx/CVE-2023-6047.json | 2 +- CVE-2023/CVE-2023-61xx/CVE-2023-6175.json | 2 +- CVE-2023/CVE-2023-65xx/CVE-2023-6531.json | 2 +- CVE-2023/CVE-2023-67xx/CVE-2023-6731.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6955.json | 2 +- CVE-2023/CVE-2023-70xx/CVE-2023-7016.json | 2 +- CVE-2024/CVE-2024-00xx/CVE-2024-0068.json | 2 +- CVE-2024/CVE-2024-01xx/CVE-2024-0141.json | 2 +- CVE-2024/CVE-2024-01xx/CVE-2024-0197.json | 2 +- CVE-2024/CVE-2024-02xx/CVE-2024-0211.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0590.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0621.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0658.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0698.json | 2 +- CVE-2024/CVE-2024-07xx/CVE-2024-0702.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0819.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0821.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0978.json | 2 +- CVE-2024/CVE-2024-103xx/CVE-2024-10307.json | 4 + CVE-2024/CVE-2024-104xx/CVE-2024-10494.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10495.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10496.json | 2 +- CVE-2024/CVE-2024-105xx/CVE-2024-10558.json | 4 + CVE-2024/CVE-2024-107xx/CVE-2024-10706.json | 2 +- CVE-2024/CVE-2024-108xx/CVE-2024-10821.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1066.json | 2 +- CVE-2024/CVE-2024-110xx/CVE-2024-11088.json | 52 +- CVE-2024/CVE-2024-111xx/CVE-2024-11155.json | 2 +- CVE-2024/CVE-2024-111xx/CVE-2024-11158.json | 2 +- CVE-2024/CVE-2024-115xx/CVE-2024-11504.json | 4 + CVE-2024/CVE-2024-115xx/CVE-2024-11595.json | 2 +- CVE-2024/CVE-2024-115xx/CVE-2024-11596.json | 2 +- CVE-2024/CVE-2024-117xx/CVE-2024-11701.json | 43 +- CVE-2024/CVE-2024-117xx/CVE-2024-11702.json | 44 +- CVE-2024/CVE-2024-117xx/CVE-2024-11703.json | 33 +- CVE-2024/CVE-2024-119xx/CVE-2024-11916.json | 2 +- CVE-2024/CVE-2024-120xx/CVE-2024-12021.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12045.json | 2 +- CVE-2024/CVE-2024-121xx/CVE-2024-12189.json | 4 + CVE-2024/CVE-2024-122xx/CVE-2024-12238.json | 2 +- CVE-2024/CVE-2024-123xx/CVE-2024-12335.json | 2 +- CVE-2024/CVE-2024-123xx/CVE-2024-12368.json | 2 +- CVE-2024/CVE-2024-124xx/CVE-2024-12410.json | 4 + CVE-2024/CVE-2024-124xx/CVE-2024-12477.json | 2 +- CVE-2024/CVE-2024-126xx/CVE-2024-12619.json | 4 + CVE-2024/CVE-2024-129xx/CVE-2024-12905.json | 4 + CVE-2024/CVE-2024-129xx/CVE-2024-12935.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12936.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1277.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1282.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1288.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1294.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13124.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13347.json | 2 +- CVE-2024/CVE-2024-135xx/CVE-2024-13553.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13567.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13637.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13640.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13666.json | 6 +- CVE-2024/CVE-2024-137xx/CVE-2024-13768.json | 6 +- CVE-2024/CVE-2024-137xx/CVE-2024-13774.json | 2 +- CVE-2024/CVE-2024-138xx/CVE-2024-13856.json | 6 +- CVE-2024/CVE-2024-13xx/CVE-2024-1322.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1337.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1340.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1445.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1472.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1475.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1476.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1479.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1492.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1496.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1566.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1572.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1586.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1606.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1619.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1622.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1710.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1719.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1758.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1759.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1791.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1797.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1847.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1855.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1885.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1886.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1887.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1954.json | 2 +- CVE-2024/CVE-2024-203xx/CVE-2024-20374.json | 2 +- CVE-2024/CVE-2024-209xx/CVE-2024-20927.json | 2 +- CVE-2024/CVE-2024-209xx/CVE-2024-20941.json | 2 +- CVE-2024/CVE-2024-209xx/CVE-2024-20976.json | 2 +- CVE-2024/CVE-2024-209xx/CVE-2024-20978.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2005.json | 2 +- CVE-2024/CVE-2024-210xx/CVE-2024-21006.json | 2 +- CVE-2024/CVE-2024-210xx/CVE-2024-21026.json | 2 +- CVE-2024/CVE-2024-210xx/CVE-2024-21028.json | 2 +- CVE-2024/CVE-2024-210xx/CVE-2024-21055.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21113.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21116.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21136.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21142.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21143.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21163.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21164.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21175.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21185.json | 2 +- CVE-2024/CVE-2024-212xx/CVE-2024-21245.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21493.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21494.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21495.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21497.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21499.json | 2 +- CVE-2024/CVE-2024-215xx/CVE-2024-21591.json | 2 +- CVE-2024/CVE-2024-216xx/CVE-2024-21610.json | 2 +- CVE-2024/CVE-2024-216xx/CVE-2024-21683.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21752.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21803.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2101.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2102.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2112.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2125.json | 42 +- CVE-2024/CVE-2024-21xx/CVE-2024-2129.json | 2 +- CVE-2024/CVE-2024-222xx/CVE-2024-22298.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2258.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2280.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2289.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2296.json | 2 +- CVE-2024/CVE-2024-231xx/CVE-2024-23139.json | 2 +- CVE-2024/CVE-2024-235xx/CVE-2024-23520.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23608.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23609.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23610.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23611.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23612.json | 2 +- CVE-2024/CVE-2024-242xx/CVE-2024-24292.json | 2 +- CVE-2024/CVE-2024-244xx/CVE-2024-24476.json | 2 +- CVE-2024/CVE-2024-244xx/CVE-2024-24478.json | 2 +- CVE-2024/CVE-2024-244xx/CVE-2024-24479.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24762.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24835.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2403.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2429.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2439.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25081.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25082.json | 2 +- CVE-2024/CVE-2024-252xx/CVE-2024-25251.json | 2 +- CVE-2024/CVE-2024-253xx/CVE-2024-25344.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25698.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25707.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25711.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25763.json | 2 +- CVE-2024/CVE-2024-259xx/CVE-2024-25905.json | 2 +- CVE-2024/CVE-2024-259xx/CVE-2024-25920.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2513.json | 2 +- CVE-2024/CVE-2024-260xx/CVE-2024-26013.json | 4 + CVE-2024/CVE-2024-261xx/CVE-2024-26152.json | 2 +- CVE-2024/CVE-2024-264xx/CVE-2024-26465.json | 2 +- CVE-2024/CVE-2024-264xx/CVE-2024-26466.json | 2 +- CVE-2024/CVE-2024-264xx/CVE-2024-26467.json | 2 +- CVE-2024/CVE-2024-264xx/CVE-2024-26468.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26632.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26660.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26665.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26691.json | 2 +- CVE-2024/CVE-2024-266xx/CVE-2024-26699.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26703.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26711.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26724.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26753.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26760.json | 2 +- CVE-2024/CVE-2024-267xx/CVE-2024-26790.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26802.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26842.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26850.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26856.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26858.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26859.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26862.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26867.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26872.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26874.json | 2 +- CVE-2024/CVE-2024-268xx/CVE-2024-26876.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26931.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26943.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26954.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26971.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26973.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26982.json | 2 +- CVE-2024/CVE-2024-269xx/CVE-2024-26999.json | 2 +- CVE-2024/CVE-2024-26xx/CVE-2024-2603.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27008.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27026.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27061.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27079.json | 2 +- CVE-2024/CVE-2024-271xx/CVE-2024-27136.json | 2 +- CVE-2024/CVE-2024-279xx/CVE-2024-27952.json | 2 +- CVE-2024/CVE-2024-279xx/CVE-2024-27953.json | 2 +- CVE-2024/CVE-2024-279xx/CVE-2024-27996.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2732.json | 2 +- CVE-2024/CVE-2024-280xx/CVE-2024-28022.json | 2 +- CVE-2024/CVE-2024-281xx/CVE-2024-28199.json | 2 +- CVE-2024/CVE-2024-287xx/CVE-2024-28746.json | 2 +- CVE-2024/CVE-2024-288xx/CVE-2024-28870.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2837.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2879.json | 10 +- CVE-2024/CVE-2024-28xx/CVE-2024-2888.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29117.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29171.json | 2 +- CVE-2024/CVE-2024-293xx/CVE-2024-29392.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29915.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29928.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2963.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2964.json | 2 +- CVE-2024/CVE-2024-304xx/CVE-2024-30454.json | 2 +- CVE-2024/CVE-2024-305xx/CVE-2024-30549.json | 2 +- CVE-2024/CVE-2024-308xx/CVE-2024-30840.json | 2 +- CVE-2024/CVE-2024-312xx/CVE-2024-31296.json | 2 +- CVE-2024/CVE-2024-315xx/CVE-2024-31545.json | 2 +- CVE-2024/CVE-2024-315xx/CVE-2024-31546.json | 2 +- CVE-2024/CVE-2024-315xx/CVE-2024-31547.json | 2 +- CVE-2024/CVE-2024-315xx/CVE-2024-31551.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32122.json | 4 + CVE-2024/CVE-2024-321xx/CVE-2024-32139.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32143.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32162.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32163.json | 2 +- CVE-2024/CVE-2024-322xx/CVE-2024-32236.json | 2 +- CVE-2024/CVE-2024-323xx/CVE-2024-32392.json | 2 +- CVE-2024/CVE-2024-325xx/CVE-2024-32505.json | 2 +- CVE-2024/CVE-2024-326xx/CVE-2024-32602.json | 2 +- CVE-2024/CVE-2024-326xx/CVE-2024-32680.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32812.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3217.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3218.json | 2 +- CVE-2024/CVE-2024-330xx/CVE-2024-33058.json | 4 + CVE-2024/CVE-2024-332xx/CVE-2024-33218.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33219.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33220.json | 2 +- CVE-2024/CVE-2024-334xx/CVE-2024-33423.json | 2 +- CVE-2024/CVE-2024-334xx/CVE-2024-33424.json | 2 +- CVE-2024/CVE-2024-334xx/CVE-2024-33489.json | 2 +- CVE-2024/CVE-2024-336xx/CVE-2024-33606.json | 2 +- CVE-2024/CVE-2024-336xx/CVE-2024-33619.json | 2 +- CVE-2024/CVE-2024-339xx/CVE-2024-33928.json | 2 +- CVE-2024/CVE-2024-342xx/CVE-2024-34224.json | 2 +- CVE-2024/CVE-2024-342xx/CVE-2024-34225.json | 2 +- CVE-2024/CVE-2024-343xx/CVE-2024-34315.json | 2 +- CVE-2024/CVE-2024-344xx/CVE-2024-34434.json | 2 +- CVE-2024/CVE-2024-344xx/CVE-2024-34448.json | 2 +- CVE-2024/CVE-2024-345xx/CVE-2024-34553.json | 2 +- CVE-2024/CVE-2024-345xx/CVE-2024-34558.json | 2 +- CVE-2024/CVE-2024-347xx/CVE-2024-34771.json | 2 +- CVE-2024/CVE-2024-347xx/CVE-2024-34799.json | 2 +- CVE-2024/CVE-2024-348xx/CVE-2024-34811.json | 2 +- CVE-2024/CVE-2024-353xx/CVE-2024-35362.json | 2 +- CVE-2024/CVE-2024-354xx/CVE-2024-35498.json | 2 +- CVE-2024/CVE-2024-357xx/CVE-2024-35788.json | 2 +- CVE-2024/CVE-2024-357xx/CVE-2024-35790.json | 2 +- CVE-2024/CVE-2024-357xx/CVE-2024-35792.json | 2 +- CVE-2024/CVE-2024-358xx/CVE-2024-35882.json | 2 +- CVE-2024/CVE-2024-359xx/CVE-2024-35920.json | 2 +- CVE-2024/CVE-2024-359xx/CVE-2024-35937.json | 2 +- CVE-2024/CVE-2024-359xx/CVE-2024-35954.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36259.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36265.json | 2 +- CVE-2024/CVE-2024-363xx/CVE-2024-36390.json | 4 +- CVE-2024/CVE-2024-364xx/CVE-2024-36465.json | 4 + CVE-2024/CVE-2024-364xx/CVE-2024-36469.json | 4 + CVE-2024/CVE-2024-367xx/CVE-2024-36761.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36907.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36921.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36923.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36985.json | 2 +- CVE-2024/CVE-2024-370xx/CVE-2024-37071.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37159.json | 2 +- CVE-2024/CVE-2024-375xx/CVE-2024-37547.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3782.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3796.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38379.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38477.json | 2 +- CVE-2024/CVE-2024-385xx/CVE-2024-38556.json | 2 +- CVE-2024/CVE-2024-386xx/CVE-2024-38606.json | 2 +- CVE-2024/CVE-2024-387xx/CVE-2024-38769.json | 2 +- CVE-2024/CVE-2024-387xx/CVE-2024-38783.json | 2 +- CVE-2024/CVE-2024-389xx/CVE-2024-38985.json | 2 +- CVE-2024/CVE-2024-389xx/CVE-2024-38988.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3827.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3893.json | 2 +- CVE-2024/CVE-2024-390xx/CVE-2024-39090.json | 33 +- CVE-2024/CVE-2024-393xx/CVE-2024-39311.json | 6 +- CVE-2024/CVE-2024-395xx/CVE-2024-39507.json | 2 +- CVE-2024/CVE-2024-397xx/CVE-2024-39780.json | 4 + CVE-2024/CVE-2024-398xx/CVE-2024-39864.json | 2 +- CVE-2024/CVE-2024-398xx/CVE-2024-39897.json | 2 +- CVE-2024/CVE-2024-404xx/CVE-2024-40443.json | 2 +- CVE-2024/CVE-2024-409xx/CVE-2024-40901.json | 2 +- CVE-2024/CVE-2024-409xx/CVE-2024-40926.json | 2 +- CVE-2024/CVE-2024-409xx/CVE-2024-40931.json | 2 +- CVE-2024/CVE-2024-409xx/CVE-2024-40984.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4061.json | 2 +- CVE-2024/CVE-2024-410xx/CVE-2024-41014.json | 2 +- CVE-2024/CVE-2024-410xx/CVE-2024-41023.json | 2 +- CVE-2024/CVE-2024-410xx/CVE-2024-41028.json | 2 +- CVE-2024/CVE-2024-411xx/CVE-2024-41107.json | 2 +- CVE-2024/CVE-2024-417xx/CVE-2024-41765.json | 2 +- CVE-2024/CVE-2024-417xx/CVE-2024-41788.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41937.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42195.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42196.json | 2 +- CVE-2024/CVE-2024-422xx/CVE-2024-42264.json | 2 +- CVE-2024/CVE-2024-423xx/CVE-2024-42325.json | 4 + CVE-2024/CVE-2024-424xx/CVE-2024-42447.json | 2 +- CVE-2024/CVE-2024-430xx/CVE-2024-43046.json | 4 + CVE-2024/CVE-2024-430xx/CVE-2024-43058.json | 4 + CVE-2024/CVE-2024-430xx/CVE-2024-43065.json | 4 + CVE-2024/CVE-2024-430xx/CVE-2024-43066.json | 4 + CVE-2024/CVE-2024-430xx/CVE-2024-43067.json | 4 + CVE-2024/CVE-2024-432xx/CVE-2024-43202.json | 2 +- CVE-2024/CVE-2024-433xx/CVE-2024-43328.json | 57 +- CVE-2024/CVE-2024-433xx/CVE-2024-43331.json | 2 +- CVE-2024/CVE-2024-439xx/CVE-2024-43984.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4442.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4443.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4455.json | 84 +- CVE-2024/CVE-2024-450xx/CVE-2024-45064.json | 4 + CVE-2024/CVE-2024-454xx/CVE-2024-45417.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45418.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45421.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45424.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45425.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45426.json | 2 +- CVE-2024/CVE-2024-455xx/CVE-2024-45540.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45543.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45544.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45549.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45551.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45552.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45556.json | 4 + CVE-2024/CVE-2024-455xx/CVE-2024-45557.json | 4 + CVE-2024/CVE-2024-456xx/CVE-2024-45699.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45700.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45799.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4567.json | 2 +- CVE-2024/CVE-2024-466xx/CVE-2024-46671.json | 4 + CVE-2024/CVE-2024-467xx/CVE-2024-46772.json | 12 +- CVE-2024/CVE-2024-471xx/CVE-2024-47107.json | 2 +- CVE-2024/CVE-2024-472xx/CVE-2024-47213.json | 2 +- CVE-2024/CVE-2024-472xx/CVE-2024-47215.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47827.json | 2 +- CVE-2024/CVE-2024-486xx/CVE-2024-48615.json | 2 +- CVE-2024/CVE-2024-488xx/CVE-2024-48887.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4854.json | 2 +- CVE-2024/CVE-2024-48xx/CVE-2024-4862.json | 2 +- CVE-2024/CVE-2024-493xx/CVE-2024-49362.json | 2 +- CVE-2024/CVE-2024-495xx/CVE-2024-49563.json | 4 + CVE-2024/CVE-2024-495xx/CVE-2024-49564.json | 4 + CVE-2024/CVE-2024-495xx/CVE-2024-49565.json | 4 + CVE-2024/CVE-2024-496xx/CVE-2024-49601.json | 4 + CVE-2024/CVE-2024-496xx/CVE-2024-49697.json | 2 +- CVE-2024/CVE-2024-498xx/CVE-2024-49848.json | 4 + CVE-2024/CVE-2024-500xx/CVE-2024-50056.json | 12 +- CVE-2024/CVE-2024-501xx/CVE-2024-50137.json | 8 +- CVE-2024/CVE-2024-503xx/CVE-2024-50384.json | 4 + CVE-2024/CVE-2024-503xx/CVE-2024-50385.json | 4 + CVE-2024/CVE-2024-504xx/CVE-2024-50426.json | 2 +- CVE-2024/CVE-2024-505xx/CVE-2024-50565.json | 4 + CVE-2024/CVE-2024-505xx/CVE-2024-50594.json | 4 + CVE-2024/CVE-2024-505xx/CVE-2024-50595.json | 4 + CVE-2024/CVE-2024-505xx/CVE-2024-50596.json | 4 + CVE-2024/CVE-2024-505xx/CVE-2024-50597.json | 4 + CVE-2024/CVE-2024-509xx/CVE-2024-50991.json | 27 +- CVE-2024/CVE-2024-50xx/CVE-2024-5086.json | 2 +- CVE-2024/CVE-2024-516xx/CVE-2024-51624.json | 4 + CVE-2024/CVE-2024-519xx/CVE-2024-51962.json | 2 +- CVE-2024/CVE-2024-519xx/CVE-2024-51993.json | 27 +- CVE-2024/CVE-2024-519xx/CVE-2024-51994.json | 64 +- CVE-2024/CVE-2024-51xx/CVE-2024-5142.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52053.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52054.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52055.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52056.json | 2 +- CVE-2024/CVE-2024-526xx/CVE-2024-52676.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52912.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52913.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52914.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52915.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52916.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52917.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52919.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52920.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52921.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52922.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52941.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52942.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52943.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52944.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52945.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52962.json | 4 + CVE-2024/CVE-2024-529xx/CVE-2024-52974.json | 4 + CVE-2024/CVE-2024-529xx/CVE-2024-52980.json | 4 + CVE-2024/CVE-2024-529xx/CVE-2024-52981.json | 4 + CVE-2024/CVE-2024-52xx/CVE-2024-5226.json | 2 +- CVE-2024/CVE-2024-52xx/CVE-2024-5276.json | 116 +- CVE-2024/CVE-2024-531xx/CVE-2024-53163.json | 2 +- CVE-2024/CVE-2024-532xx/CVE-2024-53244.json | 2 +- CVE-2024/CVE-2024-532xx/CVE-2024-53245.json | 2 +- CVE-2024/CVE-2024-532xx/CVE-2024-53268.json | 2 +- CVE-2024/CVE-2024-534xx/CVE-2024-53481.json | 2 +- CVE-2024/CVE-2024-535xx/CVE-2024-53504.json | 2 +- CVE-2024/CVE-2024-535xx/CVE-2024-53505.json | 2 +- CVE-2024/CVE-2024-535xx/CVE-2024-53506.json | 2 +- CVE-2024/CVE-2024-535xx/CVE-2024-53507.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53961.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53967.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53968.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53969.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53970.json | 2 +- CVE-2024/CVE-2024-540xx/CVE-2024-54024.json | 4 + CVE-2024/CVE-2024-540xx/CVE-2024-54025.json | 4 + CVE-2024/CVE-2024-542xx/CVE-2024-54291.json | 4 + CVE-2024/CVE-2024-543xx/CVE-2024-54357.json | 2 +- CVE-2024/CVE-2024-543xx/CVE-2024-54362.json | 4 + CVE-2024/CVE-2024-544xx/CVE-2024-54468.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54537.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54818.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54918.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54921.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54923.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54924.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54925.json | 2 +- CVE-2024/CVE-2024-54xx/CVE-2024-5427.json | 2 +- CVE-2024/CVE-2024-550xx/CVE-2024-55072.json | 6 +- CVE-2024/CVE-2024-550xx/CVE-2024-55085.json | 2 +- CVE-2024/CVE-2024-550xx/CVE-2024-55093.json | 4 + CVE-2024/CVE-2024-555xx/CVE-2024-55505.json | 39 +- CVE-2024/CVE-2024-556xx/CVE-2024-55602.json | 2 +- CVE-2024/CVE-2024-556xx/CVE-2024-55630.json | 2 +- CVE-2024/CVE-2024-556xx/CVE-2024-55653.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5520.json | 2 +- CVE-2024/CVE-2024-563xx/CVE-2024-56325.json | 4 + CVE-2024/CVE-2024-563xx/CVE-2024-56365.json | 2 +- CVE-2024/CVE-2024-563xx/CVE-2024-56366.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56408.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56409.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56410.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56469.json | 4 + CVE-2024/CVE-2024-565xx/CVE-2024-56528.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56548.json | 2 +- CVE-2024/CVE-2024-565xx/CVE-2024-56555.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56620.json | 8 +- CVE-2024/CVE-2024-566xx/CVE-2024-56695.json | 2 +- CVE-2024/CVE-2024-567xx/CVE-2024-56703.json | 2 +- CVE-2024/CVE-2024-568xx/CVE-2024-56889.json | 2 +- CVE-2024/CVE-2024-569xx/CVE-2024-56975.json | 2 +- CVE-2024/CVE-2024-56xx/CVE-2024-5659.json | 2 +- CVE-2024/CVE-2024-56xx/CVE-2024-5668.json | 2 +- CVE-2024/CVE-2024-56xx/CVE-2024-5685.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57083.json | 2 +- CVE-2024/CVE-2024-575xx/CVE-2024-57546.json | 2 +- CVE-2024/CVE-2024-577xx/CVE-2024-57757.json | 2 +- CVE-2024/CVE-2024-577xx/CVE-2024-57760.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57834.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57850.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57901.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57902.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57913.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57922.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57925.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57939.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57943.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57946.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57982.json | 12 +- CVE-2024/CVE-2024-579xx/CVE-2024-57983.json | 8 +- CVE-2024/CVE-2024-579xx/CVE-2024-57987.json | 12 +- CVE-2024/CVE-2024-579xx/CVE-2024-57989.json | 12 +- CVE-2024/CVE-2024-579xx/CVE-2024-57990.json | 12 +- CVE-2024/CVE-2024-579xx/CVE-2024-57991.json | 12 +- CVE-2024/CVE-2024-579xx/CVE-2024-57995.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5708.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58002.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58005.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58010.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58011.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58012.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58017.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58020.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58021.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58022.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58042.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58043.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58044.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58045.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58046.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58047.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58048.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58049.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58050.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58060.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58090.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58091.json | 4 + CVE-2024/CVE-2024-62xx/CVE-2024-6254.json | 2 +- CVE-2024/CVE-2024-63xx/CVE-2024-6316.json | 2 +- CVE-2024/CVE-2024-63xx/CVE-2024-6317.json | 2 +- CVE-2024/CVE-2024-63xx/CVE-2024-6346.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6416.json | 89 +- CVE-2024/CVE-2024-64xx/CVE-2024-6470.json | 77 +- CVE-2024/CVE-2024-64xx/CVE-2024-6497.json | 98 +- CVE-2024/CVE-2024-65xx/CVE-2024-6522.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6638.json | 2 +- CVE-2024/CVE-2024-67xx/CVE-2024-6709.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6869.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6872.json | 2 +- CVE-2024/CVE-2024-69xx/CVE-2024-6987.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7302.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7355.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7407.json | 4 + CVE-2024/CVE-2024-74xx/CVE-2024-7412.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7492.json | 2 +- CVE-2024/CVE-2024-79xx/CVE-2024-7986.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8488.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9174.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0108.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0115.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0297.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0349.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0415.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0416.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0417.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0418.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0471.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0472.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0473.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0532.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0535.json | 2 +- CVE-2025/CVE-2025-06xx/CVE-2025-0676.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0807.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0838.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0881.json | 2 +- CVE-2025/CVE-2025-09xx/CVE-2025-0986.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1095.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1217.json | 2 +- CVE-2025/CVE-2025-12xx/CVE-2025-1219.json | 2 +- CVE-2025/CVE-2025-12xx/CVE-2025-1267.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1295.json | 2 +- CVE-2025/CVE-2025-13xx/CVE-2025-1311.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1354.json | 119 - CVE-2025/CVE-2025-13xx/CVE-2025-1390.json | 2 +- CVE-2025/CVE-2025-14xx/CVE-2025-1449.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1470.json | 2 +- CVE-2025/CVE-2025-14xx/CVE-2025-1471.json | 2 +- CVE-2025/CVE-2025-15xx/CVE-2025-1512.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1658.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1659.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1660.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1673.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1674.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1675.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1705.json | 4 + CVE-2025/CVE-2025-17xx/CVE-2025-1762.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1781.json | 4 + CVE-2025/CVE-2025-18xx/CVE-2025-1889.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1968.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1970.json | 6 +- CVE-2025/CVE-2025-19xx/CVE-2025-1971.json | 6 +- CVE-2025/CVE-2025-19xx/CVE-2025-1972.json | 6 +- CVE-2025/CVE-2025-19xx/CVE-2025-1973.json | 6 +- CVE-2025/CVE-2025-19xx/CVE-2025-1986.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1997.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1998.json | 4 + CVE-2025/CVE-2025-202xx/CVE-2025-20227.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20661.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20662.json | 2 +- CVE-2025/CVE-2025-20xx/CVE-2025-2005.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2007.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2008.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2027.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2048.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2071.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2072.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2074.json | 4 + CVE-2025/CVE-2025-211xx/CVE-2025-21169.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21170.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21174.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21176.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21191.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21197.json | 4 +- CVE-2025/CVE-2025-212xx/CVE-2025-21204.json | 4 +- CVE-2025/CVE-2025-212xx/CVE-2025-21205.json | 4 +- CVE-2025/CVE-2025-212xx/CVE-2025-21221.json | 4 +- CVE-2025/CVE-2025-212xx/CVE-2025-21222.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21384.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21421.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21423.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21425.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21428.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21429.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21430.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21431.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21434.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21435.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21436.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21437.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21438.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21439.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21440.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21441.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21442.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21443.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21447.json | 4 + CVE-2025/CVE-2025-214xx/CVE-2025-21448.json | 4 + CVE-2025/CVE-2025-215xx/CVE-2025-21507.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21508.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21509.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21510.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21511.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21512.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21513.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21514.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21515.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21517.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21524.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21527.json | 2 +- CVE-2025/CVE-2025-215xx/CVE-2025-21538.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21613.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21614.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21635.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21636.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21637.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21639.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21641.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21642.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21650.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21661.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21735.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21736.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21737.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21741.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21742.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21743.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21744.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21745.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21748.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21749.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21769.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21770.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21773.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21774.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21775.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21776.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21780.json | 22 +- CVE-2025/CVE-2025-217xx/CVE-2025-21782.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21783.json | 18 +- CVE-2025/CVE-2025-217xx/CVE-2025-21785.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21787.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21788.json | 14 +- CVE-2025/CVE-2025-217xx/CVE-2025-21789.json | 18 +- CVE-2025/CVE-2025-217xx/CVE-2025-21790.json | 22 +- CVE-2025/CVE-2025-217xx/CVE-2025-21792.json | 22 +- CVE-2025/CVE-2025-217xx/CVE-2025-21793.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21794.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21798.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21809.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21814.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21820.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21824.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21868.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21869.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21870.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21871.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21872.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21873.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21874.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21875.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21876.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21877.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21878.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21880.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21881.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21882.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21883.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21884.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21885.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21886.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21888.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21889.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21890.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21891.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21892.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21894.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21895.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21896.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21897.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21898.json | 6 +- CVE-2025/CVE-2025-218xx/CVE-2025-21899.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21900.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21901.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21902.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21903.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21904.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21905.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21906.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21907.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21908.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21909.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21910.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21911.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21912.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21913.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21914.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21915.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21916.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21921.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21924.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21925.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21926.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21931.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21932.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21935.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21938.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21939.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21942.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21944.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21946.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21950.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21952.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21954.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21955.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21958.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21959.json | 2 +- CVE-2025/CVE-2025-219xx/CVE-2025-21960.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21961.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21962.json | 2 +- CVE-2025/CVE-2025-219xx/CVE-2025-21963.json | 2 +- CVE-2025/CVE-2025-219xx/CVE-2025-21964.json | 2 +- CVE-2025/CVE-2025-219xx/CVE-2025-21965.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21966.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21967.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21968.json | 2 +- CVE-2025/CVE-2025-219xx/CVE-2025-21969.json | 6 +- CVE-2025/CVE-2025-219xx/CVE-2025-21972.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21973.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21974.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21976.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21977.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21978.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21983.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21985.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21986.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21987.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21988.json | 4 + CVE-2025/CVE-2025-219xx/CVE-2025-21995.json | 2 +- CVE-2025/CVE-2025-21xx/CVE-2025-2124.json | 2 +- CVE-2025/CVE-2025-21xx/CVE-2025-2186.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22224.json | 2 +- CVE-2025/CVE-2025-222xx/CVE-2025-22231.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22277.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22278.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22356.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22360.json | 4 + CVE-2025/CVE-2025-223xx/CVE-2025-22398.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22458.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22459.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22461.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22464.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22465.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22466.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22496.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22497.json | 4 + CVE-2025/CVE-2025-225xx/CVE-2025-22501.json | 4 + CVE-2025/CVE-2025-225xx/CVE-2025-22523.json | 4 + CVE-2025/CVE-2025-225xx/CVE-2025-22526.json | 4 + CVE-2025/CVE-2025-225xx/CVE-2025-22566.json | 4 + CVE-2025/CVE-2025-225xx/CVE-2025-22575.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22628.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22629.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22634.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22637.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22638.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22640.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22644.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22646.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22647.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22648.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22652.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22658.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22659.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22660.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22664.json | 2 +- CVE-2025/CVE-2025-226xx/CVE-2025-22665.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22667.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22668.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22669.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22670.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22671.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22672.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22673.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22693.json | 2 +- CVE-2025/CVE-2025-227xx/CVE-2025-22739.json | 4 + CVE-2025/CVE-2025-227xx/CVE-2025-22740.json | 4 + CVE-2025/CVE-2025-227xx/CVE-2025-22767.json | 4 + CVE-2025/CVE-2025-227xx/CVE-2025-22770.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22816.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22855.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22868.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22937.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22938.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22939.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22940.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22941.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22953.json | 2 +- CVE-2025/CVE-2025-22xx/CVE-2025-2205.json | 2 +- CVE-2025/CVE-2025-22xx/CVE-2025-2222.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2223.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2237.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2251.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2285.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2286.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2287.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2288.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2292.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2293.json | 4 + CVE-2025/CVE-2025-22xx/CVE-2025-2294.json | 4 + CVE-2025/CVE-2025-230xx/CVE-2025-23044.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23053.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23054.json | 2 +- CVE-2025/CVE-2025-232xx/CVE-2025-23215.json | 16 +- CVE-2025/CVE-2025-233xx/CVE-2025-23383.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23421.json | 2 +- CVE-2025/CVE-2025-239xx/CVE-2025-23995.json | 4 + CVE-2025/CVE-2025-23xx/CVE-2025-2303.json | 6 +- CVE-2025/CVE-2025-23xx/CVE-2025-2328.json | 4 + CVE-2025/CVE-2025-23xx/CVE-2025-2331.json | 6 +- CVE-2025/CVE-2025-23xx/CVE-2025-2356.json | 2 +- CVE-2025/CVE-2025-240xx/CVE-2025-24028.json | 2 +- CVE-2025/CVE-2025-240xx/CVE-2025-24073.json | 4 +- CVE-2025/CVE-2025-241xx/CVE-2025-24106.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24123.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24124.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24130.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24163.json | 2 +- CVE-2025/CVE-2025-243xx/CVE-2025-24367.json | 2 +- CVE-2025/CVE-2025-243xx/CVE-2025-24368.json | 2 +- CVE-2025/CVE-2025-243xx/CVE-2025-24377.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24378.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24379.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24380.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24381.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24382.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24383.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24385.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24386.json | 4 + CVE-2025/CVE-2025-244xx/CVE-2025-24406.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24407.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24431.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24434.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24446.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24447.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24448.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24449.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24450.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24451.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24452.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24453.json | 2 +- CVE-2025/CVE-2025-244xx/CVE-2025-24494.json | 2 +- CVE-2025/CVE-2025-248xx/CVE-2025-24836.json | 2 +- CVE-2025/CVE-2025-249xx/CVE-2025-24915.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2440.json | 4 + CVE-2025/CVE-2025-24xx/CVE-2025-2441.json | 4 + CVE-2025/CVE-2025-24xx/CVE-2025-2442.json | 4 + CVE-2025/CVE-2025-24xx/CVE-2025-2477.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2478.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2479.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2482.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2483.json | 4 + CVE-2025/CVE-2025-24xx/CVE-2025-2484.json | 6 +- CVE-2025/CVE-2025-24xx/CVE-2025-2485.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25000.json | 4 +- CVE-2025/CVE-2025-250xx/CVE-2025-25023.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25035.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25036.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25060.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25067.json | 2 +- CVE-2025/CVE-2025-250xx/CVE-2025-25086.json | 4 + CVE-2025/CVE-2025-251xx/CVE-2025-25100.json | 4 + CVE-2025/CVE-2025-251xx/CVE-2025-25192.json | 4 +- CVE-2025/CVE-2025-252xx/CVE-2025-25227.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25254.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25908.json | 2 +- CVE-2025/CVE-2025-259xx/CVE-2025-25925.json | 2 +- CVE-2025/CVE-2025-259xx/CVE-2025-25949.json | 2 +- CVE-2025/CVE-2025-25xx/CVE-2025-2513.json | 4 + CVE-2025/CVE-2025-25xx/CVE-2025-2516.json | 4 + CVE-2025/CVE-2025-25xx/CVE-2025-2555.json | 2 +- CVE-2025/CVE-2025-25xx/CVE-2025-2565.json | 2 +- CVE-2025/CVE-2025-25xx/CVE-2025-2568.json | 4 + CVE-2025/CVE-2025-25xx/CVE-2025-2577.json | 6 +- CVE-2025/CVE-2025-25xx/CVE-2025-2578.json | 4 + CVE-2025/CVE-2025-25xx/CVE-2025-2584.json | 2 +- CVE-2025/CVE-2025-25xx/CVE-2025-2586.json | 4 + CVE-2025/CVE-2025-25xx/CVE-2025-2591.json | 6 +- CVE-2025/CVE-2025-25xx/CVE-2025-2592.json | 6 +- CVE-2025/CVE-2025-25xx/CVE-2025-2598.json | 6 +- CVE-2025/CVE-2025-260xx/CVE-2025-26054.json | 4 + CVE-2025/CVE-2025-260xx/CVE-2025-26055.json | 4 + CVE-2025/CVE-2025-260xx/CVE-2025-26056.json | 4 + CVE-2025/CVE-2025-263xx/CVE-2025-26367.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26369.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26371.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26376.json | 2 +- CVE-2025/CVE-2025-264xx/CVE-2025-26465.json | 2 +- CVE-2025/CVE-2025-265xx/CVE-2025-26500.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26520.json | 2 +- CVE-2025/CVE-2025-265xx/CVE-2025-26595.json | 2 +- CVE-2025/CVE-2025-266xx/CVE-2025-26637.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26641.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26648.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26663.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26665.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26668.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26669.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26670.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26672.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26673.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26679.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26682.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26683.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26686.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26687.json | 4 +- CVE-2025/CVE-2025-266xx/CVE-2025-26688.json | 4 +- CVE-2025/CVE-2025-267xx/CVE-2025-26731.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26732.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26733.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26734.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26736.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26737.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26738.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26762.json | 4 + CVE-2025/CVE-2025-268xx/CVE-2025-26803.json | 2 +- CVE-2025/CVE-2025-268xx/CVE-2025-26817.json | 2 +- CVE-2025/CVE-2025-268xx/CVE-2025-26898.json | 4 + CVE-2025/CVE-2025-269xx/CVE-2025-26909.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2601.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2602.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2608.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2616.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2617.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2629.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2630.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2651.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2653.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2655.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2656.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2657.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2658.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2659.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2660.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2661.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2662.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2663.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2664.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2665.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2671.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2675.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2676.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2677.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2678.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2679.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2680.json | 2 +- CVE-2025/CVE-2025-26xx/CVE-2025-2682.json | 9 +- CVE-2025/CVE-2025-26xx/CVE-2025-2684.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2686.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2688.json | 6 +- CVE-2025/CVE-2025-26xx/CVE-2025-2689.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2690.json | 4 + CVE-2025/CVE-2025-26xx/CVE-2025-2699.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27001.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27078.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27079.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27082.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27095.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27113.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27130.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27135.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27149.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27158.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27159.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27160.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27161.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27162.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27163.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27164.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27166.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27169.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27171.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27172.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27173.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27174.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27175.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27176.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27177.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27178.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27179.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27180.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27181.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27182.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27183.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27184.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27185.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27186.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27187.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27193.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27194.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27195.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27196.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27198.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27199.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27200.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27201.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27202.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27204.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27205.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27219.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27220.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27221.json | 4 +- CVE-2025/CVE-2025-272xx/CVE-2025-27244.json | 4 + CVE-2025/CVE-2025-273xx/CVE-2025-27391.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27410.json | 2 +- CVE-2025/CVE-2025-274xx/CVE-2025-27413.json | 2 +- CVE-2025/CVE-2025-274xx/CVE-2025-27441.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27442.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27443.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27469.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27471.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27472.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27473.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27477.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27478.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27481.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27483.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27484.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27487.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27491.json | 4 +- CVE-2025/CVE-2025-275xx/CVE-2025-27501.json | 2 +- CVE-2025/CVE-2025-275xx/CVE-2025-27521.json | 2 +- CVE-2025/CVE-2025-275xx/CVE-2025-27556.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27567.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27574.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27584.json | 2 +- CVE-2025/CVE-2025-275xx/CVE-2025-27585.json | 2 +- CVE-2025/CVE-2025-276xx/CVE-2025-27612.json | 6 +- CVE-2025/CVE-2025-276xx/CVE-2025-27686.json | 4 + CVE-2025/CVE-2025-276xx/CVE-2025-27692.json | 4 + CVE-2025/CVE-2025-276xx/CVE-2025-27693.json | 4 + CVE-2025/CVE-2025-276xx/CVE-2025-27694.json | 4 + CVE-2025/CVE-2025-277xx/CVE-2025-27716.json | 4 + CVE-2025/CVE-2025-277xx/CVE-2025-27718.json | 4 + CVE-2025/CVE-2025-277xx/CVE-2025-27726.json | 4 + CVE-2025/CVE-2025-277xx/CVE-2025-27727.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27732.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27733.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27735.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27737.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27738.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27741.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27742.json | 4 +- CVE-2025/CVE-2025-277xx/CVE-2025-27793.json | 4 + CVE-2025/CVE-2025-278xx/CVE-2025-27829.json | 4 + CVE-2025/CVE-2025-279xx/CVE-2025-27932.json | 4 + CVE-2025/CVE-2025-27xx/CVE-2025-2701.json | 6 +- CVE-2025/CVE-2025-27xx/CVE-2025-2702.json | 4 + CVE-2025/CVE-2025-27xx/CVE-2025-2713.json | 4 + CVE-2025/CVE-2025-27xx/CVE-2025-2779.json | 4 + CVE-2025/CVE-2025-27xx/CVE-2025-2794.json | 4 + CVE-2025/CVE-2025-280xx/CVE-2025-28015.json | 2 +- CVE-2025/CVE-2025-281xx/CVE-2025-28131.json | 4 + CVE-2025/CVE-2025-281xx/CVE-2025-28132.json | 4 + CVE-2025/CVE-2025-282xx/CVE-2025-28219.json | 4 + CVE-2025/CVE-2025-282xx/CVE-2025-28220.json | 4 + CVE-2025/CVE-2025-282xx/CVE-2025-28221.json | 4 + CVE-2025/CVE-2025-282xx/CVE-2025-28256.json | 2 +- CVE-2025/CVE-2025-283xx/CVE-2025-28395.json | 4 + CVE-2025/CVE-2025-283xx/CVE-2025-28398.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2804.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2814.json | 41 + CVE-2025/CVE-2025-28xx/CVE-2025-2815.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2825.json | 94 +- CVE-2025/CVE-2025-28xx/CVE-2025-2829.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2854.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2855.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2857.json | 6 +- CVE-2025/CVE-2025-28xx/CVE-2025-2858.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2860.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2861.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2862.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2863.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2864.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2865.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2867.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2868.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2869.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2870.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2876.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2878.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2885.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2886.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2887.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2888.json | 4 + CVE-2025/CVE-2025-28xx/CVE-2025-2891.json | 4 + CVE-2025/CVE-2025-290xx/CVE-2025-29033.json | 39 +- CVE-2025/CVE-2025-290xx/CVE-2025-29036.json | 39 +- CVE-2025/CVE-2025-290xx/CVE-2025-29069.json | 39 +- CVE-2025/CVE-2025-290xx/CVE-2025-29070.json | 39 +- CVE-2025/CVE-2025-291xx/CVE-2025-29189.json | 4 + CVE-2025/CVE-2025-292xx/CVE-2025-29208.json | 4 + CVE-2025/CVE-2025-292xx/CVE-2025-29266.json | 4 + CVE-2025/CVE-2025-293xx/CVE-2025-29389.json | 4 + CVE-2025/CVE-2025-293xx/CVE-2025-29390.json | 4 + CVE-2025/CVE-2025-293xx/CVE-2025-29391.json | 4 + CVE-2025/CVE-2025-293xx/CVE-2025-29394.json | 4 + CVE-2025/CVE-2025-297xx/CVE-2025-29766.json | 4 + CVE-2025/CVE-2025-297xx/CVE-2025-29772.json | 4 + CVE-2025/CVE-2025-297xx/CVE-2025-29795.json | 6 +- CVE-2025/CVE-2025-297xx/CVE-2025-29796.json | 4 +- CVE-2025/CVE-2025-298xx/CVE-2025-29809.json | 4 +- CVE-2025/CVE-2025-298xx/CVE-2025-29810.json | 4 +- CVE-2025/CVE-2025-299xx/CVE-2025-29908.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29909.json | 2 +- CVE-2025/CVE-2025-299xx/CVE-2025-29910.json | 2 +- CVE-2025/CVE-2025-299xx/CVE-2025-29911.json | 2 +- CVE-2025/CVE-2025-299xx/CVE-2025-29912.json | 2 +- CVE-2025/CVE-2025-299xx/CVE-2025-29913.json | 2 +- CVE-2025/CVE-2025-299xx/CVE-2025-29928.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29929.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29981.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29982.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29985.json | 4 + CVE-2025/CVE-2025-299xx/CVE-2025-29986.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2901.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2906.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2908.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2909.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2910.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2911.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2912.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2913.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2914.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2915.json | 6 +- CVE-2025/CVE-2025-29xx/CVE-2025-2916.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2917.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2919.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2921.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2924.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2925.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2926.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2927.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2951.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2952.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2953.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2954.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2959.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2960.json | 2 +- CVE-2025/CVE-2025-29xx/CVE-2025-2982.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2983.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2984.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2985.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2997.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2998.json | 4 + CVE-2025/CVE-2025-29xx/CVE-2025-2999.json | 4 + CVE-2025/CVE-2025-300xx/CVE-2025-30004.json | 4 + CVE-2025/CVE-2025-300xx/CVE-2025-30005.json | 4 + CVE-2025/CVE-2025-300xx/CVE-2025-30006.json | 4 + CVE-2025/CVE-2025-300xx/CVE-2025-30065.json | 18 +- CVE-2025/CVE-2025-300xx/CVE-2025-30090.json | 4 + CVE-2025/CVE-2025-300xx/CVE-2025-30093.json | 6 +- CVE-2025/CVE-2025-301xx/CVE-2025-30149.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30150.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30151.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30155.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30161.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30166.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30168.json | 6 +- CVE-2025/CVE-2025-301xx/CVE-2025-30177.json | 4 + CVE-2025/CVE-2025-301xx/CVE-2025-30195.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30203.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30209.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30210.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30211.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30216.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30221.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30223.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30224.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30232.json | 4 + CVE-2025/CVE-2025-302xx/CVE-2025-30281.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30282.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30284.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30285.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30286.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30287.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30288.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30289.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30290.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30291.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30292.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30293.json | 2 +- CVE-2025/CVE-2025-302xx/CVE-2025-30294.json | 2 +- CVE-2025/CVE-2025-303xx/CVE-2025-30354.json | 4 + CVE-2025/CVE-2025-303xx/CVE-2025-30356.json | 6 +- CVE-2025/CVE-2025-303xx/CVE-2025-30358.json | 4 + CVE-2025/CVE-2025-303xx/CVE-2025-30368.json | 4 + CVE-2025/CVE-2025-303xx/CVE-2025-30369.json | 4 + CVE-2025/CVE-2025-303xx/CVE-2025-30371.json | 4 + CVE-2025/CVE-2025-303xx/CVE-2025-30372.json | 6 +- CVE-2025/CVE-2025-305xx/CVE-2025-30520.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30544.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30547.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30548.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30559.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30563.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30579.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30589.json | 4 + CVE-2025/CVE-2025-305xx/CVE-2025-30594.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30607.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30613.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30614.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30622.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30670.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30671.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30672.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30673.json | 4 + CVE-2025/CVE-2025-306xx/CVE-2025-30677.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30774.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30782.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30793.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30794.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30796.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30797.json | 4 + CVE-2025/CVE-2025-307xx/CVE-2025-30798.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30802.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30808.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30827.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30834.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30837.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30840.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30848.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30849.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30869.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30870.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30876.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30878.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30880.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30882.json | 4 + CVE-2025/CVE-2025-308xx/CVE-2025-30886.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30901.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30902.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30910.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30911.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30917.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30924.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30926.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30961.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30963.json | 4 + CVE-2025/CVE-2025-309xx/CVE-2025-30971.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3000.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3001.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3002.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3003.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3004.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3005.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3006.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3007.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3008.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3009.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3010.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3015.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3016.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3017.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3021.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3022.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3026.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3027.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3036.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3037.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3038.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3039.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3040.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3041.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3042.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3043.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3045.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3047.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3048.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3051.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3057.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3059.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3061.json | 39 +- CVE-2025/CVE-2025-30xx/CVE-2025-3062.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3063.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3072.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3073.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3074.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3082.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3083.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3084.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3085.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3096.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3097.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3098.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3099.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31001.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31002.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31003.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31004.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31005.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31008.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31009.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31010.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31012.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31017.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31020.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31023.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31024.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31026.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31031.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31032.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31033.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31034.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31035.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31036.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31038.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31042.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31073.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31074.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31075.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31076.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31077.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31079.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31083.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31087.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31088.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31090.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31092.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31093.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31094.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31095.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31096.json | 4 + CVE-2025/CVE-2025-310xx/CVE-2025-31099.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31101.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31102.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31116.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31117.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31121.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31122.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31123.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31124.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31125.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31128.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31129.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31131.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31132.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31135.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31137.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31160.json | 6 +- CVE-2025/CVE-2025-311xx/CVE-2025-31176.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31178.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31179.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31180.json | 4 + CVE-2025/CVE-2025-311xx/CVE-2025-31181.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31335.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31375.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31376.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31377.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31382.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31383.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31385.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31386.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31388.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31390.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31391.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31392.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31393.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31394.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31395.json | 4 + CVE-2025/CVE-2025-313xx/CVE-2025-31399.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31400.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31401.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31402.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31404.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31406.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31408.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31409.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31410.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31415.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31419.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31432.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31433.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31434.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31435.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31437.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31438.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31439.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31440.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31443.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31444.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31447.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31448.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31449.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31450.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31451.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31452.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31453.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31456.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31457.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31458.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31459.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31460.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31463.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31464.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31465.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31466.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31469.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31470.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31471.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31472.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31473.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31474.json | 4 + CVE-2025/CVE-2025-314xx/CVE-2025-31498.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31526.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31527.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31528.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31529.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31530.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31532.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31533.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31535.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31538.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31539.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31540.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31542.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31543.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31544.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31545.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31546.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31547.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31549.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31555.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31556.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31557.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31559.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31560.json | 2 +- CVE-2025/CVE-2025-315xx/CVE-2025-31562.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31566.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31567.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31569.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31570.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31572.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31574.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31575.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31576.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31577.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31583.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31584.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31585.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31586.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31587.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31588.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31589.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31590.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31591.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31592.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31593.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31595.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31596.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31597.json | 4 + CVE-2025/CVE-2025-315xx/CVE-2025-31598.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31600.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31601.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31602.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31603.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31604.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31605.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31606.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31607.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31608.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31609.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31610.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31611.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31613.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31614.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31615.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31616.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31617.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31618.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31620.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31621.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31623.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31624.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31625.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31627.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31629.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31672.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31673.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31675.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31676.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31677.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31678.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31679.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31680.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31681.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31682.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31683.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31684.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31685.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31686.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31687.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31688.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31689.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31690.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31691.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31694.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31695.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31696.json | 4 + CVE-2025/CVE-2025-316xx/CVE-2025-31697.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31730.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31731.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31732.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31733.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31734.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31735.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31737.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31738.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31740.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31741.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31742.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31743.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31744.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31745.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31747.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31748.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31749.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31750.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31751.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31752.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31754.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31755.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31756.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31757.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31759.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31760.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31761.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31762.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31763.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31764.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31765.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31766.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31767.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31769.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31770.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31771.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31772.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31773.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31774.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31775.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31776.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31777.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31778.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31779.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31780.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31781.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31782.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31783.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31784.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31785.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31786.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31787.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31788.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31790.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31791.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31792.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31793.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31796.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31797.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31798.json | 4 + CVE-2025/CVE-2025-317xx/CVE-2025-31799.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31801.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31802.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31803.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31804.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31805.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31806.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31807.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31808.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31809.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31810.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31811.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31812.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31813.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31814.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31815.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31816.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31817.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31818.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31820.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31821.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31822.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31823.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31824.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31826.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31828.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31829.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31830.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31831.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31832.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31833.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31834.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31835.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31836.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31837.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31838.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31839.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31840.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31842.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31843.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31844.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31845.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31846.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31847.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31848.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31849.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31850.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31851.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31852.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31853.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31854.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31855.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31856.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31857.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31859.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31860.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31861.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31862.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31863.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31864.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31865.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31866.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31867.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31868.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31869.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31870.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31871.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31872.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31873.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31874.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31875.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31877.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31878.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31879.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31880.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31881.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31882.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31883.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31884.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31885.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31886.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31887.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31888.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31890.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31891.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31892.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31894.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31895.json | 4 + CVE-2025/CVE-2025-318xx/CVE-2025-31897.json | 4 + CVE-2025/CVE-2025-319xx/CVE-2025-31904.json | 4 + CVE-2025/CVE-2025-319xx/CVE-2025-31906.json | 4 + CVE-2025/CVE-2025-319xx/CVE-2025-31908.json | 4 + CVE-2025/CVE-2025-319xx/CVE-2025-31910.json | 4 + CVE-2025/CVE-2025-31xx/CVE-2025-3114.json | 4 + CVE-2025/CVE-2025-31xx/CVE-2025-3115.json | 4 + CVE-2025/CVE-2025-31xx/CVE-2025-3123.json | 2 +- CVE-2025/CVE-2025-31xx/CVE-2025-3131.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32016.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32018.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32020.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32024.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32025.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32026.json | 4 + CVE-2025/CVE-2025-320xx/CVE-2025-32028.json | 4 + CVE-2025/CVE-2025-321xx/CVE-2025-32117.json | 4 + CVE-2025/CVE-2025-321xx/CVE-2025-32164.json | 4 + CVE-2025/CVE-2025-322xx/CVE-2025-32211.json | 4 + CVE-2025/CVE-2025-322xx/CVE-2025-32275.json | 2 +- CVE-2025/CVE-2025-322xx/CVE-2025-32279.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32371.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32372.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32373.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32374.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32375.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32378.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32379.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32380.json | 4 + CVE-2025/CVE-2025-323xx/CVE-2025-32381.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32406.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32476.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32477.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32478.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32479.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32480.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32481.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32482.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32483.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32484.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32485.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32487.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32488.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32489.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32492.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32493.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32494.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32495.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32496.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32497.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32498.json | 4 + CVE-2025/CVE-2025-324xx/CVE-2025-32499.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32500.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32501.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32502.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32503.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32505.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32518.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32543.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32547.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32550.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32555.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32556.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32559.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32563.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32570.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32575.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32576.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32580.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32581.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32584.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32591.json | 4 + CVE-2025/CVE-2025-325xx/CVE-2025-32597.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32610.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32612.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32616.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32617.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32619.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32621.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32623.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32624.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32640.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32641.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32642.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32644.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32645.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32659.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32661.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32664.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32667.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32669.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32673.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32675.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32676.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32677.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32678.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32679.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32680.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32683.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32684.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32685.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32690.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32691.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32692.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32693.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32694.json | 4 + CVE-2025/CVE-2025-326xx/CVE-2025-32695.json | 4 + CVE-2025/CVE-2025-32xx/CVE-2025-3285.json | 4 + CVE-2025/CVE-2025-32xx/CVE-2025-3286.json | 4 + CVE-2025/CVE-2025-32xx/CVE-2025-3287.json | 4 + CVE-2025/CVE-2025-32xx/CVE-2025-3288.json | 4 + CVE-2025/CVE-2025-32xx/CVE-2025-3289.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3346.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3347.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3348.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3349.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3350.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3351.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3352.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3359.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3360.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3369.json | 4 + CVE-2025/CVE-2025-33xx/CVE-2025-3370.json | 4 + CVE-2025/CVE-2025-34xx/CVE-2025-3474.json | 4 + CVE-2025/CVE-2025-34xx/CVE-2025-3475.json | 4 + README.md | 39 +- _state.csv | 4189 +++++++++-------- 2096 files changed, 10791 insertions(+), 3849 deletions(-) create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2814.json diff --git a/CVE-2003/CVE-2003-200xx/CVE-2003-20001.json b/CVE-2003/CVE-2003-200xx/CVE-2003-20001.json index b941929744a..8ed4bc8283b 100644 --- a/CVE-2003/CVE-2003-200xx/CVE-2003-20001.json +++ b/CVE-2003/CVE-2003-200xx/CVE-2003-20001.json @@ -2,7 +2,7 @@ "id": "CVE-2003-20001", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T21:15:40.450", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T21:15:40.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se detect\u00f3 un problema en los dispositivos Mitel ICP VoIP 3100. Cuando un usuario remoto intenta iniciar sesi\u00f3n por TELNET durante el tiempo de espera y entra una llamada externa, el sistema divulga incorrectamente informaci\u00f3n sobre la llamada y cualquier registro SMDR generado por el sistema. Esta informaci\u00f3n incluye el tipo de servicio, el n\u00famero de extensi\u00f3n y otros par\u00e1metros relacionados con la actividad de la llamada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "http://olografix.org/acme/mitel.txt", diff --git a/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json b/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json index 45e6c90d563..3217663e80c 100644 --- a/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json +++ b/CVE-2016/CVE-2016-10003xx/CVE-2016-1000338.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-06-01T20:29:00.217", "lastModified": "2024-11-21T02:43:02.427", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0037.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0037.json index 589551461ae..2ba04e2b8a2 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0037.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0037.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0037", "sourceIdentifier": "secure@microsoft.com", "published": "2017-02-26T23:59:00.150", - "lastModified": "2025-02-10T17:15:13.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:40:43.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json index 2937bf26357..6b40104bbed 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0146.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0146", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:04.070", - "lastModified": "2025-02-04T15:15:09.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:27:30.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json index cdd8cf8ca50..4172bb75601 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in propanetank Roommate-Bill-Tracking up to 288437f658fc9ee7d4b92a9da12557024d8bc55c. It has been declared as critical. This vulnerability affects unknown code of the file /includes/login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The name of the patch is b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en propanetank Roommate-Bill-Tracking hasta 288437f658fc9ee7d4b92a9da12557024d8bc55c. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /includes/login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. El parche se llama b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json b/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json index 5f185c14dd0..5950a6bb493 100644 --- a/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json +++ b/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2017-05-02T14:59:00.520", "lastModified": "2025-02-07T14:15:42.800", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json b/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json index 1f020325079..24571d588b5 100644 --- a/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json +++ b/CVE-2017/CVE-2017-85xx/CVE-2017-8543.json @@ -2,8 +2,8 @@ "id": "CVE-2017-8543", "sourceIdentifier": "secure@microsoft.com", "published": "2017-06-15T01:29:04.490", - "lastModified": "2025-02-10T19:15:35.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:28:18.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", @@ -121,23 +119,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", - "matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124" }, { "vulnerable": true, @@ -194,6 +212,7 @@ "url": "http://www.securityfocus.com/bid/98824", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -202,6 +221,7 @@ "url": "http://www.securitytracker.com/id/1038667", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -219,6 +239,7 @@ "url": "http://www.securityfocus.com/bid/98824", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -227,6 +248,7 @@ "url": "http://www.securitytracker.com/id/1038667", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0878.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0878.json index 4f8f765cfff..d48e4926086 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0878.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0878.json @@ -2,7 +2,7 @@ "id": "CVE-2018-0878", "sourceIdentifier": "secure@microsoft.com", "published": "2018-03-14T17:29:01.120", - "lastModified": "2024-11-21T03:39:08.673", + "lastModified": "2025-04-04T21:15:41.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json b/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json index b63c3e6af64..c20632f2407 100644 --- a/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json +++ b/CVE-2018/CVE-2018-208xx/CVE-2018-20839.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-05-17T04:29:00.933", "lastModified": "2024-11-21T04:02:17.040", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25109.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25109.json index 940db6aa227..478754d6235 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25109.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25109.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T23:15:13.060", "lastModified": "2025-03-23T23:15:13.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Nintendo Animal Crossing, Doubutsu no Mori+ and Doubutsu no Mori e+ 1.00/1.01 on GameCube and classified as critical. Affected by this vulnerability is an unknown functionality of the component Letter Trigram Handler. The manipulation leads to memory corruption. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Nintendo Animal Crossing, Doubutsu no Mori+ y Doubutsu no Mori e+ 1.00/1.01 para GameCube, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Letter Trigram Handler. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. Es posible lanzar el ataque en el dispositivo f\u00edsico. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json index c0631bf454a..d0ced679e6e 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-08T00:15:24.030", "lastModified": "2025-01-08T18:15:12.493", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json index 7f7fdb9dd81..e4b5fad8fc6 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5729.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.563", "lastModified": "2024-11-21T04:09:15.897", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json index cb6f5867579..93dc3354928 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.657", "lastModified": "2024-11-21T04:09:16.103", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json b/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json index 852211ab145..a04e8db9d0a 100644 --- a/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json +++ b/CVE-2018/CVE-2018-81xx/CVE-2018-8120.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8120", "sourceIdentifier": "secure@microsoft.com", "published": "2018-05-09T19:29:01.277", - "lastModified": "2025-02-07T17:15:11.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:30:49.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.0, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -150,7 +148,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -158,7 +157,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -183,7 +183,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -191,7 +192,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json b/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json index 25866ef9950..8ed5b9f56ef 100644 --- a/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json +++ b/CVE-2018/CVE-2018-84xx/CVE-2018-8406.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8406", "sourceIdentifier": "secure@microsoft.com", "published": "2018-08-15T17:29:10.157", - "lastModified": "2025-02-07T17:15:13.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:27:34.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -121,43 +119,68 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "9EFB4440-2B6B-486F-94D4-7D9C80301E51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" } ] } @@ -169,6 +192,7 @@ "url": "http://www.securityfocus.com/bid/105012", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -177,6 +201,7 @@ "url": "http://www.securitytracker.com/id/1041461", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -193,6 +218,7 @@ "url": "http://www.securityfocus.com/bid/105012", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -201,6 +227,7 @@ "url": "http://www.securitytracker.com/id/1041461", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json b/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json index 45529ee62e2..308e2b8075b 100644 --- a/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json +++ b/CVE-2018/CVE-2018-84xx/CVE-2018-8414.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8414", "sourceIdentifier": "secure@microsoft.com", "published": "2018-08-15T17:29:10.393", - "lastModified": "2025-02-07T17:15:13.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:28:11.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", @@ -121,28 +119,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "E2817831-8725-4149-B694-44870F2B6938" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "2E732950-9F4C-434F-92EF-C1421CA35ADF" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "9EFB4440-2B6B-486F-94D4-7D9C80301E51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" } ] } @@ -154,6 +167,7 @@ "url": "http://www.securityfocus.com/bid/105016", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -162,6 +176,7 @@ "url": "http://www.securitytracker.com/id/1041458", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -178,6 +193,7 @@ "url": "http://www.securityfocus.com/bid/105016", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -186,6 +202,7 @@ "url": "http://www.securitytracker.com/id/1041458", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json index 335fe51fe9a..2a7b447481b 100644 --- a/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json +++ b/CVE-2018/CVE-2018-85xx/CVE-2018-8581.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8581", "sourceIdentifier": "secure@microsoft.com", "published": "2018-11-14T01:29:01.927", - "lastModified": "2025-02-04T16:15:31.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:30:27.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -138,7 +138,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -146,7 +147,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -162,7 +164,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -170,7 +173,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json index 4990e5f04e3..700bd713578 100644 --- a/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json +++ b/CVE-2019/CVE-2019-05xx/CVE-2019-0543.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0543", "sourceIdentifier": "secure@microsoft.com", "published": "2019-01-08T21:29:00.517", - "lastModified": "2025-02-04T16:15:31.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:30:18.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -99,33 +99,68 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" }, { "vulnerable": true, @@ -142,6 +177,16 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "9EFB4440-2B6B-486F-94D4-7D9C80301E51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -172,16 +217,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", @@ -197,6 +232,7 @@ "url": "http://www.securityfocus.com/bid/106408", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -222,6 +258,7 @@ "url": "http://www.securityfocus.com/bid/106408", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0803.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0803.json index df86c400abb..6c734f08725 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0803.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0803.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0803", "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T21:29:01.037", - "lastModified": "2025-02-07T17:15:16.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:43:32.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json index 7f57e22bb89..7a6b8b51de0 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0808", "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T03:29:00.873", - "lastModified": "2025-02-07T17:15:16.413", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:48:21.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json index e910840c837..3e8a8915154 100644 --- a/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json +++ b/CVE-2019/CVE-2019-13xx/CVE-2019-1322.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1322", "sourceIdentifier": "secure@microsoft.com", "published": "2019-10-10T14:15:16.190", - "lastModified": "2025-02-04T16:15:31.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:28:29.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,28 +109,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", - "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*", - "matchCriteriaId": "37097C39-D588-4018-B94D-5EB87B1E3D5A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*", - "matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" }, { "vulnerable": true, diff --git a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json index 461ab2328e1..9fd0974846f 100644 --- a/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json +++ b/CVE-2019/CVE-2019-14xx/CVE-2019-1429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-11-12T19:15:14.770", "lastModified": "2025-03-13T17:14:11.647", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-161xx/CVE-2019-16149.json b/CVE-2019/CVE-2019-161xx/CVE-2019-16149.json index 989997a1b58..cf7697a0465 100644 --- a/CVE-2019/CVE-2019-161xx/CVE-2019-16149.json +++ b/CVE-2019/CVE-2019-161xx/CVE-2019-16149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Improper Neutralization of Input During Web Page Generation in FortiClientEMS version 6.2.0 may allow a remote attacker to execute unauthorized code by injecting malicious payload in the user profile of a FortiClient instance being managed by the vulnerable system." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web en FortiClientEMS versi\u00f3n 6.2.0 puede permitir que un atacante remoto ejecute c\u00f3digo no autorizado al inyectar un payload malicioso en el perfil de usuario de una instancia de FortiClient administrada por el sistema vulnerable." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-161xx/CVE-2019-16151.json b/CVE-2019/CVE-2019-161xx/CVE-2019-16151.json index 9d990b7f178..acf4fff5c98 100644 --- a/CVE-2019/CVE-2019-161xx/CVE-2019-16151.json +++ b/CVE-2019/CVE-2019-161xx/CVE-2019-16151.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-03-21T16:15:13.210", "lastModified": "2025-03-21T16:15:13.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS 6.4.1 and below, 6.2.9 and below may allow a remote unauthenticated attacker to either redirect users to malicious websites via a crafted \"Host\" header or to execute JavaScript code in the victim's browser context.\r\nThis happens when the FortiGate has web filtering and category override enabled/configured." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web [CWE-79] en FortiOS 6.4.1 y anteriores, 6.2.9 y anteriores podr\u00eda permitir que un atacante remoto no autenticado redirija a los usuarios a sitios web maliciosos mediante un encabezado \"Host\" manipulado o ejecute c\u00f3digo JavaScript en el navegador de la v\u00edctima. Esto ocurre cuando FortiGate tiene habilitados o configurados el filtrado web y la anulaci\u00f3n de categor\u00edas." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json index f06ab987b0f..3cbde173c2b 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:11.640", "lastModified": "2025-03-07T14:37:52.380", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json index ff5718912d2..4ff2a32c403 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:12.607", "lastModified": "2024-11-21T04:34:06.830", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json b/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json index d517a6e7724..18763a78483 100644 --- a/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json +++ b/CVE-2019/CVE-2019-38xx/CVE-2019-3821.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2019-03-27T13:29:01.507", "lastModified": "2024-11-21T04:42:36.780", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json b/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json index 18c10544a93..e09d4383900 100644 --- a/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json +++ b/CVE-2019/CVE-2019-89xx/CVE-2019-8900.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-02-21T22:15:10.393", "lastModified": "2025-02-22T16:15:30.333", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json index 1e393488e6c..ac93945379d 100644 --- a/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json +++ b/CVE-2019/CVE-2019-99xx/CVE-2019-9978.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-03-24T15:29:00.243", "lastModified": "2025-02-28T18:06:20.323", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json index 9f30a8e7f33..091844df278 100644 --- a/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json +++ b/CVE-2020/CVE-2020-07xx/CVE-2020-0796.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0796", "sourceIdentifier": "secure@microsoft.com", "published": "2020-03-12T16:15:15.627", - "lastModified": "2025-02-04T16:15:32.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:28:23.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,23 +119,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "11E7F8F0-4FA8-4AA6-92A5-860E77AC933D" } ] } diff --git a/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json b/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json index 823de75fdc4..3286bc23eea 100644 --- a/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json +++ b/CVE-2020/CVE-2020-08xx/CVE-2020-0878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2020-09-11T17:15:14.370", "lastModified": "2025-03-13T17:28:30.013", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json b/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json index 0713e6bbf32..d2f3c936937 100644 --- a/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json +++ b/CVE-2020/CVE-2020-10xx/CVE-2020-1054.json @@ -2,8 +2,8 @@ "id": "CVE-2020-1054", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:12.070", - "lastModified": "2025-02-07T16:15:32.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:31:02.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,38 +119,98 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" }, { "vulnerable": true, @@ -167,6 +227,21 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "11E7F8F0-4FA8-4AA6-92A5-860E77AC933D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -197,21 +272,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json index 023008dc3bb..fee3d79c006 100644 --- a/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json +++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11023", "sourceIdentifier": "security-advisories@github.com", "published": "2020-04-29T21:15:11.743", - "lastModified": "2025-01-24T02:00:02.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:53:43.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -230,6 +230,17 @@ "versionEndIncluding": "2.10.0", "matchCriteriaId": "3625D477-1338-46CB-90B1-7291D617DC39" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.1.2", + "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ECE8F5F-4417-4412-B857-F1ACDEED4FC2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*", @@ -709,6 +720,36 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", + "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*", + "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93821CF-3117-4763-8163-DD49F6D2CA8E" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", @@ -815,151 +856,299 @@ }, { "url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html", @@ -971,23 +1160,43 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-03", @@ -1007,7 +1216,8 @@ "url": "https://www.debian.org/security/2020/dsa-4693", "source": "security-advisories@github.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Mailing List" ] }, { @@ -1141,7 +1351,10 @@ }, { "url": "https://github.com/github/advisory-database/blob/99afa6fdeaf5d1d23e1021ff915a5e5dbc82c1f1/advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json#L20-L37", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6", @@ -1160,151 +1373,299 @@ }, { "url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html", @@ -1316,23 +1677,43 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-03", @@ -1352,7 +1733,8 @@ "url": "https://www.debian.org/security/2020/dsa-4693", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Mailing List" ] }, { diff --git a/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json b/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json index 71f14a81398..4d6f182d339 100644 --- a/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json +++ b/CVE-2020/CVE-2020-120xx/CVE-2020-12069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2022-12-26T19:15:10.520", "lastModified": "2024-11-21T04:59:12.810", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1464.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1464.json index dd41fa6ac67..82fb442909f 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1464.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1464.json @@ -2,8 +2,8 @@ "id": "CVE-2020-1464", "sourceIdentifier": "secure@microsoft.com", "published": "2020-08-17T19:15:14.867", - "lastModified": "2025-02-04T19:15:22.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:47:25.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json index e4efbe8f1b1..8225954f0f8 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:19.353", "lastModified": "2024-11-21T05:13:19.760", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22653.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22653.json index 7043af678e4..c6f0a2b2ff7 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22653.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22653.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22653", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.547", - "lastModified": "2024-11-21T05:13:20.340", + "lastModified": "2025-04-03T18:15:38.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22654.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22654.json index f9e791f7347..480580c892f 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22654.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22654.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22654", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.610", - "lastModified": "2024-11-21T05:13:20.507", + "lastModified": "2025-04-03T18:15:39.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22655.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22655.json index 44989cba172..6c769bec5a4 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22655.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22655.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22655", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.667", - "lastModified": "2024-11-21T05:13:20.660", + "lastModified": "2025-04-03T18:15:39.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22656.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22656.json index 354d3702836..44dd0faef66 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22656.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22656.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22656", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.720", - "lastModified": "2024-11-21T05:13:20.820", + "lastModified": "2025-04-03T18:15:39.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1272" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22657.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22657.json index cf965fadf36..a6f85ac6db6 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22657.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22657.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22657", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.787", - "lastModified": "2024-11-21T05:13:20.970", + "lastModified": "2025-04-03T18:15:39.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22659.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22659.json index 8b60714c6e3..619d1a4562a 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22659.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22659.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22659", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.897", - "lastModified": "2024-11-21T05:13:21.283", + "lastModified": "2025-04-03T18:15:40.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22660.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22660.json index 4d81dc0365a..b624d9a3834 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22660.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22660.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22660", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.953", - "lastModified": "2024-11-21T05:13:21.433", + "lastModified": "2025-04-03T18:15:40.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22661.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22661.json index 1f9688060e3..571064fbcbf 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22661.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22661.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22661", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.007", - "lastModified": "2024-11-21T05:13:21.583", + "lastModified": "2025-04-03T18:15:40.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-226xx/CVE-2020-22662.json b/CVE-2020/CVE-2020-226xx/CVE-2020-22662.json index 300438777d4..6c757591fe0 100644 --- a/CVE-2020/CVE-2020-226xx/CVE-2020-22662.json +++ b/CVE-2020/CVE-2020-226xx/CVE-2020-22662.json @@ -2,13 +2,17 @@ "id": "CVE-2020-22662", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.063", - "lastModified": "2024-11-21T05:13:21.733", + "lastModified": "2025-04-03T18:15:40.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized \"illegal region code\" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI." + }, + { + "lang": "es", + "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes cambiar y establecer un \"c\u00f3digo de regi\u00f3n ilegal\" no autorizado mediante ejecuci\u00f3n remota de c\u00f3digo Inyecci\u00f3n de comando que conduce a una frecuencia ilegal con m\u00e1xima potencia de salida. Esta vulnerabilidad permite al atacante crear una cantidad arbitraria de interfaz WLAN ssid por radio, lo que genera una sobrecarga de ruido (el l\u00edmite m\u00e1ximo predeterminado es 8 ssid solo por radio en AP solo). La vulnerabilidad permite al atacante desbloquear regiones ocultas mediante la inyecci\u00f3n de comandos de privilegios en la GUI WEB. " } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-232xx/CVE-2020-23256.json b/CVE-2020/CVE-2020-232xx/CVE-2020-23256.json index 3db17876476..2e4c1fe259c 100644 --- a/CVE-2020/CVE-2020-232xx/CVE-2020-23256.json +++ b/CVE-2020/CVE-2020-232xx/CVE-2020-23256.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23256", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.117", - "lastModified": "2024-11-21T05:13:40.810", + "lastModified": "2025-04-03T18:15:40.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json index f9bc8424884..e29bc359f1b 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24370.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-08-17T17:15:13.877", "lastModified": "2024-11-21T05:14:41.110", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-255xx/CVE-2020-25502.json b/CVE-2020/CVE-2020-255xx/CVE-2020-25502.json index 779db506d05..0cac490ef40 100644 --- a/CVE-2020/CVE-2020-255xx/CVE-2020-25502.json +++ b/CVE-2020/CVE-2020-255xx/CVE-2020-25502.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25502", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T21:15:10.280", - "lastModified": "2024-11-21T05:18:04.333", + "lastModified": "2025-04-03T18:15:41.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json b/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json index 0220cf88489..bd39774184b 100644 --- a/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json +++ b/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29297", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.183", - "lastModified": "2024-11-21T05:23:52.997", + "lastModified": "2025-04-03T18:15:41.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json b/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json index 0f1ad9f3771..dd4db999e4f 100644 --- a/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json +++ b/CVE-2020/CVE-2020-357xx/CVE-2020-35730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-12-28T20:15:13.150", "lastModified": "2025-02-28T18:06:00.523", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json index 4fd764c4c22..1cab59912d8 100644 --- a/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json +++ b/CVE-2020/CVE-2020-85xx/CVE-2020-8515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-02-01T13:15:12.623", "lastModified": "2025-02-28T18:05:08.880", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json b/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json index 6e7911dd3b8..3a604d5f3b4 100644 --- a/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json +++ b/CVE-2021/CVE-2021-201xx/CVE-2021-20193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2021-03-26T17:15:12.843", "lastModified": "2024-11-21T05:46:06.267", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-240xx/CVE-2021-24008.json b/CVE-2021/CVE-2021-240xx/CVE-2021-24008.json index bee38e5ae8c..c4b24d3da21 100644 --- a/CVE-2021/CVE-2021-240xx/CVE-2021-24008.json +++ b/CVE-2021/CVE-2021-240xx/CVE-2021-24008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file." + }, + { + "lang": "es", + "value": "Una exposici\u00f3n de informaci\u00f3n sensible del sistema a una vulnerabilidad de esfera de control no autorizada [CWE-497] en FortiDDoS versi\u00f3n 5.4.0, versi\u00f3n 5.3.2 y anteriores, versi\u00f3n 5.2.0, versi\u00f3n 5.1.0, versi\u00f3n 5.0.0, versi\u00f3n 4.7.0, versi\u00f3n 4.6.0, versi\u00f3n 4.5.0, versi\u00f3n 4.4.2 y anteriores, FortiDDoS-CM versi\u00f3n 5.3.0, versi\u00f3n 5.2.0, versi\u00f3n 5.1.0, versi\u00f3n 5.0.0, versi\u00f3n 4.7.0, FortiVoice versi\u00f3n 6.0.6 y anteriores, FortiRecorder versi\u00f3n 6.0.3 y anteriores y FortiMail versi\u00f3n 6.4.1 y anteriores, versi\u00f3n 6.2.4 y anteriores, versi\u00f3n 6.0.9 y anteriores puede permitir que un atacante remoto no autenticado obtenga informaci\u00f3n potencialmente sensible de la versi\u00f3n del software leyendo un archivo JavaScript." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-256xx/CVE-2021-25635.json b/CVE-2021/CVE-2021-256xx/CVE-2021-25635.json index 4c88a7a4eb1..6627f01e443 100644 --- a/CVE-2021/CVE-2021-256xx/CVE-2021-25635.json +++ b/CVE-2021/CVE-2021-256xx/CVE-2021-25635.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@documentfoundation.org", "published": "2025-03-21T15:15:35.707", "lastModified": "2025-03-21T15:15:35.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Certificate Validation vulnerability in LibreOffice allowed \nan attacker to self sign an ODF document, with a signature untrusted by \nthe target, then modify it to change the signature algorithm to an \ninvalid (or unknown to LibreOffice) algorithm and LibreOffice would incorrectly present such a signature with an unknown algorithm as a \nvalid signature issued by a trusted person\n\n\nThis issue affects LibreOffice: from 7.0 before 7.0.5, from 7.1 before 7.1.1." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de certificado incorrecta en LibreOffice permiti\u00f3 a un atacante autofirmar un documento ODF, con una firma que no era de confianza para el destino, y luego modificarlo para cambiar el algoritmo de firma a uno no v\u00e1lido (o desconocido para LibreOffice) y LibreOffice presentar\u00eda incorrectamente dicha firma con un algoritmo desconocido como una firma v\u00e1lida emitida por una persona confiable. Este problema afecta a LibreOffice: desde 7.0 antes de 7.0.5, desde 7.1 antes de 7.1.1." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json index f5f8b6a84d1..287c0f4f479 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-03T00:15:12.307", "lastModified": "2025-03-07T21:59:37.343", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json b/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json index 970406a32f2..f4e93bdc9a5 100644 --- a/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json +++ b/CVE-2021/CVE-2021-290xx/CVE-2021-29098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2021-03-25T21:15:13.543", "lastModified": "2024-11-21T06:00:42.740", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json index 74a6418f992..61fa11557ed 100644 --- a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json +++ b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json @@ -2,7 +2,7 @@ "id": "CVE-2021-29256", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-24T18:15:08.033", - "lastModified": "2025-03-26T16:41:11.860", + "lastModified": "2025-04-07T13:08:28.870", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -119,24 +119,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:bifrost:*:*:*:*:*:*:*:*", - "versionStartIncluding": "r16p0-01eac0", - "versionEndExcluding": "r30p0-01eac0", - "matchCriteriaId": "EB7B47A9-86B1-46B5-8F83-6409B6CD895C" + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r16p0", + "versionEndExcluding": "r30p0", + "matchCriteriaId": "D168CEB1-DAE6-4C9F-B101-C84CA7C0396D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:midgard:*:*:*:*:*:*:*:*", - "versionStartIncluding": "r28p0-01eac0", - "versionEndIncluding": "r30p0-01eac0", - "matchCriteriaId": "BB4EF1AF-F341-439F-A5BF-A4424D0E2F14" + "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r28p0", + "versionEndExcluding": "r31p0", + "matchCriteriaId": "EB12C4AB-50D7-49F7-A8C3-33A8629D3C96" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:valhall:*:*:*:*:*:*:*:*", - "versionStartIncluding": "r19p0-01eac0", - "versionEndExcluding": "r30p0-01eac0", - "matchCriteriaId": "31B6A9F2-3304-429C-9339-6C16A5834521" + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r19p0", + "versionEndExcluding": "r30p0", + "matchCriteriaId": "E9713B79-2EFF-49C1-8B8F-4CA969BA351E" } ] } diff --git a/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json b/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json index 10eda2ff4ce..4a7d44e8a7e 100644 --- a/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json +++ b/CVE-2021/CVE-2021-312xx/CVE-2021-31207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:10.397", "lastModified": "2025-03-13T16:41:49.303", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-374xx/CVE-2021-37497.json b/CVE-2021/CVE-2021-374xx/CVE-2021-37497.json index af614b2e527..bcbe96d994e 100644 --- a/CVE-2021/CVE-2021-374xx/CVE-2021-37497.json +++ b/CVE-2021/CVE-2021-374xx/CVE-2021-37497.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37497", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T18:15:13.547", - "lastModified": "2024-11-21T06:15:16.513", + "lastModified": "2025-04-04T21:15:41.443", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-374xx/CVE-2021-37499.json b/CVE-2021/CVE-2021-374xx/CVE-2021-37499.json index 0a43a16e38f..1511af07e7d 100644 --- a/CVE-2021/CVE-2021-374xx/CVE-2021-37499.json +++ b/CVE-2021/CVE-2021-374xx/CVE-2021-37499.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37499", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T12:15:11.350", - "lastModified": "2024-11-21T06:15:16.960", + "lastModified": "2025-04-03T18:15:41.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json index e7f50257e01..3c7361c9958 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38118.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json index 65ba0a022cc..9023024d256 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38135.json @@ -76,7 +76,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json index f36f1a09e23..5831698dd5e 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-08-07T04:15:06.967", "lastModified": "2024-11-21T06:16:31.280", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json index 077dc856407..f1c0411a08b 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40444.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40444", "sourceIdentifier": "secure@microsoft.com", "published": "2021-09-15T12:15:16.467", - "lastModified": "2025-02-04T15:15:12.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:46:47.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4454.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4454.json index f3b14da8f3b..63531ec5860 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4454.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4454.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate\n\nThe conclusion \"j1939_session_deactivate() should be called with a\nsession ref-count of at least 2\" is incorrect. In some concurrent\nscenarios, j1939_session_deactivate can be called with the session\nref-count less than 2. But there is not any problem because it\nwill check the session active state before session putting in\nj1939_session_deactivate_locked().\n\nHere is the concurrent scenario of the problem reported by syzbot\nand my reproduction log.\n\n cpu0 cpu1\n j1939_xtp_rx_eoma\nj1939_xtp_rx_abort_one\n j1939_session_get_by_addr [kref == 2]\nj1939_session_get_by_addr [kref == 3]\nj1939_session_deactivate [kref == 2]\nj1939_session_put [kref == 1]\n\t\t\t\tj1939_session_completed\n\t\t\t\tj1939_session_deactivate\n\t\t\t\tWARN_ON_ONCE(kref < 2)\n\n=====================================================\nWARNING: CPU: 1 PID: 21 at net/can/j1939/transport.c:1088 j1939_session_deactivate+0x5f/0x70\nCPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 5.14.0-rc7+ #32\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014\nRIP: 0010:j1939_session_deactivate+0x5f/0x70\nCall Trace:\n j1939_session_deactivate_activate_next+0x11/0x28\n j1939_xtp_rx_eoma+0x12a/0x180\n j1939_tp_recv+0x4a2/0x510\n j1939_can_recv+0x226/0x380\n can_rcv_filter+0xf8/0x220\n can_receive+0x102/0x220\n ? process_backlog+0xf0/0x2c0\n can_rcv+0x53/0xf0\n __netif_receive_skb_one_core+0x67/0x90\n ? process_backlog+0x97/0x2c0\n __netif_receive_skb+0x22/0x80" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: j1939: correcci\u00f3n del error WARN_ON_ONCE en j1939_session_deactivate. La conclusi\u00f3n \"j1939_session_deactivate() debe llamarse con un recuento de referencias de sesi\u00f3n de al menos 2\" es incorrecta. En algunos escenarios concurrentes, se puede llamar a j1939_session_deactivate con un recuento de referencias de sesi\u00f3n inferior a 2. Sin embargo, no hay problema, ya que comprueba el estado activo de la sesi\u00f3n antes de que se active j1939_session_deactivate_locked(). A continuaci\u00f3n, se muestra el escenario concurrente del problema reportado por syzbot y mi registro de reproducci\u00f3n. cpu0 cpu1 j1939_xtp_rx_eoma j1939_xtp_rx_abort_one j1939_session_get_by_addr [kref == 2] j1939_session_get_by_addr [kref == 3] j1939_session_deactivate [kref == 2] j1939_session_put [kref == 1] j1939_session_completed j1939_session_deactivate WARN_ON_ONCE(kref < 2) ======================================================= ADVERTENCIA: CPU: 1 PID: 21 at net/can/j1939/transport.c:1088 j1939_session_deactivate+0x5f/0x70 CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 5.14.0-rc7+ #32 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014 RIP: 0010:j1939_session_deactivate+0x5f/0x70 Call Trace: j1939_session_deactivate_activate_next+0x11/0x28 j1939_xtp_rx_eoma+0x12a/0x180 j1939_tp_recv+0x4a2/0x510 j1939_can_recv+0x226/0x380 can_rcv_filter+0xf8/0x220 can_receive+0x102/0x220 ? process_backlog+0xf0/0x2c0 can_rcv+0x53/0xf0 __netif_receive_skb_one_core+0x67/0x90 ? process_backlog+0x97/0x2c0 __netif_receive_skb+0x22/0x80 " } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json index 7348dc88670..fd60cb1e072 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2021-12-14T19:15:07.733", "lastModified": "2025-03-12T19:52:00.270", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47165.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47165.json index fd2981f4840..7413ef01c64 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47165.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47165.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47169.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47169.json index 9180b407bee..21d6d2ac9da 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47169.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47169.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json index 09af4c583cf..0c8dc0475db 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json index 2b6ce63f19e..54761573081 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json index e3e111e4ddf..f70c4a45ec7 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json index 0f96ee2a89c..1ee25ad8bac 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json index 6f53f428e83..23fb9dab890 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47339.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47339.json index 2be28bc4628..6cb9a45af9c 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47339.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47339.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47346.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47346.json index 7b356b5655c..ab9ae4e490a 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47346.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47346.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json index 8f66b61b966..488a3dfd1a1 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47436.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47436.json index 3c342792d9d..db84ff1f6ce 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47436.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47436.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47517.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47517.json index 121931fa18f..22b829cf52a 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47517.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47517.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json index 39a9ab60554..3fe3020b3a9 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1271.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-31T16:15:09.347", "lastModified": "2024-11-21T06:40:23.040", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json index a389bdd0aa8..138346357ed 100644 --- a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json +++ b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-10-18T21:15:10.960", "lastModified": "2025-03-12T19:39:15.827", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-227xx/CVE-2022-22706.json b/CVE-2022/CVE-2022-227xx/CVE-2022-22706.json index c54eadc3477..6277db58add 100644 --- a/CVE-2022/CVE-2022-227xx/CVE-2022-22706.json +++ b/CVE-2022/CVE-2022-227xx/CVE-2022-22706.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22706", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-03T15:15:08.610", - "lastModified": "2025-03-14T16:50:53.957", + "lastModified": "2025-04-07T13:09:05.120", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -119,24 +119,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:bifrost:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r0p0", "versionEndExcluding": "r36p0", - "matchCriteriaId": "856BC87E-52EC-462F-A79C-107D0DB3B424" + "matchCriteriaId": "2BC992EA-31B0-4668-97A7-DAB4FA569FC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:midgard:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r26p0", - "versionEndIncluding": "r31p0", - "matchCriteriaId": "7A48CB88-81A5-4A6C-9B56-1BACC8A23726" + "versionEndExcluding": "r32p0", + "matchCriteriaId": "7C54FBE2-F9B7-4C24-BD18-D63C429496C5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:valhall:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r19p0", "versionEndExcluding": "r36p0", - "matchCriteriaId": "397B1C5E-687A-43CF-8DD7-5706ACFE75DA" + "matchCriteriaId": "E9B32BDE-B62B-4CB6-8551-236699541379" } ] } diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25631.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25631.json index 26fb6351feb..6f0b46c3cd0 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25631.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25631.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25631", "sourceIdentifier": "secure@symantec.com", "published": "2023-01-20T17:15:10.517", - "lastModified": "2024-11-21T06:52:28.650", + "lastModified": "2025-04-03T18:15:41.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json index 152b3911d03..f38cd0c6f04 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-11-22T16:15:19.470", "lastModified": "2025-04-10T19:54:25.537", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json index 7234ba40948..717b3bdf400 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-03-11T07:15:08.147", "lastModified": "2024-11-21T06:54:43.893", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2658.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2658.json index 2a3cf24618c..8f6a6e9516e 100644 --- a/CVE-2022/CVE-2022-26xx/CVE-2022-2658.json +++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2658.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2658", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:10.690", - "lastModified": "2024-11-21T07:01:27.603", + "lastModified": "2025-04-04T20:15:15.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36449.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36449.json index bc8d9a055f3..84f7f9447c4 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36449.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36449.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36449", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-01T03:15:16.050", - "lastModified": "2024-11-21T07:13:02.293", + "lastModified": "2025-04-07T12:47:11.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,34 +60,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:bifrost:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r0p0", "versionEndIncluding": "r38p0", - "matchCriteriaId": "FFD7EB73-4B3E-4EE2-B052-325045586D41" + "matchCriteriaId": "16BAF891-CABF-421E-8D25-258A2D1B1DC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:bifrost:r39p0:*:*:*:*:*:*:*", - "matchCriteriaId": "1CF0F1B3-6279-4292-A563-CCF95F11D4BA" + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r39p0:*:*:*:*:*:*:*", + "matchCriteriaId": "C5628A8D-18D5-4A0F-A474-13024A73F17F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:midgard:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r4p0", "versionEndIncluding": "r32p0", - "matchCriteriaId": "9030A164-5DE3-43C0-B910-419ED8E42EBA" + "matchCriteriaId": "2DCE4808-EFC2-4BA7-83CF-BD98CAFBB029" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:valhall:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r19p0", "versionEndIncluding": "r38p0", - "matchCriteriaId": "60010D61-2815-4F60-9334-69D6D83CDBCD" + "matchCriteriaId": "2D7A46F8-1503-4028-922F-643E5748CA0E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:valhall:r39p0:*:*:*:*:*:*:*", - "matchCriteriaId": "641BFF30-6C63-4075-984E-873E8968A46F" + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r39p0:*:*:*:*:*:*:*", + "matchCriteriaId": "05471A20-62BC-4626-BE77-0902B098834E" } ] } diff --git a/CVE-2022/CVE-2022-403xx/CVE-2022-40319.json b/CVE-2022/CVE-2022-403xx/CVE-2022-40319.json index 8889d4a0223..e6176387cb4 100644 --- a/CVE-2022/CVE-2022-403xx/CVE-2022-40319.json +++ b/CVE-2022/CVE-2022-403xx/CVE-2022-40319.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40319", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T21:15:13.320", - "lastModified": "2024-11-21T07:21:18.700", + "lastModified": "2025-04-04T20:15:16.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-406xx/CVE-2022-40657.json b/CVE-2022/CVE-2022-406xx/CVE-2022-40657.json index d20a02d331e..7abb8be7c9c 100644 --- a/CVE-2022/CVE-2022-406xx/CVE-2022-40657.json +++ b/CVE-2022/CVE-2022-406xx/CVE-2022-40657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2022-09-15T16:15:12.387", "lastModified": "2025-01-07T19:15:27.923", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-406xx/CVE-2022-40663.json b/CVE-2022/CVE-2022-406xx/CVE-2022-40663.json index 1665543051f..c0999d71a6b 100644 --- a/CVE-2022/CVE-2022-406xx/CVE-2022-40663.json +++ b/CVE-2022/CVE-2022-406xx/CVE-2022-40663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2022-09-15T16:15:12.827", "lastModified": "2025-01-07T19:15:28.657", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40704.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40704.json index 1888b1df9bc..bd65eba46ea 100644 --- a/CVE-2022/CVE-2022-407xx/CVE-2022-40704.json +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40704.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40704", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-17T19:15:11.530", - "lastModified": "2024-11-21T07:21:53.663", + "lastModified": "2025-04-04T20:15:16.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json index 2b35be3b2ad..eb9827940e6 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42826.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.537", "lastModified": "2024-11-21T07:25:25.490", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json index 060391423ec..f50e2c07e8f 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-25T20:15:10.220", "lastModified": "2024-11-21T07:34:51.510", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4299.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4299.json index 13b85a9599a..b72f4da6a45 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4299.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4299.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4299", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.283", - "lastModified": "2024-11-21T07:34:58.097", + "lastModified": "2025-04-04T21:15:41.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43977.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43977.json index 23883c4a6b3..3dca9df0a1b 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43977.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43977.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43977", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T21:15:14.100", - "lastModified": "2024-11-21T07:27:28.160", + "lastModified": "2025-04-04T20:15:16.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4431.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4431.json index f79c8900d9a..4443372d105 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4431.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4431.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4431", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.647", - "lastModified": "2024-11-21T07:35:14.930", + "lastModified": "2025-04-04T21:15:42.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json index 22e805fae6f..e5968f3713b 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.173", "lastModified": "2025-01-08T18:15:13.847", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json index 55bf15dd42e..7fc927fbebb 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.293", "lastModified": "2025-01-08T16:15:26.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json index f47d9299155..a727c7efc98 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45449.json @@ -74,7 +74,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46889.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46889.json index 2e733523ca2..985c0eed025 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46889.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46889.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46889", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T19:15:11.137", - "lastModified": "2024-11-21T07:31:15.163", + "lastModified": "2025-04-03T18:15:42.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46890.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46890.json index 9439ffd8361..a2139848a59 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46890.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46890.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46890", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T19:15:11.307", - "lastModified": "2024-11-21T07:31:15.307", + "lastModified": "2025-04-03T18:15:42.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json index 010893ad1e7..31488569428 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4645", "sourceIdentifier": "cve@gitlab.com", "published": "2023-03-03T16:15:09.777", - "lastModified": "2025-03-18T20:27:08.320", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-04T21:15:42.243", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4658.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4658.json index dab570957ca..ee1a4f4b5a0 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4658.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4658.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4658", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.783", - "lastModified": "2024-11-21T07:35:41.167", + "lastModified": "2025-04-04T21:15:42.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47105.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47105.json index 17b79a28792..4d3218153a1 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47105.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47105.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47105", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T16:15:11.277", - "lastModified": "2024-11-21T07:31:30.547", + "lastModified": "2025-04-03T18:15:42.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json index 0939914f9b3..9dc9524f2ab 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48425.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-03-19T03:15:11.633", "lastModified": "2025-02-26T20:15:10.493", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json index 4dbdd76d8e6..d9bd10a0983 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json index 4acb5f286b8..44498ea9eaa 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json index cd0eafb6bc6..aacd0dc5631 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48701.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json index 31c7468ea03..3de8edbf5c9 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48702.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json index 66d4dc059b8..b6ed33af56e 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48703.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json index de44d29b5fa..b6c5fa282d3 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48805.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48805.json index 6805702b9b1..dfa0f075fdd 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48805.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48805.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json index 158b1fe9e1b..d040460914f 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json index ca750082c21..0879d2951a7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.407", "lastModified": "2025-03-24T19:43:42.333", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49733.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49733.json index 366aa3d3245..5b4712bd2db 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49733.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49733.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49738.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49738.json index fbf696d7627..66064bbe304 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49738.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49738.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\n\nsyzbot found a f2fs bug:\n\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\n\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:284 [inline]\nprint_report+0x15e/0x45d mm/kasan/report.c:395\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nis_alive fs/f2fs/gc.c:1117 [inline]\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\nwrite_inode fs/fs-writeback.c:1440 [inline]\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n\nThe root cause is that we forgot to do sanity check on .i_extra_isize\nin below path, result in accessing invalid address later, fix it.\n- gc_data_segment\n - is_alive\n - data_blkaddr\n - offset_in_addr" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para realizar una comprobaci\u00f3n de cordura en i_extra_isize en is_alive() syzbot encontr\u00f3 un error de f2fs: ERROR: KASAN: slab-out-of-bounds en data_blkaddr fs/f2fs/f2fs.h:2891 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en is_alive fs/f2fs/gc.c:1117 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en gc_data_segment fs/f2fs/gc.c:1520 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888076557568 por la tarea kworker/u4:3/52 CPU: 1 PID: 52 Comm: kworker/u4:3 No contaminado 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Cola de trabajo: escritura diferida wb_workfn (flush-7:0) Rastreo de llamadas: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15e/0x45d mm/kasan/report.c:395 kasan_report+0xbb/0x1f0 mm/kasan/report.c:495 data_blkaddr fs/f2fs/f2fs.h:2891 [inline] is_alive fs/f2fs/gc.c:1117 [inline] gc_data_segment fs/f2fs/gc.c:1520 [inline] do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 f2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831 f2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410 f2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753 write_inode fs/fs-writeback.c:1440 [inline] __writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652 writeback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870 wb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044 wb_do_writeback fs/fs-writeback.c:2187 [inline] wb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 La causa ra\u00edz es que olvidamos hacer una comprobaci\u00f3n de cordura en .i_extra_isize en la siguiente ruta, lo que da como resultado el acceso a una direcci\u00f3n no v\u00e1lida m\u00e1s tarde, corr\u00edjalo. - gc_data_segment - is_alive - data_blkaddr - offset_in_addr" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49739.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49739.json index 3c3691009b2..eec01afa368 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49739.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49739.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Always check inode size of inline inodes\n\nCheck if the inode size of stuffed (inline) inodes is within the allowed\nrange when reading inodes from disk (gfs2_dinode_in()). This prevents\nus from on-disk corruption.\n\nThe two checks in stuffed_readpage() and gfs2_unstuffer_page() that just\ntruncate inline data to the maximum allowed size don't actually make\nsense, and they can be removed now as well." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gfs2: Comprobar siempre el tama\u00f1o de los inodos en l\u00ednea. Se comprueba si el tama\u00f1o de los inodos rellenos (en l\u00ednea) est\u00e1 dentro del rango permitido al leer inodos del disco (gfs2_dinode_in()). Esto evita la corrupci\u00f3n en disco. Las dos comprobaciones en stuffed_readpage() y gfs2_unstuffer_page(), que simplemente truncan los datos en l\u00ednea al tama\u00f1o m\u00e1ximo permitido, no tienen sentido y tambi\u00e9n se pueden eliminar." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49740.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49740.json index ffe2db2afac..7cd5dac1f2d 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49740.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads\n\nThis patch fixes slab-out-of-bounds reads in brcmfmac that occur in\nbrcmf_construct_chaninfo() and brcmf_enable_bw40_2g() when the count\nvalue of channel specifications provided by the device is greater than\nthe length of 'list->element[]', decided by the size of the 'list'\nallocated with kzalloc(). The patch adds checks that make the functions\nfree the buffer and return -EINVAL if that is the case. Note that the\nnegative return is handled by the caller, brcmf_setup_wiphybands() or\nbrcmf_cfg80211_attach().\n\nFound by a modified version of syzkaller.\n\nCrash Report from brcmf_construct_chaninfo():\n==================================================================\nBUG: KASAN: slab-out-of-bounds in brcmf_setup_wiphybands+0x1238/0x1430\nRead of size 4 at addr ffff888115f24600 by task kworker/0:2/1896\n\nCPU: 0 PID: 1896 Comm: kworker/0:2 Tainted: G W O 5.14.0+ #132\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n dump_stack_lvl+0x57/0x7d\n print_address_description.constprop.0.cold+0x93/0x334\n kasan_report.cold+0x83/0xdf\n brcmf_setup_wiphybands+0x1238/0x1430\n brcmf_cfg80211_attach+0x2118/0x3fd0\n brcmf_attach+0x389/0xd40\n brcmf_usb_probe+0x12de/0x1690\n usb_probe_interface+0x25f/0x710\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_set_configuration+0x984/0x1770\n usb_generic_driver_probe+0x69/0x90\n usb_probe_device+0x9c/0x220\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_new_device.cold+0x463/0xf66\n hub_event+0x10d5/0x3330\n process_one_work+0x873/0x13e0\n worker_thread+0x8b/0xd10\n kthread+0x379/0x450\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1896:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n kmem_cache_alloc_trace+0x19e/0x330\n brcmf_setup_wiphybands+0x290/0x1430\n brcmf_cfg80211_attach+0x2118/0x3fd0\n brcmf_attach+0x389/0xd40\n brcmf_usb_probe+0x12de/0x1690\n usb_probe_interface+0x25f/0x710\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_set_configuration+0x984/0x1770\n usb_generic_driver_probe+0x69/0x90\n usb_probe_device+0x9c/0x220\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_new_device.cold+0x463/0xf66\n hub_event+0x10d5/0x3330\n process_one_work+0x873/0x13e0\n worker_thread+0x8b/0xd10\n kthread+0x379/0x450\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff888115f24000\n which belongs to the cache kmalloc-2k of size 2048\nThe buggy address is located 1536 bytes inside of\n 2048-byte region [ffff888115f24000, ffff888115f24800)\n\nMemory state around the buggy address:\n ffff888115f24500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888115f24580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n>ffff888115f24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff888115f24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff888115f24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n==================================================================\n\nCrash Report from brcmf_enable_bw40_2g():\n==========\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: brcmfmac: Comprueba el valor de conteo de la especificaci\u00f3n del canal para evitar lecturas fuera de los l\u00edmites Este parche corrige las lecturas fuera de los l\u00edmites de slab en brcmfmac que ocurren en brcmf_construct_chaninfo() y brcmf_enable_bw40_2g() cuando el valor de conteo de las especificaciones del canal proporcionadas por el dispositivo es mayor que la longitud de 'list->element[]', decidida por el tama\u00f1o de la 'lista' asignada con kzalloc(). El parche agrega verificaciones que hacen que las funciones liberen el b\u00fafer y devuelvan -EINVAL si ese es el caso. Ten en cuenta que el retorno negativo lo maneja el llamador, brcmf_setup_wiphybands() o brcmf_cfg80211_attach(). Encontrado por una versi\u00f3n modificada de syzkaller. Informe de fallos de brcmf_construct_chaninfo(): ====================================================================== ERROR: KASAN: slab fuera de los l\u00edmites en brcmf_setup_wiphybands+0x1238/0x1430 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888115f24600 por la tarea kworker/0:2/1896 CPU: 0 PID: 1896 Comm: kworker/0:2 Contaminado: GWO 5.14.0+ #132 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 01/04/2014 Cola de trabajo: usb_hub_wq hub_event Rastreo de llamadas: dump_stack_lvl+0x57/0x7d print_address_description.constprop.0.cold+0x93/0x334 kasan_report.cold+0x83/0xdf brcmf_setup_wiphybands+0x1238/0x1430 brcmf_cfg80211_attach+0x2118/0x3fd0 brcmf_attach+0x389/0xd40 brcmf_usb_probe+0x12de/0x1690 usb_probe_interface+0x25f/0x710 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_set_configuration+0x984/0x1770 usb_generic_driver_probe+0x69/0x90 usb_probe_device+0x9c/0x220 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_new_device.cold+0x463/0xf66 hub_event+0x10d5/0x3330 process_one_work+0x873/0x13e0 worker_thread+0x8b/0xd10 kthread+0x379/0x450 ret_from_fork+0x1f/0x30 Allocated by task 1896: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0x7c/0x90 kmem_cache_alloc_trace+0x19e/0x330 brcmf_setup_wiphybands+0x290/0x1430 brcmf_cfg80211_attach+0x2118/0x3fd0 brcmf_attach+0x389/0xd40 brcmf_usb_probe+0x12de/0x1690 usb_probe_interface+0x25f/0x710 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_set_configuration+0x984/0x1770 usb_generic_driver_probe+0x69/0x90 usb_probe_device+0x9c/0x220 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_new_device.cold+0x463/0xf66 hub_event+0x10d5/0x3330 process_one_work+0x873/0x13e0 worker_thread+0x8b/0xd10 kthread+0x379/0x450 ret_from_fork+0x1f/0x30 The buggy address belongs to the object at ffff888115f24000 which belongs to the cache kmalloc-2k of size 2048 The buggy address is located 1536 bytes inside of 2048-byte region [ffff888115f24000, ffff888115f24800) Memory state around the buggy address: ffff888115f24500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888115f24580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888115f24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff888115f24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888115f24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ========================================================================== Informe de fallo de brcmf_enable_bw40_2g(): ========== ---truncado---" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49741.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49741.json index e6e71a6da55..3ca0ea54f99 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49741.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49741.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: smscufx: fix error handling code in ufx_usb_probe\n\nThe current error handling code in ufx_usb_probe have many unmatching\nissues, e.g., missing ufx_free_usb_list, destroy_modedb label should\nonly include framebuffer_release, fb_dealloc_cmap only matches\nfb_alloc_cmap.\n\nMy local syzkaller reports a memory leak bug:\n\nmemory leak in ufx_usb_probe\n\nBUG: memory leak\nunreferenced object 0xffff88802f879580 (size 128):\n comm \"kworker/0:7\", pid 17416, jiffies 4295067474 (age 46.710s)\n hex dump (first 32 bytes):\n 80 21 7c 2e 80 88 ff ff 18 d0 d0 0c 80 88 ff ff .!|.............\n 00 d0 d0 0c 80 88 ff ff e0 ff ff ff 0f 00 00 00 ................\n backtrace:\n [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1045\n [] kmalloc include/linux/slab.h:553 [inline]\n [] kzalloc include/linux/slab.h:689 [inline]\n [] ufx_alloc_urb_list drivers/video/fbdev/smscufx.c:1873 [inline]\n [] ufx_usb_probe+0x11c/0x15a0 drivers/video/fbdev/smscufx.c:1655\n [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [] call_driver_probe drivers/base/dd.c:560 [inline]\n [] really_probe+0x12d/0x390 drivers/base/dd.c:639\n [] __driver_probe_device+0xbf/0x140 drivers/base/dd.c:778\n [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:808\n [] __device_attach_driver+0xf7/0x150 drivers/base/dd.c:936\n [] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427\n [] __device_attach+0x105/0x2d0 drivers/base/dd.c:1008\n [] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487\n [] device_add+0x642/0xdc0 drivers/base/core.c:3517\n [] usb_set_configuration+0x8ef/0xb80 drivers/usb/core/message.c:2170\n [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n [] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293\n [] call_driver_probe drivers/base/dd.c:560 [inline]\n [] really_probe+0x12d/0x390 drivers/base/dd.c:639\n [] __driver_probe_device+0xbf/0x140 drivers/base/dd.c:778\n\nFix this bug by rewriting the error handling code in ufx_usb_probe." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: smscufx: corrige el c\u00f3digo de gesti\u00f3n de errores en ufx_usb_probe El c\u00f3digo de manejo de errores actual en ufx_usb_probe tiene muchos problemas que no coinciden, por ejemplo, falta ufx_free_usb_list, la etiqueta destroy_modedb solo debe incluir framebuffer_release, fb_dealloc_cmap solo coincide con fb_alloc_cmap. Mi syzkaller local informa de un error de p\u00e9rdida de memoria: p\u00e9rdida de memoria en ufx_usb_probe ERROR: p\u00e9rdida de memoria objeto no referenciado 0xffff88802f879580 (tama\u00f1o 128): comm \"kworker/0:7\", pid 17416, jiffies 4295067474 (edad 46.710s) volcado hexadecimal (primeros 32 bytes): 80 21 7c 2e 80 88 ff ff 18 d0 d0 0c 80 88 ff ff .!|............. 00 d0 d0 0c 80 88 ff ff e0 ff ff ff 0f 00 00 00 ................ backtrace: [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1045 [] kmalloc include/linux/slab.h:553 [en l\u00ednea] [] kzalloc include/linux/slab.h:689 [en l\u00ednea] [] ufx_alloc_urb_list drivers/video/fbdev/smscufx.c:1873 [en l\u00ednea] [] ufx_usb_probe+0x11c/0x15a0 drivers/video/fbdev/smscufx.c:1655 [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [] sonda_de_controlador_de_llamada controladores/base/dd.c:560 [en l\u00ednea] [] sonda_realmente+0x12d/0x390 controladores/base/dd.c:639 [] dispositivo_sonda_de_controlador+0xbf/0x140 controladores/base/dd.c:778 [] dispositivo_sonda_de_controlador+0x2a/0x120 controladores/base/dd.c:808 [] controlador_adjunto_de_dispositivo+0xf7/0x150 controladores/base/dd.c:936 [] bus_para_cada_unidad+0xb7/0x100 controladores/base/bus.c:427 [] __adjunto_dispositivo+0x105/0x2d0 controladores/base/dd.c:1008 [] dispositivo_sonda_bus+0xc6/0xe0 controladores/base/bus.c:487 [] adici\u00f3n_dispositivo+0x642/0xdc0 controladores/base/n\u00facleo.c:3517 [] configuraci\u00f3n_establecida_usb+0x8ef/0xb80 controladores/usb/n\u00facleo/mensaje.c:2170 [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238 [] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293 [] call_driver_probe drivers/base/dd.c:560 [en l\u00ednea] [] really_probe+0x12d/0x390 drivers/base/dd.c:639 [] __driver_probe_device+0xbf/0x140 drivers/base/dd.c:778 Corrija este error reescribiendo el c\u00f3digo de gesti\u00f3n de errores en ufx_usb_probe." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49742.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49742.json index ab185c089a1..07e20265a5d 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49742.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49742.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: initialize locks earlier in f2fs_fill_super()\n\nsyzbot is reporting lockdep warning at f2fs_handle_error() [1], for\nspin_lock(&sbi->error_lock) is called before spin_lock_init() is called.\nFor safe locking in error handling, move initialization of locks (and\nobvious structures) in f2fs_fill_super() to immediately after memory\nallocation." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: inicializar bloqueos antes en f2fs_fill_super(). syzbot reporta una advertencia de bloqueo en f2fs_handle_error() [1], ya que se llama a spin_lock(&sbi->error_lock) antes de que se llame a spin_lock_init(). Para un bloqueo seguro en la gesti\u00f3n de errores, se debe trasladar la inicializaci\u00f3n de bloqueos (y estructuras obvias) en f2fs_fill_super() inmediatamente despu\u00e9s de la asignaci\u00f3n de memoria." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49743.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49743.json index c2001086ec7..80501f3e341 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49743.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Use \"buf\" flexible array for memcpy() destination\n\nThe \"buf\" flexible array needs to be the memcpy() destination to avoid\nfalse positive run-time warning from the recent FORTIFY_SOURCE\nhardening:\n\n memcpy: detected field-spanning write (size 93) of single field \"&fh->fb\"\n at fs/overlayfs/export.c:799 (size 21)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ovl: Usar la matriz flexible \"buf\" para el destino de memcpy() La matriz flexible \"buf\" debe ser el destino de memcpy() para evitar una advertencia de tiempo de ejecuci\u00f3n de falsos positivos del reciente endurecimiento de FORTIFY_SOURCE: memcpy: se detect\u00f3 una escritura que abarca el campo (tama\u00f1o 93) de un solo campo \"&fh->fb\" en fs/overlayfs/export.c:799 (tama\u00f1o 21)" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49744.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49744.json index 021008e3437..969c9f9fbb8 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49744.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/uffd: fix pte marker when fork() without fork event\n\nPatch series \"mm: Fixes on pte markers\".\n\nPatch 1 resolves the syzkiller report from Pengfei.\n\nPatch 2 further harden pte markers when used with the recent swapin error\nmarkers. The major case is we should persist a swapin error marker after\nfork(), so child shouldn't read a corrupted page.\n\n\nThis patch (of 2):\n\nWhen fork(), dst_vma is not guaranteed to have VM_UFFD_WP even if src may\nhave it and has pte marker installed. The warning is improper along with\nthe comment. The right thing is to inherit the pte marker when needed, or\nkeep the dst pte empty.\n\nA vague guess is this happened by an accident when there's the prior patch\nto introduce src/dst vma into this helper during the uffd-wp feature got\ndeveloped and I probably messed up in the rebase, since if we replace\ndst_vma with src_vma the warning & comment it all makes sense too.\n\nHugetlb did exactly the right here (copy_hugetlb_page_range()). Fix the\ngeneral path.\n\nReproducer:\n\nhttps://github.com/xupengfe/syzkaller_logs/blob/main/221208_115556_copy_page_range/repro.c\n\nBugzilla report: https://bugzilla.kernel.org/show_bug.cgi?id=216808" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/uffd: correcci\u00f3n del marcador pte cuando fork() no tiene evento fork. Serie de parches \"mm: Correcciones en marcadores pte\". El parche 1 resuelve el informe de syzkiller de Pengfei. El parche 2 refuerza a\u00fan m\u00e1s los marcadores pte cuando se usan con los recientes marcadores de error de intercambio. El caso principal es que debemos conservar un marcador de error de intercambio despu\u00e9s de fork(), para que el elemento secundario no lea una p\u00e1gina da\u00f1ada. Este parche (de 2): Al ejecutar fork(), no se garantiza que dst_vma tenga VM_UFFD_WP, incluso si src lo tiene y tiene instalado el marcador pte. La advertencia y el comentario son incorrectos. Lo correcto es heredar el marcador pte cuando sea necesario o dejar vac\u00edo el marcador pte de dst. Una vaga suposici\u00f3n es que esto ocurri\u00f3 accidentalmente durante el parche anterior para introducir src/dst vma en este ayudante durante el desarrollo de la funci\u00f3n uffd-wp, y probablemente comet\u00ed un error al rebasar, ya que si reemplazamos dst_vma con src_vma, la advertencia y el comentario tambi\u00e9n cobran sentido. Hugetlb hizo exactamente lo correcto aqu\u00ed (copy_hugetlb_page_range()). Corrija la ruta general. Reproductor: https://github.com/xupengfe/syzkaller_logs/blob/main/221208_115556_copy_page_range/repro.c. Informe de Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=216808" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49745.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49745.json index 61d59a41af1..d89810f971d 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49745.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49745.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: m10bmc-sec: Fix probe rollback\n\nHandle probe error rollbacks properly to avoid leaks." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fpga: m10bmc-sec: Corregir reversi\u00f3n de errores de sonda gestionar adecuadamente las reversiones de errores de sonda para evitar fugas." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49746.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49746.json index 64ff1b10cc3..a5ef8c4101a 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49746.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49746.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init\n\nIf the function sdma_load_context() fails, the sdma_desc will be\nfreed, but the allocated desc->bd is forgot to be freed.\n\nWe already met the sdma_load_context() failure case and the log as\nbelow:\n[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready\n...\n\nIn this case, the desc->bd will not be freed without this change." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: imx-sdma: Se corrige una posible fuga de memoria en sdma_transfer_init. Si la funci\u00f3n sdma_load_context() falla, se libera sdma_desc, pero se olvida liberar el desc->bd asignado. Ya se ha detectado el fallo de sdma_load_context() y el registro es el siguiente: [450.699064] imx-sdma 30bd0000.dma-controller: Tiempo de espera agotado para que CH0 est\u00e9 listo... En este caso, el desc->bd no se liberar\u00e1 sin este cambio." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49747.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49747.json index 6534d955c13..3c592ed6e11 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49747.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49747.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs/zmap.c: Fix incorrect offset calculation\n\nEffective offset to add to length was being incorrectly calculated,\nwhich resulted in iomap->length being set to 0, triggering a WARN_ON\nin iomap_iter_done().\n\nFix that, and describe it in comments.\n\nThis was reported as a crash by syzbot under an issue about a warning\nencountered in iomap_iter_done(), but unrelated to erofs.\n\nC reproducer: https://syzkaller.appspot.com/text?tag=ReproC&x=1037a6b2880000\nKernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=e2021a61197ebe02\nDashboard link: https://syzkaller.appspot.com/bug?extid=a8e049cd3abd342936b6" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs/zmap.c: Se corrigi\u00f3 el c\u00e1lculo incorrecto del desplazamiento. El desplazamiento efectivo para a\u00f1adir a length se calculaba incorrectamente, lo que provocaba que iomap->length se estableciera en 0, lo que activaba un WARN_ON en iomap_iter_done(). Se corrigi\u00f3 y se describi\u00f3 en los comentarios. syzbot report\u00f3 esto como un fallo en un problema relacionado con una advertencia encontrada en iomap_iter_done(), pero no relacionada con erofs. Reproductor C: https://syzkaller.appspot.com/text?tag=ReproC&x=1037a6b2880000 Configuraci\u00f3n del kernel: https://syzkaller.appspot.com/text?tag=KernelConfig&x=e2021a61197ebe02 Enlace del panel: https://syzkaller.appspot.com/bug?extid=a8e049cd3abd342936b6" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49748.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49748.json index 6c73a49f316..bdcabbb819e 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49748.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49748.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/amd: fix potential integer overflow on shift of a int\n\nThe left shift of int 32 bit integer constant 1 is evaluated using 32 bit\narithmetic and then passed as a 64 bit function argument. In the case where\ni is 32 or more this can lead to an overflow. Avoid this by shifting\nusing the BIT_ULL macro instead." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/x86/amd: se corrige un posible desbordamiento de enteros al desplazar un entero. El desplazamiento a la izquierda de la constante entera de 32 bits 1 se eval\u00faa mediante aritm\u00e9tica de 32 bits y se pasa como argumento de funci\u00f3n de 64 bits. Si i es 32 o m\u00e1s, esto puede provocar un desbordamiento. Para evitarlo, utilice la macro BIT_ULL para desplazar." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49749.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49749.json index 9c988853954..9b6842171cd 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49749.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49749.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: designware: use casting of u64 in clock multiplication to avoid overflow\n\nIn functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow\nby depending on the values of the given parameters including the ic_clk.\nFor example in our use case where ic_clk is larger than one million,\nmultiplication of ic_clk * 4700 will result in 32 bit overflow.\n\nAdd cast of u64 to the calculation to avoid multiplication overflow, and\nuse the corresponding define for divide." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: designware: usar la conversi\u00f3n de u64 en la multiplicaci\u00f3n de reloj para evitar el desbordamiento. Las funciones i2c_dw_scl_lcnt() e i2c_dw_scl_hcnt() pueden experimentar un desbordamiento al depender de los valores de los par\u00e1metros dados, incluido ic_clk. Por ejemplo, en nuestro caso pr\u00e1ctico, donde ic_clk es mayor que un mill\u00f3n, la multiplicaci\u00f3n de ic_clk * 4700 resultar\u00e1 en un desbordamiento de 32 bits. A\u00f1ada la conversi\u00f3n de u64 al c\u00e1lculo para evitar el desbordamiento de la multiplicaci\u00f3n y utilice la definici\u00f3n correspondiente para la divisi\u00f3n." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49750.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49750.json index 4c09765688e..766da6a931a 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49750.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49750.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: CPPC: Add u64 casts to avoid overflowing\n\nThe fields of the _CPC object are unsigned 32-bits values.\nTo avoid overflows while using _CPC's values, add 'u64' casts." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: CPPC: A\u00f1adir conversiones u64 para evitar desbordamientos. Los campos del objeto _CPC son valores de 32 bits sin signo. Para evitar desbordamientos al usar los valores de _CPC, a\u00f1adir conversiones 'u64'." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49751.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49751.json index 294fdfcc721..f5f58e9a70b 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49751.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49751.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: fix WARNING after calling w1_process()\n\nI got the following WARNING message while removing driver(ds2482):\n\n------------[ cut here ]------------\ndo not call blocking ops when !TASK_RUNNING; state=1 set at [<000000002d50bfb6>] w1_process+0x9e/0x1d0 [wire]\nWARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __might_sleep+0x98/0xa0\nCPU: 0 PID: 262 Comm: w1_bus_master1 Tainted: G N 6.1.0-rc3+ #307\nRIP: 0010:__might_sleep+0x98/0xa0\nCall Trace:\n exit_signals+0x6c/0x550\n do_exit+0x2b4/0x17e0\n kthread_exit+0x52/0x60\n kthread+0x16d/0x1e0\n ret_from_fork+0x1f/0x30\n\nThe state of task is set to TASK_INTERRUPTIBLE in loop in w1_process(),\nset it to TASK_RUNNING when it breaks out of the loop to avoid the\nwarning." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: w1: corregir ADVERTENCIA despu\u00e9s de llamar a w1_process() Recib\u00ed el siguiente mensaje de ADVERTENCIA al eliminar el controlador (ds2482): ------------[ cortar aqu\u00ed ]------------ no llamar a operaciones de bloqueo cuando !TASK_RUNNING; estado=1 establecido en [<000000002d50bfb6>] w1_process+0x9e/0x1d0 [wire] ADVERTENCIA: CPU: 0 PID: 262 en kernel/sched/core.c:9817 __might_sleep+0x98/0xa0 CPU: 0 PID: 262 Comm: w1_bus_master1 Contaminado: GN 6.1.0-rc3+ #307 RIP: 0010:__might_sleep+0x98/0xa0 Rastreo de llamadas: exit_signals+0x6c/0x550 do_exit+0x2b4/0x17e0 kthread_exit+0x52/0x60 kthread+0x16d/0x1e0 ret_from_fork+0x1f/0x30 El estado de la tarea est\u00e1 establecido en TASK_INTERRUPTIBLE en bucle en w1_process(), config\u00farelo en TASK_RUNNING cuando salga del bucle para evitar la advertencia." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49752.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49752.json index 9d384d73fd0..c7908ba6372 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49752.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49752.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevice property: fix of node refcount leak in fwnode_graph_get_next_endpoint()\n\nThe 'parent' returned by fwnode_graph_get_port_parent()\nwith refcount incremented when 'prev' is not NULL, it\nneeds be put when finish using it.\n\nBecause the parent is const, introduce a new variable to\nstore the returned fwnode, then put it before returning\nfrom fwnode_graph_get_next_endpoint()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: propiedad del dispositivo: correcci\u00f3n de la fuga de recuento de referencias de nodos en fwnode_graph_get_next_endpoint(). El valor de \"parent\" devuelto por fwnode_graph_get_port_parent(), con un recuento de referencias incrementado cuando \"prev\" no es NULL, debe a\u00f1adirse al finalizar su uso. Dado que \"parent\" es constante, se introduce una nueva variable para almacenar el fwnode devuelto y se a\u00f1ade antes de que fwnode_graph_get_next_endpoint() lo devuelva." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49754.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49754.json index e84a6740a49..bff17ec7ee5 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49754.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49754.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix a buffer overflow in mgmt_mesh_add()\n\nSmatch Warning:\nnet/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy()\n'mesh_tx->param' too small (48 vs 50)\n\nAnalysis:\n\n'mesh_tx->param' is array of size 48. This is the destination.\nu8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48.\n\nBut in the caller 'mesh_send' we reject only when len > 50.\nlen > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: se corrige un desbordamiento de b\u00fafer en mgmt_mesh_add() Smatch Advertencia: net/bluetooth/mgmt_util.c:375 error de mgmt_mesh_add(): __memcpy() 'mesh_tx->param' demasiado peque\u00f1o (48 frente a 50) An\u00e1lisis: 'mesh_tx->param' es una matriz de tama\u00f1o 48. Este es el destino. u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48. Pero en el llamador 'mesh_send' rechazamos solo cuando len > 50. len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49756.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49756.json index d540dbf703d..51659ba21ee 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49756.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49756.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe()\n\nsp_usb_phy_probe() will call platform_get_resource_byname() that may fail\nand return NULL. devm_ioremap() will use usbphy->moon4_res_mem->start as\ninput, which may causes null-ptr-deref. Check the ret value of\nplatform_get_resource_byname() to avoid the null-ptr-deref." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: usb: sunplus: Se corrige la posible desreferencia de PTR nula en sp_usb_phy_probe(). Sp_usb_phy_probe() llamar\u00e1 a platform_get_resource_byname(), que podr\u00eda fallar y devolver NULL. devm_ioremap() utilizar\u00e1 usbphy->moon4_res_mem->start como entrada, lo que puede causar una desreferencia de PTR nula. Compruebe el valor ret de platform_get_resource_byname() para evitar la desreferencia de PTR nula." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49757.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49757.json index 17f5718025c..d734e09d55b 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49757.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49757.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\n\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\nallocated by edac_mc_alloc().\n\nCall edac_mc_free() on the error handling path to avoid a memory leak.\n\n [ bp: Massage commit message. ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/highbank: Se corrige la p\u00e9rdida de memoria en highbank_mc_probe(). Cuando devres_open_group() falla, devuelve -ENOMEM sin liberar la memoria asignada por edac_mc_alloc(). Se llama a edac_mc_free() en la ruta de gesti\u00f3n de errores para evitar una p\u00e9rdida de memoria. [bp: Mensaje de confirmaci\u00f3n de Modificaci\u00f3n]." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49758.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49758.json index 10a3c120a75..211cd4c9cd8 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49758.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49758.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nreset: uniphier-glue: Fix possible null-ptr-deref\n\nIt will cause null-ptr-deref when resource_size(res) invoked,\nif platform_get_resource() returns NULL." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: reset: uniphier-glue: corrige posible null-ptr-deref Provocar\u00e1 null-ptr-deref cuando se invoque resource_size(res), si platform_get_resource() devuelve NULL." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49759.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49759.json index 1ca774db8ca..6005cb8cf3c 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49759.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49759.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Use threaded irqs instead of tasklets\n\nThe vmci_dispatch_dgs() tasklet function calls vmci_read_data()\nwhich uses wait_event() resulting in invalid sleep in an atomic\ncontext (and therefore potentially in a deadlock).\n\nUse threaded irqs to fix this issue and completely remove usage\nof tasklets.\n\n[ 20.264639] BUG: sleeping function called from invalid context at drivers/misc/vmw_vmci/vmci_guest.c:145\n[ 20.264643] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 762, name: vmtoolsd\n[ 20.264645] preempt_count: 101, expected: 0\n[ 20.264646] RCU nest depth: 0, expected: 0\n[ 20.264647] 1 lock held by vmtoolsd/762:\n[ 20.264648] #0: ffff0000874ae440 (sk_lock-AF_VSOCK){+.+.}-{0:0}, at: vsock_connect+0x60/0x330 [vsock]\n[ 20.264658] Preemption disabled at:\n[ 20.264659] [] vmci_send_datagram+0x44/0xa0 [vmw_vmci]\n[ 20.264665] CPU: 0 PID: 762 Comm: vmtoolsd Not tainted 5.19.0-0.rc8.20220727git39c3c396f813.60.fc37.aarch64 #1\n[ 20.264667] Hardware name: VMware, Inc. VBSA/VBSA, BIOS VEFI 12/31/2020\n[ 20.264668] Call trace:\n[ 20.264669] dump_backtrace+0xc4/0x130\n[ 20.264672] show_stack+0x24/0x80\n[ 20.264673] dump_stack_lvl+0x88/0xb4\n[ 20.264676] dump_stack+0x18/0x34\n[ 20.264677] __might_resched+0x1a0/0x280\n[ 20.264679] __might_sleep+0x58/0x90\n[ 20.264681] vmci_read_data+0x74/0x120 [vmw_vmci]\n[ 20.264683] vmci_dispatch_dgs+0x64/0x204 [vmw_vmci]\n[ 20.264686] tasklet_action_common.constprop.0+0x13c/0x150\n[ 20.264688] tasklet_action+0x40/0x50\n[ 20.264689] __do_softirq+0x23c/0x6b4\n[ 20.264690] __irq_exit_rcu+0x104/0x214\n[ 20.264691] irq_exit_rcu+0x1c/0x50\n[ 20.264693] el1_interrupt+0x38/0x6c\n[ 20.264695] el1h_64_irq_handler+0x18/0x24\n[ 20.264696] el1h_64_irq+0x68/0x6c\n[ 20.264697] preempt_count_sub+0xa4/0xe0\n[ 20.264698] _raw_spin_unlock_irqrestore+0x64/0xb0\n[ 20.264701] vmci_send_datagram+0x7c/0xa0 [vmw_vmci]\n[ 20.264703] vmci_datagram_dispatch+0x84/0x100 [vmw_vmci]\n[ 20.264706] vmci_datagram_send+0x2c/0x40 [vmw_vmci]\n[ 20.264709] vmci_transport_send_control_pkt+0xb8/0x120 [vmw_vsock_vmci_transport]\n[ 20.264711] vmci_transport_connect+0x40/0x7c [vmw_vsock_vmci_transport]\n[ 20.264713] vsock_connect+0x278/0x330 [vsock]\n[ 20.264715] __sys_connect_file+0x8c/0xc0\n[ 20.264718] __sys_connect+0x84/0xb4\n[ 20.264720] __arm64_sys_connect+0x2c/0x3c\n[ 20.264721] invoke_syscall+0x78/0x100\n[ 20.264723] el0_svc_common.constprop.0+0x68/0x124\n[ 20.264724] do_el0_svc+0x38/0x4c\n[ 20.264725] el0_svc+0x60/0x180\n[ 20.264726] el0t_64_sync_handler+0x11c/0x150\n[ 20.264728] el0t_64_sync+0x190/0x194" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: VMCI: Uso de IRQs con subprocesos en lugar de tasklets. La funci\u00f3n de tasklet vmci_dispatch_dgs() llama a vmci_read_data(), que utiliza wait_event(), lo que resulta en una suspensi\u00f3n no v\u00e1lida en un contexto at\u00f3mico (y, por lo tanto, potencialmente en un interbloqueo). Utilice IRQs con subprocesos para solucionar este problema y eliminar por completo el uso de tasklets. [ 20.264639] ERROR: funci\u00f3n de suspensi\u00f3n llamada desde un contexto no v\u00e1lido en drivers/misc/vmw_vmci/vmci_guest.c:145 [ 20.264643] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 762, name: vmtoolsd [ 20.264645] preempt_count: 101, esperado: 0 [ 20.264646] Profundidad de anidamiento de RCU: 0, esperado: 0 [ 20.264647] 1 bloqueo retenido por vmtoolsd/762: [ 20.264648] #0: ffff0000874ae440 (sk_lock-AF_VSOCK){+.+.}-{0:0}, en: vsock_connect+0x60/0x330 [vsock] [ 20.264658] Preempci\u00f3n deshabilitada en: [ 20.264659] [] vmci_send_datagram+0x44/0xa0 [vmw_vmci] [ 20.264665] CPU: 0 PID: 762 Comm: vmtoolsd No contaminado 5.19.0-0.rc8.20220727git39c3c396f813.60.fc37.aarch64 #1 [ 20.264667] Nombre del hardware: VMware, Inc. VBSA/VBSA, BIOS VEFI 31/12/2020 [ 20.264668] Rastreo de llamadas: [ 20.264669] dump_backtrace+0xc4/0x130 [ 20.264672] show_stack+0x24/0x80 [ 20.264673] dump_stack_lvl+0x88/0xb4 [ 20.264676] dump_stack+0x18/0x34 [ 20.264677] __might_resched+0x1a0/0x280 [ 20.264679] __might_sleep+0x58/0x90 [ 20.264681] vmci_read_data+0x74/0x120 [vmw_vmci] [ 20.264683] vmci_dispatch_dgs+0x64/0x204 [vmw_vmci] [ 20.264686] tasklet_action_common.constprop.0+0x13c/0x150 [ 20.264688] tasklet_action+0x40/0x50 [ 20.264689] __do_softirq+0x23c/0x6b4 [ 20.264690] __irq_exit_rcu+0x104/0x214 [ 20.264691] irq_exit_rcu+0x1c/0x50 [ 20.264693] el1_interrupt+0x38/0x6c [ 20.264695] el1h_64_irq_handler+0x18/0x24 [ 20.264696] el1h_64_irq+0x68/0x6c [ 20.264697] preempt_count_sub+0xa4/0xe0 [ 20.264698] _raw_spin_unlock_irqrestore+0x64/0xb0 [ 20.264701] vmci_send_datagram+0x7c/0xa0 [vmw_vmci] [ 20.264703] vmci_datagram_dispatch+0x84/0x100 [vmw_vmci] [ 20.264706] vmci_datagram_send+0x2c/0x40 [vmw_vmci] [ 20.264709] vmci_transport_send_control_pkt+0xb8/0x120 [vmw_vsock_vmci_transport] [ 20.264711] vmci_transport_connect+0x40/0x7c [vmw_vsock_vmci_transport] [ 20.264713] vsock_connect+0x278/0x330 [vsock] [ 20.264715] __sys_connect_file+0x8c/0xc0 [ 20.264718] __sys_connect+0x84/0xb4 [ 20.264720] __arm64_sys_connect+0x2c/0x3c [ 20.264721] invocar_syscall+0x78/0x100 [ 20.264723] el0_svc_common.constprop.0+0x68/0x124 [ 20.264724] do_el0_svc+0x38/0x4c [ 20.264725] el0_svc+0x60/0x180 [ 20.264726] el0t_64_sync_handler+0x11c/0x150 [ 20.264728] el0t_64_sync+0x190/0x194" } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49760.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49760.json index ccda46ba73a..745ad84b88e 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49760.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49760.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix PTE marker handling in hugetlb_change_protection()\n\nPatch series \"mm/hugetlb: uffd-wp fixes for hugetlb_change_protection()\".\n\nPlaying with virtio-mem and background snapshots (using uffd-wp) on\nhugetlb in QEMU, I managed to trigger a VM_BUG_ON(). Looking into the\ndetails, hugetlb_change_protection() seems to not handle uffd-wp correctly\nin all cases.\n\nPatch #1 fixes my test case. I don't have reproducers for patch #2, as it\nrequires running into migration entries.\n\nI did not yet check in detail yet if !hugetlb code requires similar care.\n\n\nThis patch (of 2):\n\nThere are two problematic cases when stumbling over a PTE marker in\nhugetlb_change_protection():\n\n(1) We protect an uffd-wp PTE marker a second time using uffd-wp: we will\n end up in the \"!huge_pte_none(pte)\" case and mess up the PTE marker.\n\n(2) We unprotect a uffd-wp PTE marker: we will similarly end up in the\n \"!huge_pte_none(pte)\" case even though we cleared the PTE, because\n the \"pte\" variable is stale. We'll mess up the PTE marker.\n\nFor example, if we later stumble over such a \"wrongly modified\" PTE marker,\nwe'll treat it like a present PTE that maps some garbage page.\n\nThis can, for example, be triggered by mapping a memfd backed by huge\npages, registering uffd-wp, uffd-wp'ing an unmapped page and (a)\nuffd-wp'ing it a second time; or (b) uffd-unprotecting it; or (c)\nunregistering uffd-wp. Then, ff we trigger fallocate(FALLOC_FL_PUNCH_HOLE)\non that file range, we will run into a VM_BUG_ON:\n\n[ 195.039560] page:00000000ba1f2987 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x0\n[ 195.039565] flags: 0x7ffffc0001000(reserved|node=0|zone=0|lastcpupid=0x1fffff)\n[ 195.039568] raw: 0007ffffc0001000 ffffe742c0000008 ffffe742c0000008 0000000000000000\n[ 195.039569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n[ 195.039569] page dumped because: VM_BUG_ON_PAGE(compound && !PageHead(page))\n[ 195.039573] ------------[ cut here ]------------\n[ 195.039574] kernel BUG at mm/rmap.c:1346!\n[ 195.039579] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 195.039581] CPU: 7 PID: 4777 Comm: qemu-system-x86 Not tainted 6.0.12-200.fc36.x86_64 #1\n[ 195.039583] Hardware name: LENOVO 20WNS1F81N/20WNS1F81N, BIOS N35ET50W (1.50 ) 09/15/2022\n[ 195.039584] RIP: 0010:page_remove_rmap+0x45b/0x550\n[ 195.039588] Code: [...]\n[ 195.039589] RSP: 0018:ffffbc03c3633ba8 EFLAGS: 00010292\n[ 195.039591] RAX: 0000000000000040 RBX: ffffe742c0000000 RCX: 0000000000000000\n[ 195.039592] RDX: 0000000000000002 RSI: ffffffff8e7aac1a RDI: 00000000ffffffff\n[ 195.039592] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffbc03c3633a08\n[ 195.039593] R10: 0000000000000003 R11: ffffffff8f146328 R12: ffff9b04c42754b0\n[ 195.039594] R13: ffffffff8fcc6328 R14: ffffbc03c3633c80 R15: ffff9b0484ab9100\n[ 195.039595] FS: 00007fc7aaf68640(0000) GS:ffff9b0bbf7c0000(0000) knlGS:0000000000000000\n[ 195.039596] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 195.039597] CR2: 000055d402c49110 CR3: 0000000159392003 CR4: 0000000000772ee0\n[ 195.039598] PKRU: 55555554\n[ 195.039599] Call Trace:\n[ 195.039600] \n[ 195.039602] __unmap_hugepage_range+0x33b/0x7d0\n[ 195.039605] unmap_hugepage_range+0x55/0x70\n[ 195.039608] hugetlb_vmdelete_list+0x77/0xa0\n[ 195.039611] hugetlbfs_fallocate+0x410/0x550\n[ 195.039612] ? _raw_spin_unlock_irqrestore+0x23/0x40\n[ 195.039616] vfs_fallocate+0x12e/0x360\n[ 195.039618] __x64_sys_fallocate+0x40/0x70\n[ 195.039620] do_syscall_64+0x58/0x80\n[ 195.039623] ? syscall_exit_to_user_mode+0x17/0x40\n[ 195.039624] ? do_syscall_64+0x67/0x80\n[ 195.039626] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 195.039628] RIP: 0033:0x7fc7b590651f\n[ 195.039653] Code: [...]\n[ 195.039654] RSP: 002b:00007fc7aaf66e70 EFLAGS: 00000293 ORIG_RAX: 000000000000011d\n[ 195.039655] RAX: ffffffffffffffda RBX: 0000558ef4b7f370 RCX: 00007fc7b590651f\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/hugetlb: correcci\u00f3n de la gesti\u00f3n de marcadores PTE en hugetlb_change_protection(). Serie de parches \"mm/hugetlb: correcci\u00f3n de uffd-wp para hugetlb_change_protection()\". Al experimentar con virtio-mem e instant\u00e1neas en segundo plano (usando uffd-wp) en hugetlb en QEMU, logr\u00e9 activar un error VM_BUG_ON(). Al analizar los detalles, hugetlb_change_protection() parece no manejar uffd-wp correctamente en todos los casos. El parche n.\u00b0 1 corrige mi caso de prueba. No tengo reproductores para el parche n.\u00b0 2, ya que requiere la ejecuci\u00f3n de entradas de migraci\u00f3n. A\u00fan no he comprobado en detalle si el c\u00f3digo de !hugetlb requiere un cuidado similar. Este parche (de 2): Hay dos casos problem\u00e1ticos al encontrar un marcador PTE en hugetlb_change_protection(): (1) Protegemos un marcador PTE uffd-wp por segunda vez usando uffd-wp: terminaremos en el caso \"!huge_pte_none(pte)\" y da\u00f1aremos el marcador PTE. (2) Desprotegemos un marcador PTE uffd-wp: terminaremos en el caso \"!huge_pte_none(pte)\" aunque hayamos borrado el PTE, porque la variable \"pte\" est\u00e1 obsoleta. Da\u00f1aremos el marcador PTE. Por ejemplo, si posteriormente encontramos un marcador PTE \"modificado incorrectamente\", lo trataremos como un PTE existente que asigna una p\u00e1gina basura. Esto se puede activar, por ejemplo, al mapear un memfd respaldado por p\u00e1ginas grandes, registrar uffd-wp, hacer uffd-wp en una p\u00e1gina no mapeada y (a) hacer uffd-wp una segunda vez; o (b) desprotegerla con uffd; o (c) anular el registro de uffd-wp. Luego, si activamos fallocate(FALLOC_FL_PUNCH_HOLE) en ese rango de archivos, nos encontraremos con un VM_BUG_ON: [ 195.039560] page:00000000ba1f2987 refcount:1 mapcount:0 mapping:000000000000000 index:0x0 pfn:0x0 [ 195.039565] flags: 0x7ffffc0001000(reserved|node=0|zone=0|lastcpupid=0x1fffff) [ 195.039568] raw: 0007ffffc0001000 ffffe742c0000008 ffffe742c0000008 000000000000000 [ 195.039569] raw: 0000000000000000 000000000000000 0000000000000 00000001ffffffff 0000000000000000 [ 195.039569] p\u00e1gina volcada porque: VM_BUG_ON_PAGE(compound && !PageHead(page)) [ 195.039573] ------------[ cortar aqu\u00ed ]------------ [ 195.039574] \u00a1ERROR del kernel en mm/rmap.c:1346! [ 195.039579] C\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI [ 195.039581] CPU: 7 PID: 4777 Comm: qemu-system-x86 No contaminado 6.0.12-200.fc36.x86_64 #1 [ 195.039583] Nombre del hardware: LENOVO 20WNS1F81N/20WNS1F81N, BIOS N35ET50W (1.50) 15/09/2022 [ 195.039584] RIP: 0010:page_remove_rmap+0x45b/0x550 [ 195.039588] C\u00f3digo: [...] [ 195.039589] RSP: 0018:ffffbc03c3633ba8 EFLAGS: 00010292 [ 195.039591] RAX: 0000000000000040 RBX: ffffe742c0000000 RCX: 0000000000000000 [ 195.039592] RDX: 0000000000000002 RSI: ffffffff8e7aac1a RDI: 00000000ffffffff [ 195.039592] RBP: 00000000000000001 R08: 0000000000000000 R09: ffffbc03c3633a08 [ 195.039593] R10: 0000000000000003 R11: ffffffff8f146328 R12: ffff9b04c42754b0 [ 195.039594] R13: ffffffff8fcc6328 R14: ffffbc03c3633c80 R15: ffff9b0484ab9100 [ 195.039595] FS: 00007fc7aaf68640(0000) GS:ffff9b0bbf7c0000(0000) knlGS:0000000000000000 [ 195.039596] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 195.039597] CR2: 000055d402c49110 CR3: 0000000159392003 CR4: 0000000000772ee0 [ 195.039598] PKRU: 55555554 [ 195.039599] Rastreo de llamadas: [ 195.039600] [ 195.039602] __unmap_hugepage_range+0x33b/0x7d0 [ 195.039605] unmap_hugepage_range+0x55/0x70 [ 195.039608] hugetlb_vmdelete_list+0x77/0xa0 [ 195.039611] hugetlbfs_fallocate+0x410/0x550 [ 195.039612] ? _raw_spin_unlock_irqrestore+0x23/0x40 [ 195.039616] vfs_fallocate+0x12e/0x360 [ 195.039618] __x64_sys_fallocate+0x40/0x70 [ 195.039620] hacer_syscall_64+0x58/0x80 [ 195.039623] ? syscall_exit_to_user_mode+0x17/0x40 [ 195.039624] ? do_syscall_64+0x67/0x80 [ 195.039626] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 195.039628] RIP: 0033:0x7fc7b590651f [ 195.039653] C\u00f3digo: [...] [ 195.039654] RSP: 002b:00007fc7aaf66e70 EFLAGS: 00000293 ORIG_RAX: 000000000000011d [ 195.039655] RAX: ffffffffffffffda ---truncado---" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0714.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0714.json index 67a94e06ba0..41f057dfc7c 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0714.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-17T10:15:06.147", "lastModified": "2025-02-28T22:41:29.023", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0788.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0788.json index dc7124a8279..4bdd2264804 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0788.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0788.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0789.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0789.json index 4f7058dce88..ee4ddd2e442 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0789.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0789.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0791.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0791.json index 485e49ceec0..029b6461a1b 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0791.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0791.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0794.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0794.json index c7d634e4775..05980e3989d 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0794.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0794.json @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0881.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0881.json index 59e43458f27..85632e5aedf 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0881.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0881.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Running DDoS on tcp port 22 will trigger a kernel crash. This issue is introduced by the backport of a commit regarding nft_lookup without the subsequent fixes that were introduced after this commit. The resolution of this CVE introduces those commits to the linux-bluefield package." + }, + { + "lang": "es", + "value": "Ejecutar un ataque DDoS en el puerto TCP 22 provocar\u00e1 un fallo del kernel. Este problema se debe a la retroportaci\u00f3n de una confirmaci\u00f3n relacionada con nft_lookup sin las correcciones posteriores. La resoluci\u00f3n de este CVE incorpora dichas confirmaciones al paquete linux-bluefield." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json index ebfee3601ec..22a67cfe4ee 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-06T17:15:12.747", "lastModified": "2024-11-21T07:38:06.130", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json index 4efa8b70a75..c5b079b2800 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-25T08:15:10.297", "lastModified": "2024-11-21T07:38:19.757", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json index 82990fa370c..80ec8ec7b04 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-07-26T07:15:09.103", "lastModified": "2024-11-21T07:39:07.017", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1841.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1841.json index 07ab3f14ad5..a121d01cf7b 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1841.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1841.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22331.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22331.json index abf88adb370..20f4abe6876 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22331.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22331.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22331", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-20T03:15:09.813", - "lastModified": "2024-11-21T07:44:34.737", + "lastModified": "2025-04-03T18:15:42.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22697.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22697.json index d4c11a173c2..97b9371129b 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22697.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22697.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:10.637", "lastModified": "2024-12-13T15:15:10.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json index 464f0de8526..7625a58bcfa 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-08-09T09:15:13.767", "lastModified": "2024-11-21T07:46:27.420", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24163.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24163.json index c4a7a5b80ce..8399a3cbd2e 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24163.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-01-31T16:15:09.270", "lastModified": "2025-03-27T15:15:45.583", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24164.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24164.json index b59a4fd81bd..1d0354ee58e 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24164.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24164.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_000c2318." + }, + { + "lang": "es", + "value": "Tenda AC18 V15.03.05.19 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de /goform/FUN_000c2318." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24468.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24468.json index 70600ff967d..1a55909c079 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24468.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2023-03-15T23:15:09.563", "lastModified": "2025-02-27T15:15:36.287", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json index 336d5c86701..4334cbca1f0 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25833.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25833.json index 55aa607383d..194b07a506e 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25833.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25833.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25834.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25834.json index 25b46736648..8d4e767c0f5 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25834.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25834.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json index edfc1a10c5c..42217031b46 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-09-19T11:16:19.333", "lastModified": "2024-11-21T07:58:50.747", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26083.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26083.json index 185c9a07c64..ff239fa7e8d 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26083.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26083.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26083", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T16:15:07.843", - "lastModified": "2025-04-03T20:07:55.157", + "lastModified": "2025-04-07T13:08:56.533", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,10 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:avalon_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r41p0", "versionEndExcluding": "r43p0", - "matchCriteriaId": "16AC01AB-58F9-4F1F-AC20-9439589365ED" + "matchCriteriaId": "574A1E71-2B1E-48D4-AA93-974B4E34C64F" }, { "vulnerable": true, @@ -94,10 +94,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:arm:midgard:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*", "versionStartIncluding": "r6p0", "versionEndIncluding": "r32p0", - "matchCriteriaId": "BBD1423A-4F6C-4A25-8D64-07AEB3ED4104" + "matchCriteriaId": "ABA04388-28FC-4F87-85F4-B7FD0B553611" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json index 4cd4ada41e4..f7c11dc5fa1 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:13.187", "lastModified": "2024-11-21T07:58:54.840", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28656.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28656.json index e828c924b02..236ff29ea29 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28656.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28656.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2023-05-03T15:15:12.860", "lastModified": "2025-02-13T17:16:16.260", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json index 170ff4e551c..336ceaed1be 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json index 4db82a705ff..65dd01af14f 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json index 9bf6d5418ae..785ecd2cfc8 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:41.850", "lastModified": "2024-11-21T08:16:41.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json index 857daa8f334..d2623ebfe72 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:42.053", "lastModified": "2024-11-21T08:16:42.243", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json index 3a27646b0db..931e5632840 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T13:15:09.397", "lastModified": "2024-11-21T08:16:47.490", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33302.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33302.json index 41d7d576e36..e7919298641 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33302.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33302.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una copia de b\u00fafer sin verificar el tama\u00f1o de entrada (\"desbordamiento de b\u00fafer cl\u00e1sico\") en el correo web FortiMail de Fortinet y la interfaz administrativa versi\u00f3n 6.4.0 a 6.4.4 y anteriores a 6.2.6 y la interfaz administrativa FortiNDR versi\u00f3n 7.2.0 y anteriores a 7.1.0 permite que un atacante autenticado con acceso regular al correo web provoque un desbordamiento de b\u00fafer y posiblemente ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP espec\u00edficamente manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json index cd0f9068cee..e010bad87a6 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Governance 10.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Security Verify Governance 10.0.2 es vulnerable a ataques de cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json index f38f936ffa6..a5ce11a8da2 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-07-13T03:15:10.413", "lastModified": "2024-11-21T08:17:16.947", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json index 724631846e6..bd974afa17c 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:53.813", "lastModified": "2024-12-04T21:15:19.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36479.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36479.json index 412df2d4be1..b6d7d18f2b5 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36479.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36479.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-15T19:15:08.387", "lastModified": "2025-02-13T17:16:42.313", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36505.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36505.json index 44079929be6..474a22551a2 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36505.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-17T09:15:07.540", "lastModified": "2024-11-21T08:09:50.763", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37405.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37405.json index b07ebba298d..f515dcfee8b 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37405.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37405.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cloud Pak System 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, and 2.3.4.1 stores sensitive data in memory, that could be obtained by an unauthorized user." + }, + { + "lang": "es", + "value": "IBM Cloud Pak System 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0 y 2.3.4.1 almacenan datos confidenciales en la memoria que un usuario no autorizado podr\u00eda obtener." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json index 0dd959b3616..cc282abae21 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests." + }, + { + "lang": "es", + "value": "Varios problemas, incluido el uso de recursos no inicializados [CWE-908] y las vulnerabilidades de iteraci\u00f3n excesiva [CWE-834] en Fortinet FortiOS SSL VPN webmode versi\u00f3n 7.4.0, versi\u00f3n 7.2.0 a 7.2.5, versi\u00f3n 7.0.1 a 7.0.11 y versi\u00f3n 6.4.7 a 6.4.14 y Fortinet FortiProxy SSL VPN webmode versi\u00f3n 7.2.0 a 7.2.6 y versi\u00f3n 7.0.0 a 7.0.12 permiten que un usuario de VPN corrompa la memoria, lo que potencialmente lleva a la ejecuci\u00f3n de c\u00f3digo o comandos a trav\u00e9s de solicitudes espec\u00edficamente manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38272.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38272.json index b68b812f2a9..9b7940207a7 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38272.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38272.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cloud Pak System 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, and 2.3.4.1 \n\ncould allow a user with access to the network to obtain sensitive information from CLI arguments." + }, + { + "lang": "es", + "value": "IBM Cloud Pak System 2.3.3.0, 2.3.3.3, 2.3.3.3 iFix1, 2.3.3.4, 2.3.3.5, 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0 y 2.3.4.1 podr\u00edan permitir que un usuario con acceso a la red obtenga informaci\u00f3n confidencial de los argumentos de la CLI." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json index 8ee11aec84c..92736f2930d 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T03:15:06.077", "lastModified": "2025-03-04T14:14:47.390", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json index 7aeaa6d8566..dd205a3567c 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json index 7b53a43e86b..bebfc190c57 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.233", "lastModified": "2024-11-21T08:18:19.783", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json index 01a8576c71e..9fe4b4ec39f 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-12-17T23:15:43.937", "lastModified": "2024-11-21T08:18:19.927", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json index 76823207329..00b74bbec54 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3909.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T13:15:09.653", "lastModified": "2024-11-21T08:18:20.067", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json index 19899e97e2a..42d77930539 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.777", "lastModified": "2024-11-21T08:18:20.660", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json index b6a3fe1bfc7..a09ae693c81 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40275.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.743", "lastModified": "2024-11-21T08:19:06.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40276.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40276.json index 6f304e3fc92..b63fd7b3dcb 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40276.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40276.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.807", "lastModified": "2024-11-21T08:19:06.680", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json index cfe2dfcaf12..6d9d9a0cbc0 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.850", "lastModified": "2024-11-21T08:19:06.903", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json index f6e0383cf2c..5e12856e2ed 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T12:15:07.473", "lastModified": "2024-11-21T08:19:07.123", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json index fb8f5227e46..be14ab97726 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T13:15:06.837", "lastModified": "2024-11-21T08:19:07.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40280.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40280.json index df89a40b98e..c1f379a14ca 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40280.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T01:15:44.900", "lastModified": "2024-11-21T08:19:07.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json index ceddfb93229..9f3c675eed9 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T03:15:09.257", "lastModified": "2024-11-21T08:19:08.070", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40492.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40492.json index 903953dee80..620b5be78d5 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40492.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40492.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:22.933", "lastModified": "2024-11-21T08:19:35.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40714.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40714.json index 30f9de463a1..4bee98099b8 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40714.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40714.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements" + }, + { + "lang": "es", + "value": "Un Path Traversal relativo en las versiones 7.0.0, 6.7.0 a 6.7.2, 6.6.0 a 6.6.3, 6.5.1 y 6.5.0 de Fortinet FortiSIEM permite a un atacante escalar privilegios mediante la carga de ciertos elementos de la GUI." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json index 057524af39c..64889a65acb 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:15:59.170", "lastModified": "2025-04-10T19:54:31.843", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json index c40bd1e2d1b..72af8385919 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41747.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@acronis.com", "published": "2023-08-31T18:15:09.523", "lastModified": "2024-11-21T08:21:36.947", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json index 17ca33a8041..3f209892ca5 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T17:15:10.840", "lastModified": "2024-11-21T08:22:24.217", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43029.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43029.json index 5bf7ff25404..76b0bc496b0 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43029.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43029.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-21T16:15:17.240", "lastModified": "2025-03-21T16:15:17.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Storage Virtualize vSphere Remote Plug-in 1.0 and 1.1 could allow a remote user to obtain sensitive credential information after deployment." + }, + { + "lang": "es", + "value": "IBM Storage Virtualize vSphere Remote Plug-in 1.0 y 1.1 podr\u00eda permitir que un usuario remoto obtenga informaci\u00f3n confidencial de credenciales despu\u00e9s de la implementaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43655.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43655.json index 199833578e3..986fbfc1974 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43655.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43655.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-29T20:15:09.987", "lastModified": "2025-02-13T17:17:13.327", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43892.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43892.json index 928c8c05ef2..5f9941472ad 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43892.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43892.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43892", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-02T22:15:10.137", - "lastModified": "2024-11-21T08:24:58.230", + "lastModified": "2025-04-04T21:15:42.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json index 5a7ff332d3b..4bf1b04ea93 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json index daf52dd7eda..a7099e3b77e 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45503.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T20:15:10.777", "lastModified": "2024-11-21T08:26:56.140", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json index 6ef402cbc9e..60d711ad3ee 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.913", "lastModified": "2025-03-03T22:34:02.150", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json index 815d439ea27..cd346489303 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json index f4ff039923a..211652b4ded 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.613", "lastModified": "2025-03-03T22:40:37.263", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json index 4d82e997b48..4183ee81951 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2023-10-23T07:15:11.330", "lastModified": "2024-11-21T08:27:23.030", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json index e912ab46353..33de4a8cdec 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-10-15T01:15:09.027", "lastModified": "2024-11-21T08:27:31.720", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json index 473a83f1390..3ac0c9c2763 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-10-16T03:15:09.320", "lastModified": "2024-11-21T08:27:35.133", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46988.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46988.json index bccf0749b6a..43774b0a9a9 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46988.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46988.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46988", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T22:15:20.023", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T21:15:42.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Directory Traversal en ONLYOFFICE Document Server v.7.5.0 y anteriores permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de una carga de archivo manipulado espec\u00edficamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://medium.com/@mihat2/onlyoffice-document-server-path-traversal-fdd573fec291", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json index d7f8c7e5e23..0249312ebd4 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4647.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-01T11:15:43.363", "lastModified": "2024-11-21T08:35:36.480", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47786.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47786.json index e8d47a7c46c..80093a63b06 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47786.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47786.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47786", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-22T22:15:08.313", - "lastModified": "2024-11-21T08:30:48.447", + "lastModified": "2025-03-17T17:03:45.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:layerslider:layerslider:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:kreaturamedia:layerslider:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "7.7.9", - "matchCriteriaId": "8996B130-3C8F-4333-AFC1-165A1FEC4A27" + "matchCriteriaId": "E86DF8DF-1618-430E-9B66-627A124FDC04" } ] } diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json index 55c0c88642c..227cf1d7c12 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json index b8549011fb9..929722ec6f7 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json index e26ce4cd73a..ebfd0706db1 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:13.873", "lastModified": "2024-11-21T08:31:28.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49109.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49109.json index 0647d5f5e9c..706d4c01bd8 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49109.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49109.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49250.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49250.json index b121ea0d5d0..76f29581cad 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49250.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49250.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49539.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49539.json index 4212f16d34f..2bf37135345 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49539.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.540", "lastModified": "2024-11-21T08:33:30.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49540.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49540.json index f4efbe7b9cd..44fef5b640d 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49540.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.600", "lastModified": "2024-11-21T08:33:30.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49988.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49988.json index b47ef106c2a..f25ef9839ab 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49988.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49988.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.027", "lastModified": "2024-11-21T08:34:10.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json index 4384ef33a48..0b3d504c66c 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.083", "lastModified": "2024-11-21T08:34:10.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50270.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50270.json index fe6f68efc9a..8b2115d40ed 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50270.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50270.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json index 4f663e8b0fb..0eac98a1e34 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T03:15:06.620", "lastModified": "2025-02-26T16:43:48.660", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json index c3a12b6a112..1e2a4ba1452 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T02:15:07.823", "lastModified": "2025-03-04T14:14:12.020", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json index 991118acab8..78d4a8af9c6 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "La falta de limitaci\u00f3n de velocidad en the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de correos electr\u00f3nicos a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." + "value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Email Settings' de PHPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de correos electr\u00f3nicos a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json index 83e41ff6db6..bfda570e1cc 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:42:05.677", "lastModified": "2024-11-21T08:38:47.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json index 58d498881b7..1ac8a80b2cf 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T17:15:08.263", "lastModified": "2024-11-21T08:39:18.380", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52640.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52640.json index 2c9b3951d27..4693651e668 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52640.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52640.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json index f6b39cde5e9..a5de6144e82 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json index 099f8024171..cd7f8b30a85 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json index e7a2d543e66..551394359a5 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52745.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52745.json index 738c8c403a6..7f832e6ba85 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52745.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52745.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52794.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52794.json index dc7c95302a0..f124f0ca14c 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52794.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52794.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52799.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52799.json index 3ce4e69ba2b..5959d1d0622 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52799.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52799.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52805.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52805.json index dc8177ddd31..1ae6ec0970d 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52805.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52805.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52807.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52807.json index 26b22cf51eb..f8d3779ab88 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52807.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52807.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json index f437eb033fc..f8f39181624 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json index c31c2d58d49..265e8e77542 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json index f115b574375..9189d5a1f50 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-05T10:15:21.963", "lastModified": "2025-02-06T16:15:37.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52928.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52928.json index e1969169403..db6cfd7a4a5 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52928.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52928.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Skip invalid kfunc call in backtrack_insn\n\nThe verifier skips invalid kfunc call in check_kfunc_call(), which\nwould be captured in fixup_kfunc_call() if such insn is not eliminated\nby dead code elimination. However, this can lead to the following\nwarning in backtrack_insn(), also see [1]:\n\n ------------[ cut here ]------------\n verifier backtracking bug\n WARNING: CPU: 6 PID: 8646 at kernel/bpf/verifier.c:2756 backtrack_insn\n kernel/bpf/verifier.c:2756\n\t__mark_chain_precision kernel/bpf/verifier.c:3065\n\tmark_chain_precision kernel/bpf/verifier.c:3165\n\tadjust_reg_min_max_vals kernel/bpf/verifier.c:10715\n\tcheck_alu_op kernel/bpf/verifier.c:10928\n\tdo_check kernel/bpf/verifier.c:13821 [inline]\n\tdo_check_common kernel/bpf/verifier.c:16289\n [...]\n\nSo make backtracking conservative with this by returning ENOTSUPP.\n\n [1] https://lore.kernel.org/bpf/CACkBjsaXNceR8ZjkLG=dT3P=4A8SBsg0Z5h5PWLryF5=ghKq=g@mail.gmail.com/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Omite llamada kfunc no v\u00e1lida en backtrack_insn El verificador omite llamada kfunc no v\u00e1lida en check_kfunc_call(), que se capturar\u00eda en fixup_kfunc_call() si dicha insn no se elimina mediante la eliminaci\u00f3n de c\u00f3digo muerto. Sin embargo, esto puede generar la siguiente advertencia en backtrack_insn(), vea tambi\u00e9n [1]: ------------[ cortar aqu\u00ed ]------------ error de retroceso del verificador ADVERTENCIA: CPU: 6 PID: 8646 en kernel/bpf/verifier.c:2756 backtrack_insn kernel/bpf/verifier.c:2756 __mark_chain_precision kernel/bpf/verifier.c:3065 mark_chain_precision kernel/bpf/verifier.c:3165 adjust_reg_min_max_vals kernel/bpf/verifier.c:10715 check_alu_op kernel/bpf/verifier.c:10928 do_check kernel/bpf/verifier.c:13821 [en l\u00ednea] do_check_common kernel/bpf/verifier.c:16289 [...] As\u00ed que haga que el retroceso sea conservador con esto devolviendo ENOTSUPP. [1] https://lore.kernel.org/bpf/CACkBjsaXNceR8ZjkLG=dT3P=4A8SBsg0Z5h5PWLryF5=ghKq=g@mail.gmail.com/" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52929.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52929.json index 82aa300795b..63e8a77a57a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52929.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52929.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: core: fix cleanup after dev_set_name()\n\nIf dev_set_name() fails, we leak nvmem->wp_gpio as the cleanup does not\nput this. While a minimal fix for this would be to add the gpiod_put()\ncall, we can do better if we split device_register(), and use the\ntested nvmem_release() cleanup code by initialising the device early,\nand putting the device.\n\nThis results in a slightly larger fix, but results in clear code.\n\nNote: this patch depends on \"nvmem: core: initialise nvmem->id early\"\nand \"nvmem: core: remove nvmem_config wp_gpio\".\n\n[Srini: Fixed subject line and error code handing with wp_gpio while applying.]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmem: core: fix cleanup after dev_set_name(). Si dev_set_name() falla, se filtra nvmem->wp_gpio, ya que la limpieza no lo incluye. Si bien una soluci\u00f3n m\u00ednima ser\u00eda a\u00f1adir la llamada gpiod_put(), podemos mejorar si dividimos device_register() y usamos el c\u00f3digo de limpieza nvmem_release() probado, inicializando el dispositivo antes y coloc\u00e1ndolo. Esto resulta en una correcci\u00f3n ligeramente mayor, pero con c\u00f3digo limpio. Nota: Este parche depende de \"nvmem: core: initialise nvmem->id early\" y \"nvmem: core: remove nvmem_config wp_gpio\". [Srini: Se corrigi\u00f3 la l\u00ednea de asunto y la gesti\u00f3n del c\u00f3digo de error con wp_gpio durante la aplicaci\u00f3n]." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52930.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52930.json index 6fb0dea09b2..7daed6c86d0 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52930.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix potential bit_17 double-free\n\nA userspace with multiple threads racing I915_GEM_SET_TILING to set the\ntiling to I915_TILING_NONE could trigger a double free of the bit_17\nbitmask. (Or conversely leak memory on the transition to tiled.) Move\nallocation/free'ing of the bitmask within the section protected by the\nobj lock.\n\n[tursulin: Correct fixes tag and added cc stable.]\n(cherry picked from commit 10e0cbaaf1104f449d695c80bcacf930dcd3c42e)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915: Se corrige la posible doble liberaci\u00f3n de bit_17. Un espacio de usuario con varios subprocesos que compiten con I915_GEM_SET_TILING para establecer el mosaico en I915_TILING_NONE podr\u00eda provocar una doble liberaci\u00f3n de la m\u00e1scara de bits bit_17. (O, por el contrario, una fuga de memoria al cambiar a mosaico). Se ha trasladado la asignaci\u00f3n/liberaci\u00f3n de la m\u00e1scara de bits dentro de la secci\u00f3n protegida por el bloqueo obj. [tursulin: Se corrige la etiqueta de correcciones y se ha a\u00f1adido la versi\u00f3n estable de cc.] (Seleccionado del commit 10e0cbaaf1104f449d695c80bcacf930dcd3c42e)" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52932.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52932.json index 58fcb426cd6..69342acdaec 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52932.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52932.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/swapfile: add cond_resched() in get_swap_pages()\n\nThe softlockup still occurs in get_swap_pages() under memory pressure. 64\nCPU cores, 64GB memory, and 28 zram devices, the disksize of each zram\ndevice is 50MB with same priority as si. Use the stress-ng tool to\nincrease memory pressure, causing the system to oom frequently.\n\nThe plist_for_each_entry_safe() loops in get_swap_pages() could reach tens\nof thousands of times to find available space (extreme case:\ncond_resched() is not called in scan_swap_map_slots()). Let's add\ncond_resched() into get_swap_pages() when failed to find available space\nto avoid softlockup." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/swapfile: a\u00f1adir cond_resched() en get_swap_pages() El bloqueo suave todav\u00eda ocurre en get_swap_pages() bajo presi\u00f3n de memoria. 64 n\u00facleos de CPU, 64 GB de memoria y 28 dispositivos zram, el tama\u00f1o del disco de cada dispositivo zram es de 50 MB con la misma prioridad que si. Utilice la herramienta stress-ng para aumentar la presi\u00f3n de memoria, lo que hace que el sistema se sobrecargue con frecuencia. Los bucles plist_for_each_entry_safe() en get_swap_pages() podr\u00edan alcanzar decenas de miles de veces para encontrar espacio disponible (caso extremo: cond_resched() no se llama en scan_swap_map_slots()). Agreguemos cond_resched() a get_swap_pages() cuando no se pueda encontrar espacio disponible para evitar el bloqueo suave." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52933.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52933.json index 0c5bb2b0fce..98af8d67ddf 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52933.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix handling and sanity checking of xattr_ids count\n\nA Sysbot [1] corrupted filesystem exposes two flaws in the handling and\nsanity checking of the xattr_ids count in the filesystem. Both of these\nflaws cause computation overflow due to incorrect typing.\n\nIn the corrupted filesystem the xattr_ids value is 4294967071, which\nstored in a signed variable becomes the negative number -225.\n\nFlaw 1 (64-bit systems only):\n\nThe signed integer xattr_ids variable causes sign extension.\n\nThis causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The\nvariable is first multiplied by sizeof(struct squashfs_xattr_id) where the\ntype of the sizeof operator is \"unsigned long\".\n\nOn a 64-bit system this is 64-bits in size, and causes the negative number\nto be sign extended and widened to 64-bits and then become unsigned. This\nproduces the very large number 18446744073709548016 or 2^64 - 3600. This\nnumber when rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and\ndivided by SQUASHFS_METADATA_SIZE overflows and produces a length of 0\n(stored in len).\n\nFlaw 2 (32-bit systems only):\n\nOn a 32-bit system the integer variable is not widened by the unsigned\nlong type of the sizeof operator (32-bits), and the signedness of the\nvariable has no effect due it always being treated as unsigned.\n\nThe above corrupted xattr_ids value of 4294967071, when multiplied\noverflows and produces the number 4294963696 or 2^32 - 3400. This number\nwhen rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and divided by\nSQUASHFS_METADATA_SIZE overflows again and produces a length of 0.\n\nThe effect of the 0 length computation:\n\nIn conjunction with the corrupted xattr_ids field, the filesystem also has\na corrupted xattr_table_start value, where it matches the end of\nfilesystem value of 850.\n\nThis causes the following sanity check code to fail because the\nincorrectly computed len of 0 matches the incorrect size of the table\nreported by the superblock (0 bytes).\n\n len = SQUASHFS_XATTR_BLOCK_BYTES(*xattr_ids);\n indexes = SQUASHFS_XATTR_BLOCKS(*xattr_ids);\n\n /*\n * The computed size of the index table (len bytes) should exactly\n * match the table start and end points\n */\n start = table_start + sizeof(*id_table);\n end = msblk->bytes_used;\n\n if (len != (end - start))\n return ERR_PTR(-EINVAL);\n\nChanging the xattr_ids variable to be \"usigned int\" fixes the flaw on a\n64-bit system. This relies on the fact the computation is widened by the\nunsigned long type of the sizeof operator.\n\nCasting the variable to u64 in the above macro fixes this flaw on a 32-bit\nsystem.\n\nIt also means 64-bit systems do not implicitly rely on the type of the\nsizeof operator to widen the computation.\n\n[1] https://lore.kernel.org/lkml/000000000000cd44f005f1a0f17f@google.com/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Squashfs: correcci\u00f3n de la gesti\u00f3n y la comprobaci\u00f3n de la validez del recuento de xattr_ids. Un sistema de archivos da\u00f1ado por un bot de sistema [1] expone dos fallos en el manejo y la comprobaci\u00f3n de la validez del recuento de xattr_ids. Ambos fallos provocan un desbordamiento de c\u00e1lculo debido a una escritura incorrecta. En el sistema de archivos da\u00f1ado, el valor de xattr_ids es 4294967071, que, almacenado en una variable con signo, se convierte en el n\u00famero negativo -225. Fallo 1 (solo sistemas de 64 bits): La variable xattr_ids, un entero con signo, provoca la extensi\u00f3n del signo. Esto provoca un desbordamiento de variable en las macros SQUASHFS_XATTR_*(A). La variable se multiplica primero por sizeof(struct squashfs_xattr_id), donde el tipo del operador sizeof es \"unsigned long\". En un sistema de 64 bits, este valor tiene un tama\u00f1o de 64 bits y provoca que el n\u00famero negativo se ampl\u00ede con signo y se ensanche a 64 bits, quedando as\u00ed sin signo. Esto produce el gran n\u00famero 18446744073709548016 o 2^64 - 3600. Este n\u00famero, al redondearse por SQUASHFS_METADATA_SIZE - 1 (8191 bytes) y dividirse por SQUASHFS_METADATA_SIZE, se desborda y produce una longitud de 0 (almacenada en len). Fallo 2 (solo en sistemas de 32 bits): En un sistema de 32 bits, la variable entera no se ampl\u00eda con el tipo \"long sin signo\" del operador sizeof (32 bits), y el signo de la variable no tiene efecto, ya que siempre se trata como sin signo. El valor xattr_ids da\u00f1ado anterior de 4294967071, cuando se multiplica se desborda y produce el n\u00famero 4294963696 o 2^32 - 3400. Este n\u00famero cuando se redondea por SQUASHFS_METADATA_SIZE - 1 (8191 bytes) y se divide por SQUASHFS_METADATA_SIZE se desborda nuevamente y produce una longitud de 0. El efecto del c\u00e1lculo de la longitud 0: junto con el campo xattr_ids da\u00f1ado, el sistema de archivos tambi\u00e9n tiene un valor xattr_table_start da\u00f1ado, donde coincide con el valor de fin del sistema de archivos de 850. Esto hace que el siguiente c\u00f3digo de verificaci\u00f3n de cordura falle porque el len incorrectamente calculado de 0 coincide con el tama\u00f1o incorrecto de la tabla informada por el superbloque (0 bytes). len = SQUASHFS_XATTR_BLOCK_BYTES(*xattr_ids); \u00edndices = SQUASHFS_XATTR_BLOCKS(*xattr_ids); /* * El tama\u00f1o calculado de la tabla de \u00edndices (len bytes) debe coincidir exactamente con los puntos de inicio y fin de la tabla. */ inicio = tabla_inicio + tama\u00f1o_de(*id_tabla); fin = msblk->bytes_usados; si (len != (fin - inicio)) devolver ERR_PTR(-EINVAL); Cambiar la variable xattr_ids a \"usigned int\" corrige el fallo en sistemas de 64 bits. Esto se debe a que el c\u00e1lculo se ampl\u00eda con el tipo \"unsigned long\" del operador \"sizeof\". Convertir la variable a \"u64\" en la macro anterior corrige este fallo en sistemas de 32 bits. Esto tambi\u00e9n significa que los sistemas de 64 bits no dependen impl\u00edcitamente del tipo del operador \"sizeof\" para ampliar el c\u00e1lculo. [1] https://lore.kernel.org/lkml/000000000000cd44f005f1a0f17f@google.com/" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52934.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52934.json index 5a9d7e957f7..aa7dba51f95 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52934.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52934.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups\n\nIn commit 34488399fa08 (\"mm/madvise: add file and shmem support to\nMADV_COLLAPSE\") we make the following change to find_pmd_or_thp_or_none():\n\n\t- if (!pmd_present(pmde))\n\t- return SCAN_PMD_NULL;\n\t+ if (pmd_none(pmde))\n\t+ return SCAN_PMD_NONE;\n\nThis was for-use by MADV_COLLAPSE file/shmem codepaths, where\nMADV_COLLAPSE might identify a pte-mapped hugepage, only to have\nkhugepaged race-in, free the pte table, and clear the pmd. Such codepaths\ninclude:\n\nA) If we find a suitably-aligned compound page of order HPAGE_PMD_ORDER\n already in the pagecache.\nB) In retract_page_tables(), if we fail to grab mmap_lock for the target\n mm/address.\n\nIn these cases, collapse_pte_mapped_thp() really does expect a none (not\njust !present) pmd, and we want to suitably identify that case separate\nfrom the case where no pmd is found, or it's a bad-pmd (of course, many\nthings could happen once we drop mmap_lock, and the pmd could plausibly\nundergo multiple transitions due to intervening fault, split, etc). \nRegardless, the code is prepared install a huge-pmd only when the existing\npmd entry is either a genuine pte-table-mapping-pmd, or the none-pmd.\n\nHowever, the commit introduces a logical hole; namely, that we've allowed\n!none- && !huge- && !bad-pmds to be classified as genuine\npte-table-mapping-pmds. One such example that could leak through are swap\nentries. The pmd values aren't checked again before use in\npte_offset_map_lock(), which is expecting nothing less than a genuine\npte-table-mapping-pmd.\n\nWe want to put back the !pmd_present() check (below the pmd_none() check),\nbut need to be careful to deal with subtleties in pmd transitions and\ntreatments by various arch.\n\nThe issue is that __split_huge_pmd_locked() temporarily clears the present\nbit (or otherwise marks the entry as invalid), but pmd_present() and\npmd_trans_huge() still need to return true while the pmd is in this\ntransitory state. For example, x86's pmd_present() also checks the\n_PAGE_PSE , riscv's version also checks the _PAGE_LEAF bit, and arm64 also\nchecks a PMD_PRESENT_INVALID bit.\n\nCovering all 4 cases for x86 (all checks done on the same pmd value):\n\n1) pmd_present() && pmd_trans_huge()\n All we actually know here is that the PSE bit is set. Either:\n a) We aren't racing with __split_huge_page(), and PRESENT or PROTNONE\n is set.\n => huge-pmd\n b) We are currently racing with __split_huge_page(). The danger here\n is that we proceed as-if we have a huge-pmd, but really we are\n looking at a pte-mapping-pmd. So, what is the risk of this\n danger?\n\n The only relevant path is:\n\n\tmadvise_collapse() -> collapse_pte_mapped_thp()\n\n Where we might just incorrectly report back \"success\", when really\n the memory isn't pmd-backed. This is fine, since split could\n happen immediately after (actually) successful madvise_collapse().\n So, it should be safe to just assume huge-pmd here.\n\n2) pmd_present() && !pmd_trans_huge()\n Either:\n a) PSE not set and either PRESENT or PROTNONE is.\n => pte-table-mapping pmd (or PROT_NONE)\n b) devmap. This routine can be called immediately after\n unlocking/locking mmap_lock -- or called with no locks held (see\n khugepaged_scan_mm_slot()), so previous VMA checks have since been\n invalidated.\n\n3) !pmd_present() && pmd_trans_huge()\n Not possible.\n\n4) !pmd_present() && !pmd_trans_huge()\n Neither PRESENT nor PROTNONE set\n => not present\n\nI've checked all archs that implement pmd_trans_huge() (arm64, riscv,\npowerpc, longarch, x86, mips, s390) and this logic roughly translates\n(though devmap treatment is unique to x86 and powerpc, and (3) doesn't\nnecessarily hold in general -- but that doesn't matter since\n!pmd_present() always takes failure path).\n\nAlso, add a comment above find_pmd_or_thp_or_none()\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups En el commit 34488399fa08 (\"mm/madvise: agregar soporte de archivo y shmem a MADV_COLLAPSE\") realizamos el siguiente cambio en find_pmd_or_thp_or_none(): - if (!pmd_present(pmde)) - return SCAN_PMD_NULL; + if (pmd_none(pmde)) + return SCAN_PMD_NONE; Esto era para uso de las rutas de c\u00f3digo de archivo/shmem MADV_COLLAPSE, donde MADV_COLLAPSE podr\u00eda identificar una hugepage asignada a pte, solo para que khugepaged entrara en carrera, liberara la tabla pte y borrara el pmd. Tales rutas de c\u00f3digo incluyen: A) Si encontramos una p\u00e1gina compuesta adecuadamente alineada de orden HPAGE_PMD_ORDER ya en el pagecache. B) En retract_page_tables(), si no logramos obtener mmap_lock para el mm/direcci\u00f3n objetivo. En estos casos, collapse_pte_mapped_thp() realmente espera un pmd none (no solo !present), y queremos identificar adecuadamente ese caso separado del caso donde no se encuentra ning\u00fan pmd, o es un bad-pmd (por supuesto, muchas cosas podr\u00edan suceder una vez que eliminamos mmap_lock, y el pmd podr\u00eda plausiblemente sufrir m\u00faltiples transiciones debido a la intervenci\u00f3n de un fallo, divisi\u00f3n, etc.). En cualquier caso, el c\u00f3digo est\u00e1 preparado para instalar un huge-pmd solo cuando la entrada pmd existente es un pte-table-mapping-pmd genuino, o el none-pmd. Sin embargo, la confirmaci\u00f3n introduce un agujero l\u00f3gico; Es decir, hemos permitido que los !none- && !huge- && !bad-pmds se clasifiquen como pte-table-mapping-pmds genuinos. Un ejemplo de fugas de informaci\u00f3n son las entradas de intercambio. Los valores de pmd no se comprueban de nuevo antes de su uso en pte_offset_map_lock(), que espera nada menos que un pte-table-mapping-pmd genuino. Queremos restablecer la comprobaci\u00f3n de !pmd_present() (debajo de la comprobaci\u00f3n de pmd_none()), pero debemos tener cuidado con las sutilezas en las transiciones y los tratamientos de pmd por parte de varias arquitecturas. El problema es que __split_huge_pmd_locked() borra temporalmente el bit presente (o marca la entrada como inv\u00e1lida), pero pmd_present() y pmd_trans_huge() a\u00fan deben devolver verdadero mientras el pmd est\u00e9 en este estado transitorio. Por ejemplo, pmd_present() de x86 tambi\u00e9n verifica _PAGE_PSE, la versi\u00f3n de riscv tambi\u00e9n verifica el bit _PAGE_LEAF y arm64 tambi\u00e9n verifica el bit PMD_PRESENT_INVALID. Cubriendo los 4 casos para x86 (todas las verificaciones realizadas en el mismo valor pmd): 1) pmd_present() y pmd_trans_huge(). Lo \u00fanico que sabemos es que el bit PSE est\u00e1 establecido. O bien: a) No estamos compitiendo con __split_huge_page(), y PRESENT o PROTNONE est\u00e1n establecidos. => huge-pmd. b) Actualmente estamos compitiendo con __split_huge_page(). El peligro aqu\u00ed es que procedamos como si tuvi\u00e9ramos un huge-pmd, pero en realidad estamos viendo un pte-mapping-pmd. Entonces, \u00bfcu\u00e1l es el riesgo de este peligro? La \u00fanica ruta relevante es: madvise_collapse() -> colapso_pte_mapped_thp(). Donde podr\u00edamos informar incorrectamente de \"\u00e9xito\", cuando en realidad la memoria no est\u00e1 respaldada por pmd. Esto no tiene problema, ya que la divisi\u00f3n podr\u00eda ocurrir inmediatamente despu\u00e9s de una ejecuci\u00f3n (realmente) exitosa de madvise_collapse(). Por lo tanto, se puede asumir con seguridad que es huge-pmd. 2) pmd_present() && !pmd_trans_huge(): a) PSE no definido y PRESENT o PROTNONE s\u00ed lo est\u00e1n. => pte-table-mapping pmd (o PROT_NONE). b) devmap. Esta rutina puede llamarse inmediatamente despu\u00e9s de desbloquear/bloquear mmap_lock, o sin bloqueos (v\u00e9ase khugepaged_scan_mm_slot()), por lo que las comprobaciones VMA anteriores han sido invalidadas. 3) !pmd_present() && pmd_trans_huge(): No es posible. 4) !pmd_present() && !pmd_trans_huge() Ni PRESENT ni PROTNONE se establecen => no presente. He revisado todas las arquitecturas que implementan pmd_trans_huge() (arm64, riscv, powerpc, longarch, x86, mips, s390) y esta l\u00f3gica se traduce aproximadamente ---truncated---" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52936.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52936.json index 9c1683f4aa0..3ae658bd021 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52936.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52936.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time. To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kernel/irq/irqdomain.c: se corrige la p\u00e9rdida de memoria mediante el uso de debugfs_lookup(). Al llamar a debugfs_lookup(), se debe ejecutar dput() en el resultado; de lo contrario, la p\u00e9rdida de memoria se producir\u00e1 con el tiempo. Para simplificar, simplemente llame a debugfs_lookup_and_remove(), que gestiona toda la l\u00f3gica a la vez." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52937.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52937.json index 5a5d43998c7..abb8797f7e6 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52937.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52937.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHV: hv_balloon: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time. To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HV: hv_balloon: se corrige una fuga de memoria con debugfs_lookup(). Al llamar a debugfs_lookup(), se debe ejecutar dput() en el resultado; de lo contrario, la fuga de memoria se producir\u00e1 con el tiempo. Para simplificar, simplemente llame a debugfs_lookup_and_remove(), que gestiona toda la l\u00f3gica a la vez." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52938.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52938.json index 95547ca4af4..9a1a6f502a4 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52938.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Don't attempt to resume the ports before they exist\n\nThis will fix null pointer dereference that was caused by\nthe driver attempting to resume ports that were not yet\nregistered." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: No intente reanudar los puertos antes de que existan. Esto solucionar\u00e1 la desreferencia de puntero nulo que fue causada por el controlador que intentaba reanudar puertos que a\u00fan no estaban registrados." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52939.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52939.json index 45240ed62b3..f550baf6062 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52939.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52939.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath()\n\nAs commit 18365225f044 (\"hwpoison, memcg: forcibly uncharge LRU pages\"),\nhwpoison will forcibly uncharg a LRU hwpoisoned page, the folio_memcg\ncould be NULl, then, mem_cgroup_track_foreign_dirty_slowpath() could\noccurs a NULL pointer dereference, let's do not record the foreign\nwritebacks for folio memcg is null in mem_cgroup_track_foreign_dirty() to\nfix it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: memcg: corregir puntero NULL en mem_cgroup_track_foreign_dirty_slowpath() Como confirmaci\u00f3n 18365225f044 (\"hwpoison, memcg: descargar a la fuerza p\u00e1ginas LRU\"), hwpoison descargar\u00e1 a la fuerza una p\u00e1gina LRU hwpoisoned, folio_memcg podr\u00eda ser NUL, luego, mem_cgroup_track_foreign_dirty_slowpath() podr\u00eda producir una desreferencia de puntero NULL, no registremos las reescrituras externas para folio memcg es nulo en mem_cgroup_track_foreign_dirty() para solucionarlo." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52940.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52940.json index 31df980ecdc..d8e796355fd 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52940.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52940.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: multi-gen LRU: fix crash during cgroup migration\n\nlru_gen_migrate_mm() assumes lru_gen_add_mm() runs prior to itself. This\nisn't true for the following scenario:\n\n CPU 1 CPU 2\n\n clone()\n cgroup_can_fork()\n cgroup_procs_write()\n cgroup_post_fork()\n task_lock()\n lru_gen_migrate_mm()\n task_unlock()\n task_lock()\n lru_gen_add_mm()\n task_unlock()\n\nAnd when the above happens, kernel crashes because of linked list\ncorruption (mm_struct->lru_gen.list)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: LRU multigeneraci\u00f3n: se corrige un fallo durante la migraci\u00f3n de cgroup. lru_gen_migrate_mm() asume que lru_gen_add_mm() se ejecuta antes que \u00e9l mismo. Esto no se cumple en el siguiente escenario: CPU 1 CPU 2 clone() cgroup_can_fork() cgroup_procs_write() cgroup_post_fork() task_lock() lru_gen_migrate_mm() task_unlock() task_lock() lru_gen_add_mm() task_unlock(). Cuando esto ocurre, el kernel se bloquea debido a la corrupci\u00f3n de la lista enlazada (mm_struct->lru_gen.list)." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52941.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52941.json index 11a53b0871e..7f442354ce4 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52941.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52941.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: isotp: split tx timer into transmission and timeout\n\nThe timer for the transmission of isotp PDUs formerly had two functions:\n1. send two consecutive frames with a given time gap\n2. monitor the timeouts for flow control frames and the echo frames\n\nThis led to larger txstate checks and potentially to a problem discovered\nby syzbot which enabled the panic_on_warn feature while testing.\n\nThe former 'txtimer' function is split into 'txfrtimer' and 'txtimer'\nto handle the two above functionalities with separate timer callbacks.\n\nThe two simplified timers now run in one-shot mode and make the state\ntransitions (especially with isotp_rcv_echo) better understandable." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: isotp: dividir el temporizador de transmisi\u00f3n en transmisi\u00f3n y tiempo de espera El temporizador para la transmisi\u00f3n de PDU isotp anteriormente ten\u00eda dos funciones: 1. enviar dos tramas consecutivas con un intervalo de tiempo determinado 2. supervisar los tiempos de espera para las tramas de control de flujo y las tramas de eco Esto llev\u00f3 a comprobaciones de txstate m\u00e1s grandes y potencialmente a un problema descubierto por syzbot que habilit\u00f3 la caracter\u00edstica panic_on_warn durante las pruebas. La antigua funci\u00f3n 'txtimer' se divide en 'txfrtimer' y 'txtimer' para manejar las dos funcionalidades anteriores con devoluciones de llamadas de temporizador independientes. Los dos temporizadores simplificados ahora se ejecutan en modo de una sola vez y hacen que las transiciones de estado (especialmente con isotp_rcv_echo) sean mejor comprensibles." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52942.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52942.json index 2e9070161ab..0870fb18451 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52942.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52942.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()\n\nIt was found that the check to see if a partition could use up all\nthe cpus from the parent cpuset in update_parent_subparts_cpumask()\nwas incorrect. As a result, it is possible to leave parent with no\neffective cpu left even if there are tasks in the parent cpuset. This\ncan lead to system panic as reported in [1].\n\nFix this probem by updating the check to fail the enabling the partition\nif parent's effective_cpus is a subset of the child's cpus_allowed.\n\nAlso record the error code when an error happens in update_prstate()\nand add a test case where parent partition and child have the same cpu\nlist and parent has task. Enabling partition in the child will fail in\nthis case.\n\n[1] https://www.spinics.net/lists/cgroups/msg36254.html" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: Correcci\u00f3n de una comprobaci\u00f3n incorrecta en update_parent_subparts_cpumask(). Se detect\u00f3 que la comprobaci\u00f3n para ver si una partici\u00f3n pod\u00eda usar todas las CPU del conjunto de CPU principal en update_parent_subparts_cpumask() era incorrecta. Como resultado, es posible dejar la partici\u00f3n principal sin CPU efectiva, incluso si hay tareas en el conjunto de CPU principal. Esto puede provocar un p\u00e1nico del sistema, como se informa en [1]. Corrija este problema actualizando la comprobaci\u00f3n para que falle al habilitar la partici\u00f3n si el valor de CPU efectivas de la partici\u00f3n principal es un subconjunto del valor de CPU permitidas de la partici\u00f3n secundaria. Tambi\u00e9n registre el c\u00f3digo de error cuando se produce un error en update_prstate() y agregue un caso de prueba donde la partici\u00f3n principal y la secundaria tengan la misma lista de CPU y la partici\u00f3n principal tenga una tarea. En este caso, la habilitaci\u00f3n de la partici\u00f3n en la secundaria fallar\u00e1. [1] https://www.spinics.net/lists/cgroups/msg36254.html" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52976.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52976.json index 59337fa0ffa..4b48d5aa17a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52976.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52976.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: fix potential NULL deref in efi_mem_reserve_persistent\n\nWhen iterating on a linked list, a result of memremap is dereferenced\nwithout checking it for NULL.\n\nThis patch adds a check that falls back on allocating a new page in\ncase memremap doesn't succeed.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[ardb: return -ENOMEM instead of breaking out of the loop]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efi: se corrige una posible desreferenciaci\u00f3n NULL en efi_mem_reserve_persistent. Al iterar en una lista enlazada, se desreferencia un resultado de memremap sin comprobar si es NULL. Este parche a\u00f1ade una comprobaci\u00f3n que recurre a la asignaci\u00f3n de una nueva p\u00e1gina en caso de que memremap no tenga \u00e9xito. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE. [ardb: devuelve -ENOMEM en lugar de salir del bucle]" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52977.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52977.json index 0a26c4b7ea8..47a301879f6 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52977.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52977.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix flow memory leak in ovs_flow_cmd_new\n\nSyzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is\nnot freed when an allocation of a key fails.\n\nBUG: memory leak\nunreferenced object 0xffff888116668000 (size 632):\n comm \"syz-executor231\", pid 1090, jiffies 4294844701 (age 18.871s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<00000000defa3494>] kmem_cache_zalloc include/linux/slab.h:654 [inline]\n [<00000000defa3494>] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77\n [<00000000c67d8873>] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957\n [<0000000010a539a8>] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739\n [<00000000dff3302d>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n [<00000000dff3302d>] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800\n [<000000000286dd87>] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515\n [<0000000061fed410>] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n [<000000009dc0f111>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n [<000000009dc0f111>] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339\n [<000000004a5ee816>] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934\n [<00000000482b476f>] sock_sendmsg_nosec net/socket.c:651 [inline]\n [<00000000482b476f>] sock_sendmsg+0x152/0x190 net/socket.c:671\n [<00000000698574ba>] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356\n [<00000000d28d9e11>] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410\n [<0000000083ba9120>] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439\n [<00000000c00628f8>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n [<000000004abfdcf4>] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nTo fix this the patch rearranges the goto labels to reflect the order of\nobject allocations and adds appropriate goto statements on the error\npaths.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: openvswitch: corrige p\u00e9rdida de memoria de flujo en ovs_flow_cmd_new Syzkaller informa una p\u00e9rdida de memoria de new_flow en ovs_flow_cmd_new() ya que no se libera cuando falla la asignaci\u00f3n de una clave. ERROR: Fuga de memoria, objeto no referenciado 0xffff888116668000 (tama\u00f1o 632): comunicaci\u00f3n \"syz-executor231\", pid 1090, jiffies 4294844701 (edad 18.871 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ seguimiento inverso: [<00000000defa3494>] kmem_cache_zalloc include/linux/slab.h:654 [en l\u00ednea] [<00000000defa3494>] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77 [<00000000c67d8873>] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957 [<0000000010a539a8>] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739 [<00000000dff3302d>] genl_family_rcv_msg net/netlink/genetlink.c:783 [en l\u00ednea] [<00000000dff3302d>] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800 [<000000000286dd87>] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515 [<0000000061fed410>] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009dc0f111>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [en l\u00ednea] [<000000009dc0f111>] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339 [<000000004a5ee816>] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934 [<00000000482b476f>] sock_sendmsg_nosec net/socket.c:651 [en l\u00ednea] [<00000000482b476f>] sock_sendmsg+0x152/0x190 net/socket.c:671 [<00000000698574ba>] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356 [<00000000d28d9e11>] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410 [<0000000083ba9120>] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439 [<00000000c00628f8>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46 [<000000004abfdcf4>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 Para solucionar esto, el parche reorganiza las etiquetas goto para reflejar el orden de asignaci\u00f3n de objetos y a\u00f1ade instrucciones goto adecuadas en las rutas de error. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52978.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52978.json index 5adabbb2918..5f236aa90e1 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52978.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52978.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: kprobe: Fixup kernel panic when probing an illegal position\n\nThe kernel would panic when probed for an illegal position. eg:\n\n(CONFIG_RISCV_ISA_C=n)\n\necho 'p:hello kernel_clone+0x16 a0=%a0' >> kprobe_events\necho 1 > events/kprobes/hello/enable\ncat trace\n\nKernel panic - not syncing: stack-protector: Kernel stack\nis corrupted in: __do_sys_newfstatat+0xb8/0xb8\nCPU: 0 PID: 111 Comm: sh Not tainted\n6.2.0-rc1-00027-g2d398fe49a4d #490\nHardware name: riscv-virtio,qemu (DT)\nCall Trace:\n[] dump_backtrace+0x38/0x48\n[] show_stack+0x50/0x68\n[] dump_stack_lvl+0x60/0x84\n[] dump_stack+0x20/0x30\n[] panic+0x160/0x374\n[] generic_handle_arch_irq+0x0/0xa8\n[] sys_newstat+0x0/0x30\n[] sys_clone+0x20/0x30\n[] ret_from_syscall+0x0/0x4\n---[ end Kernel panic - not syncing: stack-protector:\nKernel stack is corrupted in: __do_sys_newfstatat+0xb8/0xb8 ]---\n\nThat is because the kprobe's ebreak instruction broke the kernel's\noriginal code. The user should guarantee the correction of the probe\nposition, but it couldn't make the kernel panic.\n\nThis patch adds arch_check_kprobe in arch_prepare_kprobe to prevent an\nillegal position (Such as the middle of an instruction)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: kprobe: Correcci\u00f3n del p\u00e1nico del kernel al sondear una posici\u00f3n ilegal El kernel entrar\u00eda en p\u00e1nico cuando se sondeara una posici\u00f3n ilegal. p. ej.: (CONFIG_RISCV_ISA_C=n) echo 'p:hello kernel_clone+0x16 a0=%a0' >> kprobe_events echo 1 > events/kprobes/hello/enable cat trace Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: __do_sys_newfstatat+0xb8/0xb8 CPU: 0 PID: 111 Comm: sh Not tainted 6.2.0-rc1-00027-g2d398fe49a4d #490 Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x38/0x48 [] show_stack+0x50/0x68 [] dump_stack_lvl+0x60/0x84 [] dump_stack+0x20/0x30 [] panic+0x160/0x374 [] generic_handle_arch_irq+0x0/0xa8 [] sys_newstat+0x0/0x30 [] sys_clone+0x20/0x30 [] ret_from_syscall+0x0/0x4 ---[ end Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: __do_sys_newfstatat+0xb8/0xb8 ]--- Esto se debe a que la instrucci\u00f3n ebreak de kprobe rompi\u00f3 el c\u00f3digo original del n\u00facleo. El usuario deber\u00eda garantizar la correcci\u00f3n de la posici\u00f3n de la sonda, pero no pudo provocar un p\u00e1nico en el n\u00facleo. Este parche a\u00f1ade arch_check_kprobe en arch_prepare_kprobe para evitar una posici\u00f3n ilegal (como la mitad de una instrucci\u00f3n)." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52979.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52979.json index 533290aa973..1d1ea684a9c 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52979.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52979.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsquashfs: harden sanity check in squashfs_read_xattr_id_table\n\nWhile mounting a corrupted filesystem, a signed integer '*xattr_ids' can\nbecome less than zero. This leads to the incorrect computation of 'len'\nand 'indexes' values which can cause null-ptr-deref in copy_bio_to_actor()\nor out-of-bounds accesses in the next sanity checks inside\nsquashfs_read_xattr_id_table().\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: squashfs: endurecimiento de la comprobaci\u00f3n de seguridad en squashfs_read_xattr_id_table. Al montar un sistema de archivos da\u00f1ado, un entero con signo '*xattr_ids' puede ser menor que cero. Esto provoca el c\u00e1lculo incorrecto de los valores de 'len' e 'indexes', lo que puede causar un valor nulo de referencia de referencia (ptr) en copy_bio_to_actor() o accesos fuera de l\u00edmites en las siguientes comprobaciones de seguridad dentro de squashfs_read_xattr_id_table(). Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52980.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52980.json index 506f8745195..80a6e4089d8 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52980.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52980.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: ublk: extending queue_size to fix overflow\n\nWhen validating drafted SPDK ublk target, in a case that\nassigning large queue depth to multiqueue ublk device,\nublk target would run into a weird incorrect state. During\nrounds of review and debug, An overflow bug was found\nin ublk driver.\n\nIn ublk_cmd.h, UBLK_MAX_QUEUE_DEPTH is 4096 which means\neach ublk queue depth can be set as large as 4096. But\nwhen setting qd for a ublk device,\nsizeof(struct ublk_queue) + depth * sizeof(struct ublk_io)\nwill be larger than 65535 if qd is larger than 2728.\nThen queue_size is overflowed, and ublk_get_queue()\nreferences a wrong pointer position. The wrong content of\nublk_queue elements will lead to out-of-bounds memory\naccess.\n\nExtend queue_size in ublk_device as \"unsigned int\"." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: ublk: extensi\u00f3n de queue_size para corregir el desbordamiento Al validar el borrador del objetivo ublk de SPDK, en un caso en el que se asigna una gran profundidad de cola al dispositivo ublk de m\u00faltiples colas, el objetivo ublk se ejecutar\u00eda en un estado incorrecto extra\u00f1o. Durante las rondas de revisi\u00f3n y depuraci\u00f3n, se encontr\u00f3 un error de desbordamiento en el controlador ublk. En ublk_cmd.h, UBLK_MAX_QUEUE_DEPTH es 4096, lo que significa que cada profundidad de cola ublk se puede configurar tan grande como 4096. Pero al configurar qd para un dispositivo ublk, sizeof(struct ublk_queue) + profundidad * sizeof(struct ublk_io) ser\u00e1 mayor que 65535 si qd es mayor que 2728. Entonces queue_size se desborda y ublk_get_queue() hace referencia a una posici\u00f3n de puntero incorrecta. El contenido incorrecto de los elementos ublk_queue provocar\u00e1 un acceso a memoria fuera de los l\u00edmites. Extienda queue_size en ublk_device como \"unsigned int\"." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52981.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52981.json index 199f782cd97..3d5a30db7a2 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52981.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52981.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix request ref counting during error capture & debugfs dump\n\nWhen GuC support was added to error capture, the reference counting\naround the request object was broken. Fix it up.\n\nThe context based search manages the spinlocking around the search\ninternally. So it needs to grab the reference count internally as\nwell. The execlist only request based search relies on external\nlocking, so it needs an external reference count but within the\nspinlock not outside it.\n\nThe only other caller of the context based search is the code for\ndumping engine state to debugfs. That code wasn't previously getting\nan explicit reference at all as it does everything while holding the\nexeclist specific spinlock. So, that needs updaing as well as that\nspinlock doesn't help when using GuC submission. Rather than trying to\nconditionally get/put depending on submission model, just change it to\nalways do the get/put.\n\nv2: Explicitly document adding an extra blank line in some dense code\n(Andy Shevchenko). Fix multiple potential null pointer derefs in case\nof no request found (some spotted by Tvrtko, but there was more!).\nAlso fix a leaked request in case of !started and another in\n__guc_reset_context now that intel_context_find_active_request is\nactually reference counting the returned request.\nv3: Add a _get suffix to intel_context_find_active_request now that it\ngrabs a reference (Daniele).\nv4: Split the intel_guc_find_hung_context change to a separate patch\nand rename intel_context_find_active_request_get to\nintel_context_get_active_request (Tvrtko).\nv5: s/locking/reference counting/ in commit message (Tvrtko)\n\n(cherry picked from commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915: Arreglar el conteo de referencias de solicitud durante la captura de errores y el volcado de debugfs Cuando se agreg\u00f3 soporte para GuC a la captura de errores, el conteo de referencias alrededor del objeto de solicitud se rompi\u00f3. Arr\u00e9glenlo. La b\u00fasqueda basada en contexto administra el bloqueo de giro alrededor de la b\u00fasqueda internamente. Por lo tanto, tambi\u00e9n necesita obtener el conteo de referencias internamente. La b\u00fasqueda basada en solicitud solo de execlist se basa en el bloqueo externo, por lo que necesita un conteo de referencias externo pero dentro del bloqueo de giro, no fuera de \u00e9l. El \u00fanico otro llamador de la b\u00fasqueda basada en contexto es el c\u00f3digo para volcar el estado del motor a debugfs. Ese c\u00f3digo anteriormente no obten\u00eda una referencia expl\u00edcita en absoluto, ya que hace todo mientras mantiene el bloqueo de giro espec\u00edfico de execlist. Por lo tanto, eso necesita actualizarse, ya que el bloqueo de giro no ayuda cuando se usa el env\u00edo de GuC. En lugar de intentar obtener/poner condicionalmente dependiendo del modelo de env\u00edo, simplemente c\u00e1mbielo para que siempre haga obtener/poner. v2: Documentar expl\u00edcitamente agregar una l\u00ednea en blanco adicional en alg\u00fan c\u00f3digo denso (Andy Shevchenko). Se corrigen varias posibles desreferencias de puntero nulo en caso de no encontrarse ninguna solicitud (algunas detectadas por Tvrtko, \u00a1pero hab\u00eda m\u00e1s!). Tambi\u00e9n se corrigen una solicitud filtrada en caso de !started y otra en __guc_reset_context, ahora que intel_context_find_active_request cuenta las referencias de la solicitud devuelta. v3: Se a\u00f1ade el sufijo _get a intel_context_find_active_request ahora que obtiene una referencia (Daniele). v4: Se divide el cambio de intel_guc_find_hung_context en un parche independiente y se cambia el nombre de intel_context_find_active_request_get a intel_context_get_active_request (Tvrtko). v5: s/locking/reference counting/ en el mensaje de confirmaci\u00f3n (Tvrtko) (seleccionado del commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52982.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52982.json index c0ac41424b7..61f975e004e 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52982.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52982.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfscache: Use wait_on_bit() to wait for the freeing of relinquished volume\n\nThe freeing of relinquished volume will wake up the pending volume\nacquisition by using wake_up_bit(), however it is mismatched with\nwait_var_event() used in fscache_wait_on_volume_collision() and it will\nnever wake up the waiter in the wait-queue because these two functions\noperate on different wait-queues.\n\nAccording to the implementation in fscache_wait_on_volume_collision(),\nif the wake-up of pending acquisition is delayed longer than 20 seconds\n(e.g., due to the delay of on-demand fd closing), the first\nwait_var_event_timeout() will timeout and the following wait_var_event()\nwill hang forever as shown below:\n\n FS-Cache: Potential volume collision new=00000024 old=00000022\n ......\n INFO: task mount:1148 blocked for more than 122 seconds.\n Not tainted 6.1.0-rc6+ #1\n task:mount state:D stack:0 pid:1148 ppid:1\n Call Trace:\n \n __schedule+0x2f6/0xb80\n schedule+0x67/0xe0\n fscache_wait_on_volume_collision.cold+0x80/0x82\n __fscache_acquire_volume+0x40d/0x4e0\n erofs_fscache_register_volume+0x51/0xe0 [erofs]\n erofs_fscache_register_fs+0x19c/0x240 [erofs]\n erofs_fc_fill_super+0x746/0xaf0 [erofs]\n vfs_get_super+0x7d/0x100\n get_tree_nodev+0x16/0x20\n erofs_fc_get_tree+0x20/0x30 [erofs]\n vfs_get_tree+0x24/0xb0\n path_mount+0x2fa/0xa90\n do_mount+0x7c/0xa0\n __x64_sys_mount+0x8b/0xe0\n do_syscall_64+0x30/0x60\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nConsidering that wake_up_bit() is more selective, so fix it by using\nwait_on_bit() instead of wait_var_event() to wait for the freeing of\nrelinquished volume. In addition because waitqueue_active() is used in\nwake_up_bit() and clear_bit() doesn't imply any memory barrier, use\nclear_and_wake_up_bit() to add the missing memory barrier between\ncursor->flags and waitqueue_active()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fscache: utilice wait_on_bit() para esperar la liberaci\u00f3n del volumen cedido. La liberaci\u00f3n del volumen cedido activar\u00e1 la adquisici\u00f3n de volumen pendiente mediante wake_up_bit(), sin embargo no coincide con wait_var_event() utilizado en fscache_wait_on_volume_collision() y nunca activar\u00e1 al que espera en la cola de espera porque estas dos funciones operan en colas de espera diferentes. Seg\u00fan la implementaci\u00f3n en fscache_wait_on_volume_collision(), si la activaci\u00f3n de una adquisici\u00f3n pendiente se demora m\u00e1s de 20 segundos (por ejemplo, debido a la demora en el cierre del fd a pedido), el primer wait_var_event_timeout() expirar\u00e1 y el siguiente wait_var_event() se colgar\u00e1 para siempre como se muestra a continuaci\u00f3n: FS-Cache: Potencial colisi\u00f3n de volumen nuevo=00000024 antiguo=00000022 ...... INFORMACI\u00d3N: montaje de tarea: 1148 bloqueado durante m\u00e1s de 122 segundos. No contaminado 6.1.0-rc6+ #1 task:mount state:D stack:0 pid:1148 ppid:1 Call Trace: __schedule+0x2f6/0xb80 schedule+0x67/0xe0 fscache_wait_on_volume_collision.cold+0x80/0x82 __fscache_acquire_volume+0x40d/0x4e0 erofs_fscache_register_volume+0x51/0xe0 [erofs] erofs_fscache_register_fs+0x19c/0x240 [erofs] erofs_fc_fill_super+0x746/0xaf0 [erofs] vfs_get_super+0x7d/0x100 get_tree_nodev+0x16/0x20 erofs_fc_get_tree+0x20/0x30 [erofs] vfs_get_tree+0x24/0xb0 path_mount+0x2fa/0xa90 do_mount+0x7c/0xa0 __x64_sys_mount+0x8b/0xe0 do_syscall_64+0x30/0x60 entry_SYSCALL_64_after_hwframe+0x46/0xb0 Considering that wake_up_bit() es m\u00e1s selectivo, corr\u00edjalo utilizando wait_on_bit() en lugar de wait_var_event() para esperar la liberaci\u00f3n del volumen cedido. Adem\u00e1s, debido a que waitqueue_active() se usa en wake_up_bit() y clear_bit() no implica ninguna barrera de memoria, use clear_and_wake_up_bit() para agregar la barrera de memoria faltante entre cursor->flags y waitqueue_active()." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52984.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52984.json index 6f1b845a825..81c1dec2c55 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52984.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices\n\nThe probe() function is only used for the DP83822 PHY, leaving the\nprivate data pointer uninitialized for the smaller DP83825/26 models.\nWhile all uses of the private data structure are hidden in 82822 specific\ncallbacks, configuring the interrupt is shared across all models.\nThis causes a NULL pointer dereference on the smaller PHYs as it accesses\nthe private data unchecked. Verifying the pointer avoids that." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: phy: dp83822: Se corrige el acceso a puntero nulo en dispositivos DP83825/DP83826. La funci\u00f3n probe() solo se utiliza para la estructura f\u00edsica (PHY) DP83822, lo que deja el puntero de datos privados sin inicializar para los modelos DP83825/26 m\u00e1s peque\u00f1os. Si bien todos los usos de la estructura de datos privados est\u00e1n ocultos en las devoluciones de llamada espec\u00edficas de 82822, la configuraci\u00f3n de la interrupci\u00f3n se comparte entre todos los modelos. Esto provoca una desreferencia de puntero nulo en las estructuras f\u00edsicas (PHY) m\u00e1s peque\u00f1as, ya que accede a los datos privados sin verificar. Verificar el puntero evita esto." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52985.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52985.json index 976551caad4..511e84fe3a0 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52985.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: imx8mm-verdin: Do not power down eth-phy\n\nCurrently if suspending using either freeze or memory state, the fec\ndriver tries to power down the phy which leads to crash of the kernel\nand non-responsible kernel with the following call trace:\n\n[ 24.839889 ] Call trace:\n[ 24.839892 ] phy_error+0x18/0x60\n[ 24.839898 ] kszphy_handle_interrupt+0x6c/0x80\n[ 24.839903 ] phy_interrupt+0x20/0x2c\n[ 24.839909 ] irq_thread_fn+0x30/0xa0\n[ 24.839919 ] irq_thread+0x178/0x2c0\n[ 24.839925 ] kthread+0x154/0x160\n[ 24.839932 ] ret_from_fork+0x10/0x20\n\nSince there is currently no functionality in the phy subsystem to power\ndown phys let's just disable the feature of powering-down the ethernet\nphy." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: dts: imx8mm-verdin: No apague eth-phy Actualmente, si se suspende utilizando el estado de congelaci\u00f3n o de memoria, el controlador fec intenta apagar el phy, lo que provoca un bloqueo del kernel y un kernel no responsable con el siguiente seguimiento de llamada: [ 24.839889 ] Seguimiento de llamada: [ 24.839892 ] phy_error+0x18/0x60 [ 24.839898 ] kszphy_handle_interrupt+0x6c/0x80 [ 24.839903 ] phy_interrupt+0x20/0x2c [ 24.839909 ] irq_thread_fn+0x30/0xa0 [ 24.839919 ] irq_thread+0x178/0x2c0 [ 24.839925 ] kthread+0x154/0x160 [ 24.839932 ] ret_from_fork+0x10/0x20 Dado que actualmente no hay ninguna funcionalidad en el subsistema phy para apagar phys, deshabilitemos la funci\u00f3n de apagar el phy Ethernet." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52986.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52986.json index c046e24d2e7..d857ae9ba51 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52986.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener\n\nA listening socket linked to a sockmap has its sk_prot overridden. It\npoints to one of the struct proto variants in tcp_bpf_prots. The variant\ndepends on the socket's family and which sockmap programs are attached.\n\nA child socket cloned from a TCP listener initially inherits their sk_prot.\nBut before cloning is finished, we restore the child's proto to the\nlistener's original non-tcp_bpf_prots one. This happens in\ntcp_create_openreq_child -> tcp_bpf_clone.\n\nToday, in tcp_bpf_clone we detect if the child's proto should be restored\nby checking only for the TCP_BPF_BASE proto variant. This is not\ncorrect. The sk_prot of listening socket linked to a sockmap can point to\nto any variant in tcp_bpf_prots.\n\nIf the listeners sk_prot happens to be not the TCP_BPF_BASE variant, then\nthe child socket unintentionally is left if the inherited sk_prot by\ntcp_bpf_clone.\n\nThis leads to issues like infinite recursion on close [1], because the\nchild state is otherwise not set up for use with tcp_bpf_prot operations.\n\nAdjust the check in tcp_bpf_clone to detect all of tcp_bpf_prots variants.\n\nNote that it wouldn't be sufficient to check the socket state when\noverriding the sk_prot in tcp_bpf_update_proto in order to always use the\nTCP_BPF_BASE variant for listening sockets. Since commit\nb8b8315e39ff (\"bpf, sockmap: Remove unhash handler for BPF sockmap usage\")\nit is possible for a socket to transition to TCP_LISTEN state while already\nlinked to a sockmap, e.g. connect() -> insert into map ->\nconnect(AF_UNSPEC) -> listen().\n\n[1]: https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: Comprueba si hay alg\u00fan tcp_bpf_prots al clonar un oyente Un socket que escucha vinculado a un sockmap tiene su sk_prot anulado. Apunta a una de las variantes de struct proto en tcp_bpf_prots. La variante depende de la familia del socket y de los programas sockmap que est\u00e9n adjuntos. Un socket hijo clonado de un oyente TCP hereda inicialmente su sk_prot. Pero antes de que finalice la clonaci\u00f3n, restauramos el proto del hijo al original del oyente que no es tcp_bpf_prots. Esto sucede en tcp_create_openreq_child -> tcp_bpf_clone. Hoy, en tcp_bpf_clone detectamos si el proto del hijo debe restaurarse comprobando solo la variante del proto TCP_BPF_BASE. Esto no es correcto. El sk_prot del socket de escucha vinculado a un mapa de socks puede apuntar a cualquier variante de tcp_bpf_prots. Si el sk_prot del socket de escucha no es la variante TCP_BPF_BASE, el socket hijo se abandona involuntariamente si el sk_prot heredado por tcp_bpf_clone lo impide. Esto genera problemas como la recursi\u00f3n infinita al cerrar [1], ya que el estado del hijo no est\u00e1 configurado para su uso con operaciones de tcp_bpf_prot. Ajuste la comprobaci\u00f3n en tcp_bpf_clone para detectar todas las variantes de tcp_bpf_prots. Tenga en cuenta que no ser\u00eda suficiente comprobar el estado del socket al sobrescribir el sk_prot en tcp_bpf_update_proto para usar siempre la variante TCP_BPF_BASE para los sockets de escucha. Desde el commit b8b8315e39ff (\"bpf, sockmap: eliminar el controlador unhash para el uso de sockmap BPF\"), es posible que un socket pase al estado TCP_LISTEN mientras ya est\u00e1 vinculado a un sockmap, por ejemplo, connect() -> insert into map -> connect(AF_UNSPEC) -> listen(). [1]: https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52987.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52987.json index 49edffee091..4fbb4b6a7aa 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52987.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52987.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()\n\nThe \"id\" comes from the user. Change the type to unsigned to prevent\nan array underflow." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: SOF: ipc4-mtrace: previene el desbordamiento por debajo de la capacidad en sof_ipc4_priority_mask_dfs_write(). El \"id\" proviene del usuario. Cambie el tipo a unsigned para evitar un desbordamiento por debajo de la capacidad de la matriz." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52988.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52988.json index 3d857f86c31..90d9a018893 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52988.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52988.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()\n\nsnd_hda_get_connections() can return a negative error code.\nIt may lead to accessing 'conn' array at a negative index.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: hda/via: Evitar una posible matriz fuera de los l\u00edmites en add_secret_dac_path(). snd_hda_get_connections() puede devolver un c\u00f3digo de error negativo. Esto puede provocar el acceso a la matriz 'conn' con un \u00edndice negativo. Encontrada por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52989.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52989.json index 7e80b934e0a..c075ce0b48f 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52989.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52989.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region\n\nThis patch is fix for Linux kernel v2.6.33 or later.\n\nFor request subaction to IEC 61883-1 FCP region, Linux FireWire subsystem\nhave had an issue of use-after-free. The subsystem allows multiple\nuser space listeners to the region, while data of the payload was likely\nreleased before the listeners execute read(2) to access to it for copying\nto user space.\n\nThe issue was fixed by a commit 281e20323ab7 (\"firewire: core: fix\nuse-after-free regression in FCP handler\"). The object of payload is\nduplicated in kernel space for each listener. When the listener executes\nioctl(2) with FW_CDEV_IOC_SEND_RESPONSE request, the object is going to\nbe released.\n\nHowever, it causes memory leak since the commit relies on call of\nrelease_request() in drivers/firewire/core-cdev.c. Against the\nexpectation, the function is never called due to the design of\nrelease_client_resource(). The function delegates release task\nto caller when called with non-NULL fourth argument. The implementation\nof ioctl_send_response() is the case. It should release the object\nexplicitly.\n\nThis commit fixes the bug." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firewire: correcci\u00f3n de fuga de memoria para el payload de la subacci\u00f3n de solicitud a la regi\u00f3n FCP IEC 61883-1. Este parche es una correcci\u00f3n para el kernel de Linux v2.6.33 o posterior. Para la subacci\u00f3n de solicitud a la regi\u00f3n FCP IEC 61883-1, el subsistema FireWire de Linux ha tenido un problema de use-after-free. El subsistema permite que varios oyentes del espacio de usuario accedan a la regi\u00f3n, mientras que los datos de el payload probablemente se liberaron antes de que los oyentes ejecutaran read(2) para acceder a ellos para copiarlos al espacio de usuario. El problema se solucion\u00f3 mediante un commit 281e20323ab7 (\"firewire: core: correcci\u00f3n de la regresi\u00f3n de use-after-free en el controlador FCP\"). El objeto de el payload se duplica en el espacio del kernel para cada oyente. Cuando el oyente ejecuta ioctl(2) con la solicitud FW_CDEV_IOC_SEND_RESPONSE, el objeto se liberar\u00e1. Sin embargo, esto causa una fuga de memoria, ya que el commit depende de la llamada a release_request() en drivers/firewire/core-cdev.c. Contrariamente a lo esperado, la funci\u00f3n nunca se llama debido al dise\u00f1o de release_client_resource(). La funci\u00f3n delega la tarea de liberaci\u00f3n al llamador cuando se llama con un cuarto argumento distinto de NULL. La implementaci\u00f3n de ioctl_send_response() es la correcta. Deber\u00eda liberar el objeto expl\u00edcitamente. Esta confirmaci\u00f3n corrige el error." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52991.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52991.json index cfbd2b85c75..81316ae61d2 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52991.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix NULL pointer in skb_segment_list\n\nCommit 3a1296a38d0c (\"net: Support GRO/GSO fraglist chaining.\")\nintroduced UDP listifyed GRO. The segmentation relies on frag_list being\nuntouched when passing through the network stack. This assumption can be\nbroken sometimes, where frag_list itself gets pulled into linear area,\nleaving frag_list being NULL. When this happens it can trigger\nfollowing NULL pointer dereference, and panic the kernel. Reverse the\ntest condition should fix it.\n\n[19185.577801][ C1] BUG: kernel NULL pointer dereference, address:\n...\n[19185.663775][ C1] RIP: 0010:skb_segment_list+0x1cc/0x390\n...\n[19185.834644][ C1] Call Trace:\n[19185.841730][ C1] \n[19185.848563][ C1] __udp_gso_segment+0x33e/0x510\n[19185.857370][ C1] inet_gso_segment+0x15b/0x3e0\n[19185.866059][ C1] skb_mac_gso_segment+0x97/0x110\n[19185.874939][ C1] __skb_gso_segment+0xb2/0x160\n[19185.883646][ C1] udp_queue_rcv_skb+0xc3/0x1d0\n[19185.892319][ C1] udp_unicast_rcv_skb+0x75/0x90\n[19185.900979][ C1] ip_protocol_deliver_rcu+0xd2/0x200\n[19185.910003][ C1] ip_local_deliver_finish+0x44/0x60\n[19185.918757][ C1] __netif_receive_skb_one_core+0x8b/0xa0\n[19185.927834][ C1] process_backlog+0x88/0x130\n[19185.935840][ C1] __napi_poll+0x27/0x150\n[19185.943447][ C1] net_rx_action+0x27e/0x5f0\n[19185.951331][ C1] ? mlx5_cq_tasklet_cb+0x70/0x160 [mlx5_core]\n[19185.960848][ C1] __do_softirq+0xbc/0x25d\n[19185.968607][ C1] irq_exit_rcu+0x83/0xb0\n[19185.976247][ C1] common_interrupt+0x43/0xa0\n[19185.984235][ C1] asm_common_interrupt+0x22/0x40\n...\n[19186.094106][ C1] " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: correcci\u00f3n de puntero nulo en skb_segment_list. El commit 3a1296a38d0c (\"net: Compatibilidad con encadenamiento de fraglist GRO/GSO\") introdujo GRO con lista UDP. La segmentaci\u00f3n depende de que frag_list permanezca intacto al pasar por la pila de red. Esta suposici\u00f3n puede fallar a veces, ya que frag_list se arrastra al \u00e1rea lineal, dejando frag_list como nulo. Cuando esto sucede, puede desencadenar la consiguiente desreferencia de puntero nulo y generar un p\u00e1nico en el kernel. Revertir la condici\u00f3n de prueba deber\u00eda solucionarlo. [19185.577801][ C1] ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: ... [19185.663775][ C1] RIP: 0010:skb_segment_list+0x1cc/0x390 ... [19185.834644][ C1] Rastreo de llamadas: [19185.841730][ C1] [19185.848563][ C1] __udp_gso_segment+0x33e/0x510 [19185.857370][ C1] inet_gso_segment+0x15b/0x3e0 [19185.866059][ C1] skb_mac_gso_segment+0x97/0x110 [19185.874939][ C1] __skb_gso_segment+0xb2/0x160 [19185.883646][ C1] udp_queue_rcv_skb+0xc3/0x1d0 [19185.892319][ C1] udp_unicast_rcv_skb+0x75/0x90 [19185.900979][ C1] ip_protocol_deliver_rcu+0xd2/0x200 [19185.910003][ C1] ip_local_deliver_finish+0x44/0x60 [19185.918757][ C1] __netif_receive_skb_one_core+0x8b/0xa0 [19185.927834][ C1] registro_de_proceso+0x88/0x130 [19185.935840][ C1] __napi_poll+0x27/0x150 [19185.943447][ C1] acci\u00f3n_de_rx_net+0x27e/0x5f0 [19185.951331][ C1] ? mlx5_cq_tasklet_cb+0x70/0x160 [mlx5_core] [19185.960848][ C1] __do_softirq+0xbc/0x25d [19185.968607][ C1] irq_exit_rcu+0x83/0xb0 [19185.976247][ C1] common_interrupt+0x43/0xa0 [19185.984235][ C1] asm_common_interrupt+0x22/0x40 ... [19186.094106][ C1] " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52992.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52992.json index ceaf4983b46..eba8911c356 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52992.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52992.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Skip task with pid=1 in send_signal_common()\n\nThe following kernel panic can be triggered when a task with pid=1 attaches\na prog that attempts to send killing signal to itself, also see [1] for more\ndetails:\n\n Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b\n CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148\n Call Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106\n panic+0x2c4/0x60f kernel/panic.c:275\n do_exit.cold+0x63/0xe4 kernel/exit.c:789\n do_group_exit+0xd4/0x2a0 kernel/exit.c:950\n get_signal+0x2460/0x2600 kernel/signal.c:2858\n arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306\n exit_to_user_mode_loop kernel/entry/common.c:168 [inline]\n exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203\n __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]\n syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296\n do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nSo skip task with pid=1 in bpf_send_signal_common() to avoid the panic.\n\n [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Omitir tarea con pid=1 en send_signal_common() El siguiente p\u00e1nico del kernel se puede activar cuando una tarea con pid=1 adjunta un programa que intenta enviarse una se\u00f1al de eliminaci\u00f3n a s\u00ed mismo, consulte tambi\u00e9n [1] para obtener m\u00e1s detalles: P\u00e1nico del kernel - no sincroniza: \u00a1Intento de eliminar init! exitcode=0x0000000b CPU: 3 PID: 1 Comm: systemd No contaminado 6.1.0-09652-g59fe41b5255f #148 Rastreo de llamadas: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 panic+0x2c4/0x60f kernel/panic.c:275 do_exit.cold+0x63/0xe4 kernel/exit.c:789 do_group_exit+0xd4/0x2a0 kernel/exit.c:950 get_signal+0x2460/0x2600 kernel/signal.c:2858 arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd So skip task with pid=1 in bpf_send_signal_common() para evitar el p\u00e1nico. [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52993.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52993.json index f35620bc5c8..fed6cdf5c6e 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52993.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52993.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL\n\nBaoquan reported that after triggering a crash the subsequent crash-kernel\nfails to boot about half of the time. It triggers a NULL pointer\ndereference in the periodic tick code.\n\nThis happens because the legacy timer interrupt (IRQ0) is resent in\nsoftware which happens in soft interrupt (tasklet) context. In this context\nget_irq_regs() returns NULL which leads to the NULL pointer dereference.\n\nThe reason for the resend is a spurious APIC interrupt on the IRQ0 vector\nwhich is captured and leads to a resend when the legacy timer interrupt is\nenabled. This is wrong because the legacy PIC interrupts are level\ntriggered and therefore should never be resent in software, but nothing\never sets the IRQ_LEVEL flag on those interrupts, so the core code does not\nknow about their trigger type.\n\nEnsure that IRQ_LEVEL is set when the legacy PCI interrupts are set up." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/i8259: Marcar interrupciones PIC heredadas con IRQ_LEVEL. Baoquan inform\u00f3 que, tras desencadenar un fallo, el kernel posterior al fallo no arranca aproximadamente la mitad de las veces. Esto desencadena una desreferencia de puntero NULL en el c\u00f3digo de tick peri\u00f3dico. Esto sucede porque la interrupci\u00f3n del temporizador heredada (IRQ0) se reenv\u00eda por software, lo que ocurre en el contexto de una interrupci\u00f3n suave (tasklet). En este contexto, get_irq_regs() devuelve NULL, lo que provoca la desreferencia de puntero NULL. El motivo del reenv\u00edo es una interrupci\u00f3n APIC espuria en el vector IRQ0, que se captura y provoca un reenv\u00edo cuando se habilita la interrupci\u00f3n del temporizador heredada. Esto es incorrecto porque las interrupciones PIC heredadas se activan por nivel y, por lo tanto, nunca deber\u00edan reenviarse por software; sin embargo, nada activa el indicador IRQ_LEVEL en esas interrupciones, por lo que el c\u00f3digo principal desconoce su tipo de activaci\u00f3n. Aseg\u00farese de que IRQ_LEVEL est\u00e9 activado al configurar las interrupciones PCI heredadas." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52994.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52994.json index 4bd5a1100ca..06e2cf3c6f2 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52994.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52994.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nacpi: Fix suspend with Xen PV\n\nCommit f1e525009493 (\"x86/boot: Skip realmode init code when running as\nXen PV guest\") missed one code path accessing real_mode_header, leading\nto dereferencing NULL when suspending the system under Xen:\n\n [ 348.284004] PM: suspend entry (deep)\n [ 348.289532] Filesystems sync: 0.005 seconds\n [ 348.291545] Freezing user space processes ... (elapsed 0.000 seconds) done.\n [ 348.292457] OOM killer disabled.\n [ 348.292462] Freezing remaining freezable tasks ... (elapsed 0.104 seconds) done.\n [ 348.396612] printk: Suspending console(s) (use no_console_suspend to debug)\n [ 348.749228] PM: suspend devices took 0.352 seconds\n [ 348.769713] ACPI: EC: interrupt blocked\n [ 348.816077] BUG: kernel NULL pointer dereference, address: 000000000000001c\n [ 348.816080] #PF: supervisor read access in kernel mode\n [ 348.816081] #PF: error_code(0x0000) - not-present page\n [ 348.816083] PGD 0 P4D 0\n [ 348.816086] Oops: 0000 [#1] PREEMPT SMP NOPTI\n [ 348.816089] CPU: 0 PID: 6764 Comm: systemd-sleep Not tainted 6.1.3-1.fc32.qubes.x86_64 #1\n [ 348.816092] Hardware name: Star Labs StarBook/StarBook, BIOS 8.01 07/03/2022\n [ 348.816093] RIP: e030:acpi_get_wakeup_address+0xc/0x20\n\nFix that by adding an optional acpi callback allowing to skip setting\nthe wakeup address, as in the Xen PV case this will be handled by the\nhypervisor anyway." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: acpi: Fix suspend with Xen PV Commit f1e525009493 (\"x86/boot: Skip realmode init code when running as Xen PV guest\") omiti\u00f3 una ruta de c\u00f3digo que acced\u00eda a real_mode_header, lo que provoc\u00f3 la desreferenciaci\u00f3n de NULL al suspender el sistema bajo Xen: [348.284004] PM: entrada de suspensi\u00f3n (profunda) [348.289532] Sincronizaci\u00f3n de sistemas de archivos: 0,005 segundos [348.291545] Congelaci\u00f3n de procesos de espacio de usuario... (transcurridos 0,000 segundos) hecho. [348.292457] OOM killer deshabilitado. [348.292462] Congelaci\u00f3n de tareas congelables restantes... (transcurridos 0,104 segundos) hecho. [ 348.396612] printk: Suspendiendo consola(s) (use no_console_suspend para depurar) [ 348.749228] PM: suspender dispositivos tom\u00f3 0.352 segundos [ 348.769713] ACPI: EC: interrupci\u00f3n bloqueada [ 348.816077] ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 000000000000001c [ 348.816080] #PF: acceso de lectura del supervisor en modo kernel [ 348.816081] #PF: error_code(0x0000) - p\u00e1gina no presente [ 348.816083] PGD 0 P4D 0 [ 348.816086] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 348.816089] CPU: 0 PID: 6764 Comm: systemd-sleep No contaminado 6.1.3-1.fc32.qubes.x86_64 #1 [ 348.816092] Nombre del hardware: Star Labs StarBook/StarBook, BIOS 8.01 07/03/2022 [ 348.816093] RIP: e030:acpi_get_wakeup_address+0xc/0x20 Corrija esto agregando una devoluci\u00f3n de llamada acpi opcional que permita omitir la configuraci\u00f3n de la direcci\u00f3n de activaci\u00f3n, ya que en el caso de Xen PV esto lo manejar\u00e1 el hipervisor de todos modos." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52995.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52995.json index 8c7afdd46bc..474515961bf 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52995.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52995.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/kprobe: Fix instruction simulation of JALR\n\nSet kprobe at 'jalr 1140(ra)' of vfs_write results in the following\ncrash:\n\n[ 32.092235] Unable to handle kernel access to user memory without uaccess routines at virtual address 00aaaaaad77b1170\n[ 32.093115] Oops [#1]\n[ 32.093251] Modules linked in:\n[ 32.093626] CPU: 0 PID: 135 Comm: ftracetest Not tainted 6.2.0-rc2-00013-gb0aa5e5df0cb-dirty #16\n[ 32.093985] Hardware name: riscv-virtio,qemu (DT)\n[ 32.094280] epc : ksys_read+0x88/0xd6\n[ 32.094855] ra : ksys_read+0xc0/0xd6\n[ 32.095016] epc : ffffffff801cda80 ra : ffffffff801cdab8 sp : ff20000000d7bdc0\n[ 32.095227] gp : ffffffff80f14000 tp : ff60000080f9cb40 t0 : ffffffff80f13e80\n[ 32.095500] t1 : ffffffff8000c29c t2 : ffffffff800dbc54 s0 : ff20000000d7be60\n[ 32.095716] s1 : 0000000000000000 a0 : ffffffff805a64ae a1 : ffffffff80a83708\n[ 32.095921] a2 : ffffffff80f160a0 a3 : 0000000000000000 a4 : f229b0afdb165300\n[ 32.096171] a5 : f229b0afdb165300 a6 : ffffffff80eeebd0 a7 : 00000000000003ff\n[ 32.096411] s2 : ff6000007ff76800 s3 : fffffffffffffff7 s4 : 00aaaaaad77b1170\n[ 32.096638] s5 : ffffffff80f160a0 s6 : ff6000007ff76800 s7 : 0000000000000030\n[ 32.096865] s8 : 00ffffffc3d97be0 s9 : 0000000000000007 s10: 00aaaaaad77c9410\n[ 32.097092] s11: 0000000000000000 t3 : ffffffff80f13e48 t4 : ffffffff8000c29c\n[ 32.097317] t5 : ffffffff8000c29c t6 : ffffffff800dbc54\n[ 32.097505] status: 0000000200000120 badaddr: 00aaaaaad77b1170 cause: 000000000000000d\n[ 32.098011] [] ksys_write+0x6c/0xd6\n[ 32.098222] [] sys_write+0x2a/0x38\n[ 32.098405] [] ret_from_syscall+0x0/0x2\n\nSince the rs1 and rd might be the same one, such as 'jalr 1140(ra)',\nhence it requires obtaining the target address from rs1 followed by\nupdating rd.\n\n[Palmer: Pick Guo's cleanup]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv/kprobe: Se corrige la simulaci\u00f3n de instrucci\u00f3n de JALR. Establecer kprobe en 'jalr 1140(ra)' de vfs_write da como resultado el siguiente fallo: [32.092235] No se puede controlar el acceso del kernel a la memoria del usuario sin rutinas uaccess en la direcci\u00f3n virtual 00aaaaaad77b1170 [32.093115] Ups [#1] [32.093251] M\u00f3dulos vinculados en: [32.093626] CPU: 0 PID: 135 Comm: ftracetest No contaminado 6.2.0-rc2-00013-gb0aa5e5df0cb-dirty #16 [32.093985] Nombre del hardware: riscv-virtio,qemu (DT) [ [32.094280] epc : ksys_read+0x88/0xd6 [ 32.094855] ra : ksys_read+0xc0/0xd6 [ 32.095016] epc : ffffffff801cda80 ra : ffffffff801cdab8 sp : ff20000000d7bdc0 [ 32.095227] gp : ffffffff80f14000 tp : ff60000080f9cb40 t0 : ffffffff80f13e80 [ 32.095500] t1 : ffffffff8000c29c t2 : ffffffff800dbc54 s0 : ff20000000d7be60 [32.095716] s1: 0000000000000000 a0: ffffffff805a64ae a1: ffffffff80a83708 [32.095921] a2: ffffffff80f160a0 a3: 0000000000000000 a4: f229b0afdb165300 [32.096171] a5: f229b0afdb165300 a6: ffffffff80eeebd0 a7: 00000000000003ff [32.096411] s2: ff6000007ff76800 s3: ffffffffffffff7 s4: 00aaaaaad77b1170 [32.096638] s5: ffffffff80f160a0 s6: ff6000007ff76800 s7: 00000000000000030 [32.096865] s8: 00ffffffc3d97be0 s9: 0000000000000007 s10: 00aaaaaad77c9410 [32.097092] s11: 0000000000000000 t3: ffffffff80f13e48 t4 : ffffffff8000c29c [ 32.097317] t5 : ffffffff8000c29c t6 : ffffffff800dbc54 [ 32.097505] estado: 0000000200000120 direcci\u00f3n incorrecta: 00aaaaaad77b1170 causa: 000000000000000d [ 32.098011] [] ksys_write+0x6c/0xd6 [ 32.098222] [] sys_write+0x2a/0x38 [ 32.098405] [] ret_from_syscall+0x0/0x2 Dado que rs1 y rd podr\u00edan ser el mismo, como 'jalr 1140(ra)', se requiere obtener la direcci\u00f3n de destino de rs1 y luego actualizar rd. [Palmer: Limpieza de Pick Guo]" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52996.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52996.json index f7981425e2a..6cd985d653f 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52996.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52996.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: prevent potential spectre v1 gadget in fib_metrics_match()\n\nif (!type)\n continue;\n if (type > RTAX_MAX)\n return false;\n ...\n fi_val = fi->fib_metrics->metrics[type - 1];\n\n@type being used as an array index, we need to prevent\ncpu speculation or risk leaking kernel memory content." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: evitar un potencial gadget spectre v1 en fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type se utiliza como un \u00edndice de matriz, debemos evitar la especulaci\u00f3n de la CPU o corremos el riesgo de filtrar el contenido de la memoria del kernel." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52997.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52997.json index 5a95234868d..0760fe2c588 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52997.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52997.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: prevent potential spectre v1 gadget in ip_metrics_convert()\n\nif (!type)\n\t\tcontinue;\n\tif (type > RTAX_MAX)\n\t\treturn -EINVAL;\n\t...\n\tmetrics[type - 1] = val;\n\n@type being used as an array index, we need to prevent\ncpu speculation or risk leaking kernel memory content." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: evitar un potencial gadget spectre v1 en ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type se utiliza como un \u00edndice de matriz, debemos evitar la especulaci\u00f3n de la CPU o el riesgo de filtrar el contenido de la memoria del kernel." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52998.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52998.json index a77fefd7e67..b1f3546a9f5 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52998.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52998.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: Use page_pool_put_full_page when freeing rx buffers\n\nThe page_pool_release_page was used when freeing rx buffers, and this\nfunction just unmaps the page (if mapped) and does not recycle the page.\nSo after hundreds of down/up the eth0, the system will out of memory.\nFor more details, please refer to the following reproduce steps and\nbug logs. To solve this issue and refer to the doc of page pool, the\npage_pool_put_full_page should be used to replace page_pool_release_page.\nBecause this API will try to recycle the page if the page refcnt equal to\n1. After testing 20000 times, the issue can not be reproduced anymore\n(about testing 391 times the issue will occur on i.MX8MN-EVK before).\n\nReproduce steps:\nCreate the test script and run the script. The script content is as\nfollows:\nLOOPS=20000\ni=1\nwhile [ $i -le $LOOPS ]\ndo\n echo \"TINFO:ENET $curface up and down test $i times\"\n org_macaddr=$(cat /sys/class/net/eth0/address)\n ifconfig eth0 down\n ifconfig eth0 hw ether $org_macaddr up\n i=$(expr $i + 1)\ndone\nsleep 5\nif cat /sys/class/net/eth0/operstate | grep 'up';then\n echo \"TEST PASS\"\nelse\n echo \"TEST FAIL\"\nfi\n\nBug detail logs:\nTINFO:ENET up and down test 391 times\n[ 850.471205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)\n[ 853.535318] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready\n[ 853.541694] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx\n[ 870.590531] page_pool_release_retry() stalled pool shutdown 199 inflight 60 sec\n[ 931.006557] page_pool_release_retry() stalled pool shutdown 199 inflight 120 sec\nTINFO:ENET up and down test 392 times\n[ 991.426544] page_pool_release_retry() stalled pool shutdown 192 inflight 181 sec\n[ 1051.838531] page_pool_release_retry() stalled pool shutdown 170 inflight 241 sec\n[ 1093.751217] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)\n[ 1096.446520] page_pool_release_retry() stalled pool shutdown 308 inflight 60 sec\n[ 1096.831245] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx\n[ 1096.839092] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready\n[ 1112.254526] page_pool_release_retry() stalled pool shutdown 103 inflight 302 sec\n[ 1156.862533] page_pool_release_retry() stalled pool shutdown 308 inflight 120 sec\n[ 1172.674516] page_pool_release_retry() stalled pool shutdown 103 inflight 362 sec\n[ 1217.278532] page_pool_release_retry() stalled pool shutdown 308 inflight 181 sec\nTINFO:ENET up and down test 393 times\n[ 1233.086535] page_pool_release_retry() stalled pool shutdown 103 inflight 422 sec\n[ 1277.698513] page_pool_release_retry() stalled pool shutdown 308 inflight 241 sec\n[ 1293.502525] page_pool_release_retry() stalled pool shutdown 86 inflight 483 sec\n[ 1338.110518] page_pool_release_retry() stalled pool shutdown 308 inflight 302 sec\n[ 1353.918540] page_pool_release_retry() stalled pool shutdown 32 inflight 543 sec\n[ 1361.179205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: attached PHY driver (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL)\n[ 1364.255298] fec 30be0000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx\n[ 1364.263189] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready\n[ 1371.998532] page_pool_release_retry() stalled pool shutdown 310 inflight 60 sec\n[ 1398.530542] page_pool_release_retry() stalled pool shutdown 308 inflight 362 sec\n[ 1414.334539] page_pool_release_retry() stalled pool shutdown 16 inflight 604 sec\n[ 1432.414520] page_pool_release_retry() stalled pool shutdown 310 inflight 120 sec\n[ 1458.942523] page_pool_release_retry() stalled pool shutdown 308 inflight 422 sec\n[ 1474.750521] page_pool_release_retry() stalled pool shutdown 16 inflight 664 sec\nTINFO:ENET up and down test 394 times\n[ 1492.8305\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fec: Usar page_pool_put_full_page al liberar b\u00faferes rx Se us\u00f3 page_pool_release_page al liberar b\u00faferes rx, y esta funci\u00f3n solo desasigna la p\u00e1gina (si est\u00e1 asignada) y no la recicla. Entonces, despu\u00e9s de cientos de subidas y bajadas de eth0, el sistema se quedar\u00e1 sin memoria. Para obtener m\u00e1s detalles, consulte los siguientes pasos de reproducci\u00f3n y los registros de errores. Para resolver este problema y consultar la documentaci\u00f3n del grupo de p\u00e1ginas, se debe usar page_pool_put_full_page para reemplazar page_pool_release_page. Porque esta API intentar\u00e1 reciclar la p\u00e1gina si la referencia de la p\u00e1gina es igual a 1. Despu\u00e9s de probar 20000 veces, el problema ya no se puede reproducir (aproximadamente 391 veces que se prob\u00f3 el problema en i.MX8MN-EVK antes). Pasos de reproducci\u00f3n: Cree el script de prueba y ejec\u00fatelo. El contenido del script es el siguiente: LOOPS=20000 i=1 while [ $i -le $LOOPS ] do echo \"TINFO:ENET $curface up and down test $i times\" org_macaddr=$(cat /sys/class/net/eth0/address) ifconfig eth0 down ifconfig eth0 hw ether $org_macaddr up i=$(expr $i + 1) done sleep 5 if cat /sys/class/net/eth0/operstate | grep 'up';then echo \"TEST PASS\" else echo \"TEST FAIL\" fi Registros de detalles de errores: TINFO: prueba de ENET activada y desactivada 391 veces [850.471205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: controlador PHY conectado (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [853.535318] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: el enlace est\u00e1 listo [853.541694] fec 30be0000.ethernet eth0: el enlace est\u00e1 activo - 1 Gbps/completo - control de flujo rx/tx [870.590531] page_pool_release_retry() apagado del grupo estancado 199 durante el vuelo 60 s [931.006557] page_pool_release_retry() apagado del grupo detenido 199 durante el vuelo 120 s TINFO:ENET prueba de subida y bajada 392 veces [991.426544] page_pool_release_retry() apagado del grupo detenido 192 durante el vuelo 181 s [1051.838531] page_pool_release_retry() apagado del grupo detenido 170 durante el vuelo 241 s [1093.751217] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: controlador PHY conectado (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [1096.446520] page_pool_release_retry() apagado de grupo estancado 308 en vuelo 60 seg [ 1096.831245] fec 30be0000.ethernet eth0: Enlace activo - 1 Gbps/completo - control de flujo rx/tx [ 1096.839092] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: enlace listo [ 1112.254526] page_pool_release_retry() apagado de grupo estancado 103 en vuelo 302 seg [ 1156.862533] page_pool_release_retry() apagado de grupo estancado 308 en vuelo 120 seg [ 1172.674516] page_pool_release_retry() apagado de grupo estancado 103 en vuelo 362 seg [ 1217.278532] page_pool_release_retry() detuvo el apagado del grupo 308 durante el vuelo 181 s TINFO:ENET prueba de subida y bajada 393 veces [ 1233.086535] page_pool_release_retry() detuvo el apagado del grupo 103 durante el vuelo 422 s [ 1277.698513] page_pool_release_retry() detuvo el apagado del grupo 308 durante el vuelo 241 s [ 1293.502525] page_pool_release_retry() detuvo el apagado del grupo 86 durante el vuelo 483 s [ 1338.110518] page_pool_release_retry() detuvo el apagado del grupo 308 durante el vuelo 302 s [ 1353.918540] page_pool_release_retry() detuvo el apagado del grupo 32 durante el vuelo 543 seg [1361.179205] Qualcomm Atheros AR8031/AR8033 30be0000.ethernet-1:00: controlador PHY conectado (mii_bus:phy_addr=30be0000.ethernet-1:00, irq=POLL) [1364.255298] fec 30be0000.ethernet eth0: el enlace est\u00e1 activo - 1 Gbps/completo - control de flujo rx/tx [1364.263189] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: el enlace est\u00e1 listo [1371.998532] page_pool_release_retry() apagado del grupo detenido 310 en vuelo 60 seg [1398.530542] page_pool_release_retry() apagado del grupo detenido 308 en vuelo 362 seg [1414.334539] page_pool_release_retry() apagado del grupo detenido 16 en vuelo 604 seg [1432.414520] page_pool_release_retry() apagado del grupo ---truncado---" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53000.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53000.json index 04ec948ee4a..ebc0af74467 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53000.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53000.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n u16 type = nla_type(nla);\n\n if (type == 0 || type > maxtype) {\n /* error or continue */\n }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netlink: evitar posibles gadgets de Spectre v1 La mayor\u00eda de los atributos de netlink se analizan y validan desde __nla_validate_parse() o validate_nla() u16 type = nla_type(nla); if (type == 0 || type > maxtype) { /* error or continue */ } @type se usa entonces como un \u00edndice de matriz y puede usarse como un gadget de Spectre v1. array_index_nospec() puede usarse para evitar la filtraci\u00f3n de contenido de la memoria del kernel a usuarios maliciosos. Esto deber\u00eda solucionar la gran mayor\u00eda de los usos de netlink, pero se necesita una auditor\u00eda para encargarse de otros donde la validaci\u00f3n a\u00fan no est\u00e1 centralizada en las funciones principales de netlink." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53001.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53001.json index 07f58ec285e..a76da2eb8ff 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53001.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/drm_vma_manager: Add drm_vma_node_allow_once()\n\nCurrently there is no easy way for a drm driver to safely check and allow\ndrm_vma_offset_node for a drm file just once. Allow drm drivers to call\nnon-refcounted version of drm_vma_node_allow() so that a driver doesn't\nneed to keep track of each drm_vma_node_allow() to call subsequent\ndrm_vma_node_revoke() to prevent memory leak." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/drm_vma_manager: A\u00f1adir drm_vma_node_allow_once(). Actualmente, no existe una forma sencilla para que un controlador drm verifique y permita de forma segura drm_vma_offset_node para un archivo drm solo una vez. Se debe permitir que los controladores drm invoquen una versi\u00f3n sin referencia de drm_vma_node_allow() para que el controlador no tenga que registrar cada drm_vma_node_allow() para invocar drm_vma_node_revoke() subsiguiente y as\u00ed evitar fugas de memoria." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53002.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53002.json index 63404c366d4..b9e214d383f 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53002.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix a memory leak with reused mmap_offset\n\ndrm_vma_node_allow() and drm_vma_node_revoke() should be called in\nbalanced pairs. We call drm_vma_node_allow() once per-file everytime a\nuser calls mmap_offset, but only call drm_vma_node_revoke once per-file\non each mmap_offset. As the mmap_offset is reused by the client, the\nper-file vm_count may remain non-zero and the rbtree leaked.\n\nCall drm_vma_node_allow_once() instead to prevent that memory leak." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915: Se solucion\u00f3 una fuga de memoria con la reutilizaci\u00f3n de mmap_offset. drm_vma_node_allow() y drm_vma_node_revoke() deben llamarse en pares equilibrados. Se llama a drm_vma_node_allow() una vez por archivo cada vez que un usuario llama a mmap_offset, pero solo se llama a drm_vma_node_revoke una vez por archivo en cada mmap_offset. Dado que el cliente reutiliza mmap_offset, el valor de vm_count por archivo puede ser distinto de cero y el \u00e1rbol rb se filtra. En su lugar, se llama a drm_vma_node_allow_once() para evitar esta fuga de memoria." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53004.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53004.json index e62bbc328b7..99f6c89ec0a 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53004.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53004.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: fix tmpfile leak\n\nMissed an error cleanup." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ovl: correcci\u00f3n de fuga de archivo temporal No se pudo realizar una limpieza de errores." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53005.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53005.json index a7d6675204d..2e9d51c059a 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53005.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntrace_events_hist: add check for return value of 'create_hist_field'\n\nFunction 'create_hist_field' is called recursively at\ntrace_events_hist.c:1954 and can return NULL-value that's why we have\nto check it to avoid null pointer dereference.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: trace_events_hist: se ha a\u00f1adido una comprobaci\u00f3n del valor de retorno de 'create_hist_field'. La funci\u00f3n 'create_hist_field' se llama recursivamente en trace_events_hist.c:1954 y puede devolver un valor nulo. Por ello, es necesario comprobarla para evitar la desreferencia de punteros nulos. Encontrada por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53006.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53006.json index 72f5b716626..db9620654fa 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53006.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix oops due to uncleared server->smbd_conn in reconnect\n\nIn smbd_destroy(), clear the server->smbd_conn pointer after freeing the\nsmbd_connection struct that it points to so that reconnection doesn't get\nconfused." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: soluciona el error debido a un servidor->smbd_conn sin borrar en la reconexi\u00f3n. En smbd_destroy(), borra el puntero server->smbd_conn despu\u00e9s de liberar la estructura smbd_connection a la que apunta para que la reconexi\u00f3n no se confunda." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53007.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53007.json index eaef6719024..bc394311b8c 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53007.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Make sure trace_printk() can output as soon as it can be used\n\nCurrently trace_printk() can be used as soon as early_trace_init() is\ncalled from start_kernel(). But if a crash happens, and\n\"ftrace_dump_on_oops\" is set on the kernel command line, all you get will\nbe:\n\n [ 0.456075] -0 0dN.2. 347519us : Unknown type 6\n [ 0.456075] -0 0dN.2. 353141us : Unknown type 6\n [ 0.456075] -0 0dN.2. 358684us : Unknown type 6\n\nThis is because the trace_printk() event (type 6) hasn't been registered\nyet. That gets done via an early_initcall(), which may be early, but not\nearly enough.\n\nInstead of registering the trace_printk() event (and other ftrace events,\nwhich are not trace events) via an early_initcall(), have them registered at\nthe same time that trace_printk() can be used. This way, if there is a\ncrash before early_initcall(), then the trace_printk()s will actually be\nuseful." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rastreo: Aseg\u00farese de que trace_printk() pueda generar resultados tan pronto como sea posible. Actualmente, trace_printk() puede usarse tan pronto como se llame a early_trace_init() desde start_kernel(). Sin embargo, si se produce un fallo y se configura \"ftrace_dump_on_oops\" en la l\u00ednea de comandos del kernel, solo se obtendr\u00e1: [ 0.456075] -0 0dN.2.347519us : Tipo desconocido 6 [ 0.456075] -0 0dN.2.353141us : Tipo desconocido 6 [ 0.456075] -0 0dN.2.358684us : Tipo desconocido 6. Esto se debe a que el evento trace_printk() (tipo 6) a\u00fan no se ha registrado. Esto se realiza mediante una llamada early_initcall(), que puede ser temprana, pero no lo suficiente. En lugar de registrar el evento trace_printk() (y otros eventos ftrace, que no son eventos de seguimiento) mediante una llamada early_initcall(), reg\u00edstrelos al mismo tiempo que trace_printk(). De esta forma, si se produce un fallo antes de la llamada early_initcall(), las llamadas trace_printk() ser\u00e1n realmente \u00fatiles." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53008.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53008.json index af53d955f2c..c2c76640824 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53008.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential memory leaks in session setup\n\nMake sure to free cifs_ses::auth_key.response before allocating it as\nwe might end up leaking memory in reconnect or mounting." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige posibles fugas de memoria en la configuraci\u00f3n de la sesi\u00f3n. Aseg\u00farese de liberar cifs_ses::auth_key.response antes de asignarlo, ya que podr\u00edamos terminar perdiendo memoria durante la reconexi\u00f3n o el montaje." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53009.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53009.json index f17ef381e4e..0ab70f607fe 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53009.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53009.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Add sync after creating vram bo\n\nThere will be data corruption on vram allocated by svm\nif the initialization is not complete and application is\nwritting on the memory. Adding sync to wait for the\ninitialization completion is to resolve this issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: A\u00f1adir sincronizaci\u00f3n despu\u00e9s de crear la VRAM. Se producir\u00e1n da\u00f1os en los datos de la VRAM asignada por SVM si la inicializaci\u00f3n no se completa y la aplicaci\u00f3n est\u00e1 escribiendo en la memoria. A\u00f1adir sincronizaci\u00f3n para esperar a que se complete la inicializaci\u00f3n resuelve este problema." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53010.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53010.json index fcf7b7be3bb..012148d9aa8 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53010.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: Do not read past the end of test names\n\nTest names were being concatenated based on a offset beyond the end of\nthe first name, which tripped the buffer overflow detection logic:\n\n detected buffer overflow in strnlen\n [...]\n Call Trace:\n bnxt_ethtool_init.cold+0x18/0x18\n\nRefactor struct hwrm_selftest_qlist_output to use an actual array,\nand adjust the concatenation to use snprintf() rather than a series of\nstrncat() calls." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bnxt: No leer m\u00e1s all\u00e1 del final de los nombres de prueba Los nombres de prueba se estaban concatenando en funci\u00f3n de un desplazamiento m\u00e1s all\u00e1 del final del primer nombre, lo que activaba la l\u00f3gica de detecci\u00f3n de desbordamiento de b\u00fafer: desbordamiento de b\u00fafer detectado en strnlen [...] Seguimiento de llamadas: bnxt_ethtool_init.cold+0x18/0x18 Refactorice la estructura hwrm_selftest_qlist_output para usar una matriz real y ajuste la concatenaci\u00f3n para usar snprintf() en lugar de una serie de llamadas strncat()." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53011.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53011.json index cd0e819b0df..7cbc59edb8e 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53011.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53011.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: enable all safety features by default\n\nIn the original implementation of dwmac5\ncommit 8bf993a5877e (\"net: stmmac: Add support for DWMAC5 and implement Safety Features\")\nall safety features were enabled by default.\n\nLater it seems some implementations didn't have support for all the\nfeatures, so in\ncommit 5ac712dcdfef (\"net: stmmac: enable platform specific safety features\")\nthe safety_feat_cfg structure was added to the callback and defined for\nsome platforms to selectively enable these safety features.\n\nThe problem is that only certain platforms were given that software\nsupport. If the automotive safety package bit is set in the hardware\nfeatures register the safety feature callback is called for the platform,\nand for platforms that didn't get a safety_feat_cfg defined this results\nin the following NULL pointer dereference:\n\n[ 7.933303] Call trace:\n[ 7.935812] dwmac5_safety_feat_config+0x20/0x170 [stmmac]\n[ 7.941455] __stmmac_open+0x16c/0x474 [stmmac]\n[ 7.946117] stmmac_open+0x38/0x70 [stmmac]\n[ 7.950414] __dev_open+0x100/0x1dc\n[ 7.954006] __dev_change_flags+0x18c/0x204\n[ 7.958297] dev_change_flags+0x24/0x6c\n[ 7.962237] do_setlink+0x2b8/0xfa4\n[ 7.965827] __rtnl_newlink+0x4ec/0x840\n[ 7.969766] rtnl_newlink+0x50/0x80\n[ 7.973353] rtnetlink_rcv_msg+0x12c/0x374\n[ 7.977557] netlink_rcv_skb+0x5c/0x130\n[ 7.981500] rtnetlink_rcv+0x18/0x2c\n[ 7.985172] netlink_unicast+0x2e8/0x340\n[ 7.989197] netlink_sendmsg+0x1a8/0x420\n[ 7.993222] ____sys_sendmsg+0x218/0x280\n[ 7.997249] ___sys_sendmsg+0xac/0x100\n[ 8.001103] __sys_sendmsg+0x84/0xe0\n[ 8.004776] __arm64_sys_sendmsg+0x24/0x30\n[ 8.008983] invoke_syscall+0x48/0x114\n[ 8.012840] el0_svc_common.constprop.0+0xcc/0xec\n[ 8.017665] do_el0_svc+0x38/0xb0\n[ 8.021071] el0_svc+0x2c/0x84\n[ 8.024212] el0t_64_sync_handler+0xf4/0x120\n[ 8.028598] el0t_64_sync+0x190/0x194\n\nGo back to the original behavior, if the automotive safety package\nis found to be supported in hardware enable all the features unless\nsafety_feat_cfg is passed in saying this particular platform only\nsupports a subset of the features." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: stmmac: habilitar todas las funciones de seguridad por defecto. En la implementaci\u00f3n original del commit 8bf993a5877e de dwmac5 (\"net: stmmac: A\u00f1adir soporte para DWMAC5 e implementar funciones de seguridad\"), todas las funciones de seguridad estaban habilitadas por defecto. Posteriormente, parece que algunas implementaciones no eran compatibles con todas las funciones, por lo que en el commit 5ac712dcdfef (\"net: stmmac: habilitar funciones de seguridad espec\u00edficas de la plataforma\") se a\u00f1adi\u00f3 la estructura safety_feat_cfg a la devoluci\u00f3n de llamada y se defini\u00f3 para algunas plataformas con el fin de habilitar selectivamente estas funciones de seguridad. El problema radica en que solo ciertas plataformas recibieron este soporte de software. Si el bit del paquete de seguridad automotriz est\u00e1 configurado en el registro de caracter\u00edsticas de hardware, se llama a la devoluci\u00f3n de llamada de la caracter\u00edstica de seguridad para la plataforma y, para las plataformas que no tienen un safety_feat_cfg definido, esto da como resultado la siguiente desreferencia de puntero NULL: [7.933303] Rastreo de llamada: [ 7.935812] dwmac5_safety_feat_config+0x20/0x170 [stmmac] [ 7.941455] __stmmac_open+0x16c/0x474 [stmmac] [ 7.946117] stmmac_open+0x38/0x70 [stmmac] [ 7.950414] __dev_open+0x100/0x1dc [ 7.954006] __dev_change_flags+0x18c/0x204 [ 7.958297] dev_change_flags+0x24/0x6c [ 7.962237] do_setlink+0x2b8/0xfa4 [ 7.965827] __rtnl_newlink+0x4ec/0x840 [ 7.969766] rtnl_newlink+0x50/0x80 [ 7.973353] rtnetlink_rcv_msg+0x12c/0x374 [ 7.977557] netlink_rcv_skb+0x5c/0x130 [ 7.981500] rtnetlink_rcv+0x18/0x2c [ 7.985172] netlink_unicast+0x2e8/0x340 [ 7.989197] netlink_sendmsg+0x1a8/0x420 [ 7.993222] ____sys_sendmsg+0x218/0x280 [ 7.997249] ___sys_sendmsg+0xac/0x100 [ 8.001103] __sys_sendmsg+0x84/0xe0 [ 8.004776] __arm64_sys_sendmsg+0x24/0x30 [ 8.008983] invoke_syscall+0x48/0x114 [ 8.012840] el0_svc_common.constprop.0+0xcc/0xec [ 8.017665] do_el0_svc+0x38/0xb0 [ 8.021071] el0_svc+0x2c/0x84 [ 8.024212] el0t_64_sync_handler+0xf4/0x120 [ 8.028598] el0t_64_sync+0x190/0x194 Regrese al comportamiento original, si se descubre que el paquete de seguridad automotriz es compatible con el hardware, habilite todas las funciones a menos que se pase safety_feat_cfg indicando que esta plataforma en particular solo admite un subconjunto de las funciones." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53012.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53012.json index 2d992981685..fc930cca7a0 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53012.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53012.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: call put_device() only after device_register() fails\n\nput_device() shouldn't be called before a prior call to\ndevice_register(). __thermal_cooling_device_register() doesn't follow\nthat properly and needs fixing. Also\nthermal_cooling_device_destroy_sysfs() is getting called unnecessarily\non few error paths.\n\nFix all this by placing the calls at the right place.\n\nBased on initial work done by Caleb Connolly." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: thermal: core: llamar a put_device() solo despu\u00e9s de que device_register() falle. No se debe llamar a put_device() antes de una llamada previa a device_register(). __thermal_cooling_device_register() no sigue esto correctamente y necesita soluci\u00f3n. Adem\u00e1s, se llama a thermal_cooling_device_destroy_sysfs() innecesariamente en algunas rutas de error. Para solucionar esto, coloque las llamadas en el lugar correcto. Basado en el trabajo inicial de Caleb Connolly." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53013.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53013.json index 9ca7639e12f..d0276af99f6 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53013.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nptdma: pt_core_execute_cmd() should use spinlock\n\nThe interrupt handler (pt_core_irq_handler()) of the ptdma\ndriver can be called from interrupt context. The code flow\nin this function can lead down to pt_core_execute_cmd() which\nwill attempt to grab a mutex, which is not appropriate in\ninterrupt context and ultimately leads to a kernel panic.\nThe fix here changes this mutex to a spinlock, which has\nbeen verified to resolve the issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ptdma: pt_core_execute_cmd() deber\u00eda usar un bloqueo de giro. El manejador de interrupciones (pt_core_irq_handler()) del controlador ptdma puede llamarse desde el contexto de interrupci\u00f3n. El flujo de c\u00f3digo en esta funci\u00f3n puede derivar en pt_core_execute_cmd(), que intentar\u00e1 obtener un mutex, lo cual no es apropiado en el contexto de interrupci\u00f3n y, en \u00faltima instancia, provoca un p\u00e1nico del kernel. Esta correcci\u00f3n convierte este mutex en un bloqueo de giro, lo cual se ha verificado para resolver el problema." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53014.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53014.json index c4ab7260229..f23f3e2e00d 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53014.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53014.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: tegra: Fix memory leak in terminate_all()\n\nTerminate vdesc when terminating an ongoing transfer.\nThis will ensure that the vdesc is present in the desc_terminated list\nThe descriptor will be freed later in desc_free_list().\n\nThis fixes the memory leaks which can happen when terminating an\nongoing transfer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: tegra: Se corrige la fuga de memoria en la funci\u00f3n \"terminate_all()\". Se finaliza vdesc al finalizar una transferencia en curso. Esto garantiza que vdesc est\u00e9 presente en la lista \"desc_terminated\". El descriptor se liberar\u00e1 posteriormente en \"desc_free_list()\". Esto corrige las fugas de memoria que pueden ocurrir al finalizar una transferencia en curso." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53015.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53015.json index 9936e0b46f6..71c165d103a 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53015.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: check shape of output reports\n\nbetopff_init() only checks the total sum of the report counts for each\nreport field to be at least 4, but hid_betopff_play() expects 4 report\nfields.\nA device advertising an output report with one field and 4 report counts\nwould pass the check but crash the kernel with a NULL pointer dereference\nin hid_betopff_play()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: betop: comprobar la forma de los informes de salida. betopff_init() solo comprueba que la suma total de los recuentos de informes de cada campo sea al menos 4, pero hid_betopff_play() espera 4 campos. Un dispositivo que anuncia un informe de salida con un campo y 4 recuentos superar\u00eda la comprobaci\u00f3n, pero bloquear\u00eda el kernel con una desreferencia de puntero NULL en hid_betopff_play()." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53016.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53016.json index b37d28f845b..97be189a8bc 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53016.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53016.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:50.983", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix possible deadlock in rfcomm_sk_state_change\n\nsyzbot reports a possible deadlock in rfcomm_sk_state_change [1].\nWhile rfcomm_sock_connect acquires the sk lock and waits for\nthe rfcomm lock, rfcomm_sock_release could have the rfcomm\nlock and hit a deadlock for acquiring the sk lock.\nHere's a simplified flow:\n\nrfcomm_sock_connect:\n lock_sock(sk)\n rfcomm_dlc_open:\n rfcomm_lock()\n\nrfcomm_sock_release:\n rfcomm_sock_shutdown:\n rfcomm_lock()\n __rfcomm_dlc_close:\n rfcomm_k_state_change:\n\t lock_sock(sk)\n\nThis patch drops the sk lock before calling rfcomm_dlc_open to\navoid the possible deadlock and holds sk's reference count to\nprevent use-after-free after rfcomm_dlc_open completes." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Se soluciona un posible bloqueo en rfcomm_sk_state_change syzbot informa de un posible bloqueo en rfcomm_sk_state_change [1]. Mientras rfcomm_sock_connect adquiere el bloqueo sk y espera el bloqueo rfcomm, rfcomm_sock_release podr\u00eda tener el bloqueo rfcomm y llegar a un bloqueo para adquirir el bloqueo sk. Aqu\u00ed hay un flujo simplificado: rfcomm_sock_connect: lock_sock(sk) rfcomm_dlc_open: rfcomm_lock() rfcomm_sock_release: rfcomm_sock_shutdown: rfcomm_lock() __rfcomm_dlc_close: rfcomm_k_state_change: lock_sock(sk) Este parche elimina el bloqueo de sk antes de llamar a rfcomm_dlc_open para evitar el posible bloqueo y mantiene el recuento de referencia de sk para evitar el use-after-free despu\u00e9s de que se completa rfcomm_dlc_open." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53017.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53017.json index 4bfc177937f..f77c985dfc2 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53017.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53017.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:51.103", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: fix memory leak in hci_update_adv_data()\n\nWhen hci_cmd_sync_queue() failed in hci_update_adv_data(), inst_ptr is\nnot freed, which will cause memory leak, convert to use ERR_PTR/PTR_ERR\nto pass the instance to callback so no memory needs to be allocated." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: hci_sync: corrige p\u00e9rdida de memoria en hci_update_adv_data() Cuando hci_cmd_sync_queue() falla en hci_update_adv_data(), inst_ptr no se libera, lo que provocar\u00e1 una p\u00e9rdida de memoria. Convierta para usar ERR_PTR/PTR_ERR para pasar la instancia a la devoluci\u00f3n de llamada, de modo que no sea necesario asignar memoria." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53018.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53018.json index fe077ba701a..2ade34cd4b5 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53018.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53018.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:51.223", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_conn: Fix memory leaks\n\nWhen hci_cmd_sync_queue() failed in hci_le_terminate_big() or\nhci_le_big_terminate(), the memory pointed by variable d is not freed,\nwhich will cause memory leak. Add release process to error path." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: hci_conn: Se corrigen fugas de memoria. Cuando hci_cmd_sync_queue() falla en hci_le_terminate_big() o hci_le_big_terminate(), la memoria apuntada por la variable d no se libera, lo que provoca una fuga de memoria. Se a\u00f1ade el proceso de liberaci\u00f3n a la ruta de error." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53019.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53019.json index 7ca667af6e0..7e6304bc6e5 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53019.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53019.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: validate parameter addr in mdiobus_get_phy()\n\nThe caller may pass any value as addr, what may result in an out-of-bounds\naccess to array mdio_map. One existing case is stmmac_init_phy() that\nmay pass -1 as addr. Therefore validate addr before using it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mdio: validar el par\u00e1metro addr en mdiobus_get_phy(). El llamador puede pasar cualquier valor como addr, lo que puede resultar en un acceso fuera de l\u00edmites a la matriz mdio_map. Un caso existente es stmmac_init_phy(), que puede pasar -1 como addr. Por lo tanto, valide addr antes de usarlo." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53020.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53020.json index c30528dab11..ca897998b00 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53020.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53020.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:51.457", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: close all race conditions in l2tp_tunnel_register()\n\nThe code in l2tp_tunnel_register() is racy in several ways:\n\n1. It modifies the tunnel socket _after_ publishing it.\n\n2. It calls setup_udp_tunnel_sock() on an existing socket without\n locking.\n\n3. It changes sock lock class on fly, which triggers many syzbot\n reports.\n\nThis patch amends all of them by moving socket initialization code\nbefore publishing and under sock lock. As suggested by Jakub, the\nl2tp lockdep class is not necessary as we can just switch to\nbh_lock_sock_nested()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: l2tp: cierra todas las condiciones de ejecuci\u00f3n en l2tp_tunnel_register() El c\u00f3digo en l2tp_tunnel_register() es de alto riesgo de varias maneras: 1. Modifica el socket _after_ publishing it. 2. Llama a setup_udp_tunnel_sock() en un socket existente sin bloquearlo. 3. Cambia la clase de bloqueo de sock sobre la marcha, lo que activa muchos informes de syzbot. Este parche las enmienda todas moviendo el c\u00f3digo de inicializaci\u00f3n del socket antes de publicarlo y bajo el bloqueo de sock. Como sugiri\u00f3 Jakub, la clase l2tp lockdep no es necesaria ya que podemos simplemente cambiar a bh_lock_sock_nested()." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53022.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53022.json index fe07fd24aeb..d2e5f6a1e14 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53022.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53022.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:51.710", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\n\nThis lockdep splat says it better than I could:\n\n================================\nWARNING: inconsistent lock state\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage.\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\n{IN-SOFTIRQ-W} state was registered at:\n _raw_spin_lock+0x5c/0xc0\n sch_direct_xmit+0x148/0x37c\n __dev_queue_xmit+0x528/0x111c\n ip6_finish_output2+0x5ec/0xb7c\n ip6_finish_output+0x240/0x3f0\n ip6_output+0x78/0x360\n ndisc_send_skb+0x33c/0x85c\n ndisc_send_rs+0x54/0x12c\n addrconf_rs_timer+0x154/0x260\n call_timer_fn+0xb8/0x3a0\n __run_timers.part.0+0x214/0x26c\n run_timer_softirq+0x3c/0x74\n __do_softirq+0x14c/0x5d8\n ____do_softirq+0x10/0x20\n call_on_irq_stack+0x2c/0x5c\n do_softirq_own_stack+0x1c/0x30\n __irq_exit_rcu+0x168/0x1a0\n irq_exit_rcu+0x10/0x40\n el1_interrupt+0x38/0x64\nirq event stamp: 7825\nhardirqs last enabled at (7825): [] exit_to_kernel_mode+0x34/0x130\nhardirqs last disabled at (7823): [] __do_softirq+0x550/0x5d8\nsoftirqs last enabled at (7824): [] __do_softirq+0x46c/0x5d8\nsoftirqs last disabled at (7811): [] ____do_softirq+0x10/0x20\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(_xmit_ETHER#2);\n \n lock(_xmit_ETHER#2);\n\n *** DEADLOCK ***\n\n3 locks held by kworker/1:3/179:\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #1: ffff80000a0bbdc8 ((work_completion)(&priv->tx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #2: ffff3ec4036cd438 (&dev->tx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\n\nWorkqueue: events enetc_tx_onestep_tstamp\nCall trace:\n print_usage_bug.part.0+0x208/0x22c\n mark_lock+0x7f0/0x8b0\n __lock_acquire+0x7c4/0x1ce0\n lock_acquire.part.0+0xe0/0x220\n lock_acquire+0x68/0x84\n _raw_spin_lock+0x5c/0xc0\n netif_freeze_queues+0x5c/0xc0\n netif_tx_lock+0x24/0x34\n enetc_tx_onestep_tstamp+0x20/0x100\n process_one_work+0x28c/0x6c0\n worker_thread+0x74/0x450\n kthread+0x118/0x11c\n\nbut I'll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\nprocess context, therefore with softirqs enabled (i.o.w., it can be\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\nthe netif_tx_lock() a second time and deadlock the kernel.\n\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\nrunning." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: enetc: evitar bloqueo en enetc_tx_onestep_tstamp() Este splat de lockdep lo dice mejor de lo que yo podr\u00eda: ================================ ADVERTENCIA: estado de bloqueo inconsistente 6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 No contaminado -------------------------------- uso inconsistente de {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W}. kworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] toma: ffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, en: netif_freeze_queues+0x5c/0xc0 {IN-SOFTIRQ-W} estado se registr\u00f3 en: _raw_spin_lock+0x5c/0xc0 sch_direct_xmit+0x148/0x37c __dev_queue_xmit+0x528/0x111c ip6_finish_output2+0x5ec/0xb7c ip6_finish_output+0x240/0x3f0 ip6_output+0x78/0x360 ndisc_send_skb+0x33c/0x85c ndisc_send_rs+0x54/0x12c addrconf_rs_timer+0x154/0x260 call_timer_fn+0xb8/0x3a0 __run_timers.part.0+0x214/0x26c run_timer_softirq+0x3c/0x74 __do_softirq+0x14c/0x5d8 ____do_softirq+0x10/0x20 call_on_irq_stack+0x2c/0x5c do_softirq_own_stack+0x1c/0x30 __irq_exit_rcu+0x168/0x1a0 irq_exit_rcu+0x10/0x40 el1_interrupt+0x38/0x64 marca de evento de irq: 7825 hardirqs habilitados por \u00faltima vez en (7825): [] exit_to_kernel_mode+0x34/0x130 hardirqs deshabilitados por \u00faltima vez en (7823): [] __do_softirq+0x550/0x5d8 softirqs habilitados por \u00faltima vez en (7824): [] __do_softirq+0x46c/0x5d8 softirqs deshabilitados por \u00faltima vez en (7811): [] ____do_softirq+0x10/0x20 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(_xmit_ETHER#2); lock(_xmit_ETHER#2); *** BLOQUEO INTERMEDIO *** 3 bloqueos mantenidos por kworker/1:3/179: #0: ffff3ec400004748 ((wq_completion)eventos){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #1: ffff80000a0bbdc8 ((work_completion)(&priv->tx_onestep_tstamp)){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #2: ffff3ec4036cd438 (&dev->tx_global_lock){+.+.}-{3:3}, en: netif_tx_lock+0x1c/0x34 Cola de trabajo: eventos enetc_tx_onestep_tstamp Rastreo de llamadas: print_usage_bug.part.0+0x208/0x22c mark_lock+0x7f0/0x8b0 __lock_acquire+0x7c4/0x1ce0 lock_acquire.part.0+0xe0/0x220 lock_acquire+0x68/0x84 _raw_spin_lock+0x5c/0xc0 netif_freeze_queues+0x5c/0xc0 netif_tx_lock+0x24/0x34 enetc_tx_onestep_tstamp+0x20/0x100 process_one_work+0x28c/0x6c0worker_thread+0x74/0x450 kthread+0x118/0x11c pero lo dir\u00e9 de todos modos: el elemento de trabajo enetc_tx_onestep_tstamp() se ejecuta en el contexto del proceso, por lo tanto, con softirqs habilitado (Es decir, puede ser interrumpido por un softirq). Si mantenemos la ejecuci\u00f3n de netif_tx_lock() cuando hay una interrupci\u00f3n, y luego se programa el softirq NET_TX, se ejecutar\u00e1 netif_tx_lock() por segunda vez y se bloquear\u00e1 el kernel. Para solucionar esto, use netif_tx_lock_bh(), que impide la ejecuci\u00f3n de los softirq." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53024.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53024.json index 2dcb3d665fc..4d72d51edaf 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53024.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix pointer-leak due to insufficient speculative store bypass mitigation\n\nTo mitigate Spectre v4, 2039f26f3aca (\"bpf: Fix leakage due to\ninsufficient speculative store bypass mitigation\") inserts lfence\ninstructions after 1) initializing a stack slot and 2) spilling a\npointer to the stack.\n\nHowever, this does not cover cases where a stack slot is first\ninitialized with a pointer (subject to sanitization) but then\noverwritten with a scalar (not subject to sanitization because\nthe slot was already initialized). In this case, the second write\nmay be subject to speculative store bypass (SSB) creating a\nspeculative pointer-as-scalar type confusion. This allows the\nprogram to subsequently leak the numerical pointer value using,\nfor example, a branch-based cache side channel.\n\nTo fix this, also sanitize scalars if they write a stack slot\nthat previously contained a pointer. Assuming that pointer-spills\nare only generated by LLVM on register-pressure, the performance\nimpact on most real-world BPF programs should be small.\n\nThe following unprivileged BPF bytecode drafts a minimal exploit\nand the mitigation:\n\n [...]\n // r6 = 0 or 1 (skalar, unknown user input)\n // r7 = accessible ptr for side channel\n // r10 = frame pointer (fp), to be leaked\n //\n r9 = r10 # fp alias to encourage ssb\n *(u64 *)(r9 - 8) = r10 // fp[-8] = ptr, to be leaked\n // lfence added here because of pointer spill to stack.\n //\n // Ommitted: Dummy bpf_ringbuf_output() here to train alias predictor\n // for no r9-r10 dependency.\n //\n *(u64 *)(r10 - 8) = r6 // fp[-8] = scalar, overwrites ptr\n // 2039f26f3aca: no lfence added because stack slot was not STACK_INVALID,\n // store may be subject to SSB\n //\n // fix: also add an lfence when the slot contained a ptr\n //\n r8 = *(u64 *)(r9 - 8)\n // r8 = architecturally a scalar, speculatively a ptr\n //\n // leak ptr using branch-based cache side channel:\n r8 &= 1 // choose bit to leak\n if r8 == 0 goto SLOW // no mispredict\n // architecturally dead code if input r6 is 0,\n // only executes speculatively iff ptr bit is 1\n r8 = *(u64 *)(r7 + 0) # encode bit in cache (0: slow, 1: fast)\nSLOW:\n [...]\n\nAfter running this, the program can time the access to *(r7 + 0) to\ndetermine whether the chosen pointer bit was 0 or 1. Repeat this 64\ntimes to recover the whole address on amd64.\n\nIn summary, sanitization can only be skipped if one scalar is\noverwritten with another scalar. Scalar-confusion due to speculative\nstore bypass can not lead to invalid accesses because the pointer\nbounds deducted during verification are enforced using branchless\nlogic. See 979d63d50c0c (\"bpf: prevent out of bounds speculation on\npointer arithmetic\") for details.\n\nDo not make the mitigation depend on !env->allow_{uninit_stack,ptr_leaks}\nbecause speculative leaks are likely unexpected if these were enabled.\nFor example, leaking the address to a protected log file may be acceptable\nwhile disabling the mitigation might unintentionally leak the address\ninto the cached-state of a map that is accessible to unprivileged\nprocesses." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Fix pointer-leak due to lowest speculative store bypass mitigation Para mitigar Spectre v4, 2039f26f3aca (\"bpf: Fix leakage due to lowest speculative store bypass mitigation\") inserta instrucciones lfence despu\u00e9s de 1) inicializar una ranura de pila y 2) derramar un puntero a la pila. Sin embargo, esto no cubre los casos en los que una ranura de pila se inicializa primero con un puntero (sujeto a depuraci\u00f3n) pero luego se sobrescribe con un escalar (no sujeto a depuraci\u00f3n porque la ranura ya estaba inicializada). En este caso, la segunda escritura puede estar sujeta a la derivaci\u00f3n de almac\u00e9n especulativo (SSB), creando una confusi\u00f3n de tipo de puntero especulativo como escalar. Esto permite que el programa filtre posteriormente el valor del puntero num\u00e9rico utilizando, por ejemplo, un canal lateral de cach\u00e9 basado en bifurcaci\u00f3n. Para solucionar esto, tambi\u00e9n depura los escalares si escriben en una ranura de pila que anteriormente conten\u00eda un puntero. Suponiendo que los derrames de puntero solo son generados por LLVM bajo presi\u00f3n de registro, el impacto en el rendimiento de la mayor\u00eda de los programas BPF del mundo real deber\u00eda ser m\u00ednimo. El siguiente c\u00f3digo de bytes BPF sin privilegios describe un exploit m\u00ednimo y su mitigaci\u00f3n: [...] // r6 = 0 o 1 (escalar, entrada de usuario desconocida) // r7 = ptr accesible para canal lateral // r10 = puntero de trama (fp), a filtrar // r9 = r10 # alias de fp para fomentar ssb *(u64 *)(r9 - 8) = r10 // fp[-8] = ptr, a filtrar // Se a\u00f1adi\u00f3 lfence debido al derrame de puntero a la pila. // // Omitido: bpf_ringbuf_output() ficticio para entrenar el predictor de alias // para la ausencia de dependencia entre r9 y r10. // *(u64 *)(r10 - 8) = r6 // fp[-8] = escalar, sobrescribe ptr // 2039f26f3aca: no se agreg\u00f3 lfence porque la ranura de pila no era STACK_INVALID, // el almacenamiento puede estar sujeto a SSB // // correcci\u00f3n: tambi\u00e9n se agrega una lfence cuando la ranura conten\u00eda un ptr // r8 = *(u64 *)(r9 - 8) // r8 = arquitect\u00f3nicamente un escalar, especulativamente un ptr // // fuga de ptr usando el canal lateral de cach\u00e9 basado en ramas: r8 &= 1 // elige el bit a fugar si r8 == 0 goto SLOW // sin predicci\u00f3n err\u00f3nea // c\u00f3digo arquitect\u00f3nicamente muerto si la entrada r6 es 0, // solo se ejecuta especulativamente si el bit ptr es 1 r8 = *(u64 *)(r7 + 0) # codificar bit en cach\u00e9 (0: lento, 1: r\u00e1pido) SLOW: [...] Despu\u00e9s de ejecutar esto, el programa Puede cronometrar el acceso a *(r7 + 0) para determinar si el bit de puntero seleccionado era 0 o 1. Repita esto 64 veces para recuperar la direcci\u00f3n completa en amd64. En resumen, la depuraci\u00f3n solo se puede omitir si un escalar se sobrescribe con otro. La confusi\u00f3n escalar debido a la omisi\u00f3n del almacenamiento especulativo no puede conducir a accesos inv\u00e1lidos porque los l\u00edmites del puntero deducidos durante la verificaci\u00f3n se aplican mediante l\u00f3gica sin ramificaciones. Consulte 979d63d50c0c (\"bpf: evitar especulaci\u00f3n fuera de los l\u00edmites en aritm\u00e9tica de punteros\") para obtener m\u00e1s detalles. No haga que la mitigaci\u00f3n dependa de !env->allow_{uninit_stack,ptr_leaks} porque es probable que se produzcan fugas especulativas inesperadas si se habilitan. Por ejemplo, filtrar la direcci\u00f3n a un archivo de registro protegido puede ser aceptable, mientras que deshabilitar la mitigaci\u00f3n podr\u00eda filtrar involuntariamente la direcci\u00f3n al estado en cach\u00e9 de un mapa al que pueden acceder procesos sin privilegios." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53026.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53026.json index 5c5b6edd7f5..fcd3b920186 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53026.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53026.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:52.250", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Fix ib block iterator counter overflow\n\nWhen registering a new DMA MR after selecting the best aligned page size\nfor it, we iterate over the given sglist to split each entry to smaller,\naligned to the selected page size, DMA blocks.\n\nIn given circumstances where the sg entry and page size fit certain\nsizes and the sg entry is not aligned to the selected page size, the\ntotal size of the aligned pages we need to cover the sg entry is >= 4GB.\nUnder this circumstances, while iterating page aligned blocks, the\ncounter responsible for counting how much we advanced from the start of\nthe sg entry is overflowed because its type is u32 and we pass 4GB in\nsize. This can lead to an infinite loop inside the iterator function\nbecause the overflow prevents the counter to be larger\nthan the size of the sg entry.\n\nFix the presented problem by changing the advancement condition to\neliminate overflow.\n\nBacktrace:\n[ 192.374329] efa_reg_user_mr_dmabuf\n[ 192.376783] efa_register_mr\n[ 192.382579] pgsz_bitmap 0xfffff000 rounddown 0x80000000\n[ 192.386423] pg_sz [0x80000000] umem_length[0xc0000000]\n[ 192.392657] start 0x0 length 0xc0000000 params.page_shift 31 params.page_num 3\n[ 192.399559] hp_cnt[3], pages_in_hp[524288]\n[ 192.403690] umem->sgt_append.sgt.nents[1]\n[ 192.407905] number entries: [1], pg_bit: [31]\n[ 192.411397] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]\n[ 192.415601] biter->__sg_advance [665837568] sg_dma_len[3221225472]\n[ 192.419823] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]\n[ 192.423976] biter->__sg_advance [2813321216] sg_dma_len[3221225472]\n[ 192.428243] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]\n[ 192.432397] biter->__sg_advance [665837568] sg_dma_len[3221225472]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/core: Fix ib block iterator counter overflow Al registrar un nuevo DMA MR despu\u00e9s de seleccionar el mejor tama\u00f1o de p\u00e1gina alineado para \u00e9l, iteramos sobre la sglist dada para dividir cada entrada en bloques DMA m\u00e1s peque\u00f1os, alineados con el tama\u00f1o de p\u00e1gina seleccionado. En determinadas circunstancias en las que la entrada sg y el tama\u00f1o de p\u00e1gina se ajustan a ciertos tama\u00f1os y la entrada sg no est\u00e1 alineada con el tama\u00f1o de p\u00e1gina seleccionado, el tama\u00f1o total de las p\u00e1ginas alineadas que necesitamos para cubrir la entrada sg es >= 4 GB. En estas circunstancias, al iterar bloques alineados de p\u00e1gina, el contador responsable de contar cu\u00e1nto avanzamos desde el inicio de la entrada sg se desborda porque su tipo es u32 y pasamos 4 GB de tama\u00f1o. Esto puede llevar a un bucle infinito dentro de la funci\u00f3n del iterador porque el desbordamiento impide que el contador sea mayor que el tama\u00f1o de la entrada sg. Solucione el problema presentado cambiando la condici\u00f3n de avance para eliminar el desbordamiento. Backtrace: [ 192.374329] efa_reg_user_mr_dmabuf [ 192.376783] efa_register_mr [ 192.382579] pgsz_bitmap 0xfffff000 rounddown 0x80000000 [ 192.386423] pg_sz [0x80000000] umem_length[0xc0000000] [ 192.392657] start 0x0 length 0xc0000000 params.page_shift 31 params.page_num 3 [ 192.399559] hp_cnt[3], pages_in_hp[524288] [ 192.403690] umem->sgt_append.sgt.nents[1] [ 192.407905] number entries: [1], pg_bit: [31] [ 192.411397] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.415601] biter->__sg_advance [665837568] sg_dma_len[3221225472] [ 192.419823] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.423976] biter->__sg_advance [2813321216] sg_dma_len[3221225472] [ 192.428243] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8] [ 192.432397] biter->__sg_advance [665837568] sg_dma_len[3221225472] " } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53028.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53028.json index b239648f194..512213a0acf 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53028.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53028.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:52.507", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"wifi: mac80211: fix memory leak in ieee80211_if_add()\"\n\nThis reverts commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293.\n\nieee80211_if_free() is already called from free_netdev(ndev)\nbecause ndev->priv_destructor == ieee80211_if_free\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]\nCPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller-00388-g55b98837e37d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nRIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [inline]\nRIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [inline]\nRIP: 0010:free_percpu mm/percpu.c:2271 [inline]\nRIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254\nCode: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc\nRSP: 0018:ffffc90004ba7068 EFLAGS: 00010002\nRAX: 0000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004\nRDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020\nRBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000\nR13: 0000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988\nFS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b32220000 CR3: 000000004914f000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\nnetdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352\nieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411\nmac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583\nhwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176\ngenl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968\ngenl_family_rcv_msg net/netlink/genetlink.c:1048 [inline]\ngenl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065\nnetlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564\ngenl_rcv+0x28/0x40 net/netlink/genetlink.c:1076\nnetlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]\nnetlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356\nnetlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932\nsock_sendmsg_nosec net/socket.c:714 [inline]\nsock_sendmsg+0xd3/0x120 net/socket.c:734\n____sys_sendmsg+0x712/0x8c0 net/socket.c:2476\n___sys_sendmsg+0x110/0x1b0 net/socket.c:2530\n__sys_sendmsg+0xf7/0x1c0 net/socket.c:2559\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"wifi: mac80211: corregir p\u00e9rdida de memoria en ieee80211_if_add()\" Esto revierte el commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293. ieee80211_if_free() ya se llama desde free_netdev(ndev) porque ndev->priv_destructor == ieee80211_if_free syzbot inform\u00f3: error de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en el rango [0x000000000000020-0x0000000000000027] CPU: 0 PID: 10041 Comm: syz-executor.0 No contaminado 6.2.0-rc2-syzkaller-00388-g55b98837e37d #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 RIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [en l\u00ednea] RIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [en l\u00ednea] RIP: 0010:free_percpu mm/percpu.c:2271 [en l\u00ednea] RIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254 C\u00f3digo: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc90004ba7068 EFLAGS: 00010002 RAX: 000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004 RDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020 RBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 00000000000000000 R10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000 R13: 000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988 FS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32220000 CR3: 000000004914f000 CR4: 000000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: netdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352 ieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411 mac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583 hwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176 genl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968 genl_family_rcv_msg net/netlink/genetlink.c:1048 [en l\u00ednea] genl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065 netlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [en l\u00ednea] netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356 netlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932 sock_sendmsg_nosec net/socket.c:714 [en l\u00ednea] sock_sendmsg+0xd3/0x120 net/socket.c:734 ____sys_sendmsg+0x712/0x8c0 net/socket.c:2476 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2530 __sys_sendmsg+0xf7/0x1c0 net/socket.c:2559 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53029.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53029.json index 6f98c6e0b08..89e1f118eba 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53029.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt\n\nThe commit 4af1b64f80fb (\"octeontx2-pf: Fix lmtst ID used in aura\nfree\") uses the get/put_cpu() to protect the usage of percpu pointer\nin ->aura_freeptr() callback, but it also unnecessarily disable the\npreemption for the blockable memory allocation. The commit 87b93b678e95\n(\"octeontx2-pf: Avoid use of GFP_KERNEL in atomic context\") tried to\nfix these sleep inside atomic warnings. But it only fix the one for\nthe non-rt kernel. For the rt kernel, we still get the similar warnings\nlike below.\n BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n preempt_count: 1, expected: 0\n RCU nest depth: 0, expected: 0\n 3 locks held by swapper/0/1:\n #0: ffff800009fc5fe8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x24/0x30\n #1: ffff000100c276c0 (&mbox->lock){+.+.}-{3:3}, at: otx2_init_hw_resources+0x8c/0x3a4\n #2: ffffffbfef6537e0 (&cpu_rcache->lock){+.+.}-{2:2}, at: alloc_iova_fast+0x1ac/0x2ac\n Preemption disabled at:\n [] otx2_rq_aura_pool_init+0x14c/0x284\n CPU: 20 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc3-rt1-yocto-preempt-rt #1\n Hardware name: Marvell OcteonTX CN96XX board (DT)\n Call trace:\n dump_backtrace.part.0+0xe8/0xf4\n show_stack+0x20/0x30\n dump_stack_lvl+0x9c/0xd8\n dump_stack+0x18/0x34\n __might_resched+0x188/0x224\n rt_spin_lock+0x64/0x110\n alloc_iova_fast+0x1ac/0x2ac\n iommu_dma_alloc_iova+0xd4/0x110\n __iommu_dma_map+0x80/0x144\n iommu_dma_map_page+0xe8/0x260\n dma_map_page_attrs+0xb4/0xc0\n __otx2_alloc_rbuf+0x90/0x150\n otx2_rq_aura_pool_init+0x1c8/0x284\n otx2_init_hw_resources+0xe4/0x3a4\n otx2_open+0xf0/0x610\n __dev_open+0x104/0x224\n __dev_change_flags+0x1e4/0x274\n dev_change_flags+0x2c/0x7c\n ic_open_devs+0x124/0x2f8\n ip_auto_config+0x180/0x42c\n do_one_initcall+0x90/0x4dc\n do_basic_setup+0x10c/0x14c\n kernel_init_freeable+0x10c/0x13c\n kernel_init+0x2c/0x140\n ret_from_fork+0x10/0x20\n\nOf course, we can shuffle the get/put_cpu() to only wrap the invocation\nof ->aura_freeptr() as what commit 87b93b678e95 does. But there are only\ntwo ->aura_freeptr() callbacks, otx2_aura_freeptr() and\ncn10k_aura_freeptr(). There is no usage of perpcu variable in the\notx2_aura_freeptr() at all, so the get/put_cpu() seems redundant to it.\nWe can move the get/put_cpu() into the corresponding callback which\nreally has the percpu variable usage and avoid the sprinkling of\nget/put_cpu() in several places." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: Correcci\u00f3n del uso de GFP_KERNEL en contexto at\u00f3mico en rt. El commit 4af1b64f80fb (\"octeontx2-pf: Correcci\u00f3n del ID de lmtst usado en aura free\") utiliza get/put_cpu() para proteger el uso del puntero percpu en la retrollamada ->aura_freeptr(), pero tambi\u00e9n deshabilita innecesariamente la preempci\u00f3n para la asignaci\u00f3n de memoria bloqueable. El commit 87b93b678e95 (\"octeontx2-pf: Evitar el uso de GFP_KERNEL en contexto at\u00f3mico\") intent\u00f3 corregir estas advertencias de suspensi\u00f3n dentro de contexto at\u00f3mico. Sin embargo, solo corrigi\u00f3 la del kernel no rt. Para el kernel rt, a\u00fan recibimos advertencias similares a las que se muestran a continuaci\u00f3n. ERROR: funci\u00f3n inactiva llamada desde contexto no v\u00e1lido en kernel/locking/spinlock_rt.c:46 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0 preempt_count: 1, expected: 0 Profundidad de anidamiento de RCU: 0, expected: 0 3 bloqueos mantenidos por swapper/0/1: #0: ffff800009fc5fe8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x24/0x30 #1: ffff000100c276c0 (&mbox->lock){+.+.}-{3:3}, at: otx2_init_hw_resources+0x8c/0x3a4 #2: ffffffbfef6537e0 (&cpu_rcache->lock){+.+.}-{2:2}, en: alloc_iova_fast+0x1ac/0x2ac Preempci\u00f3n deshabilitada en: [] otx2_rq_aura_pool_init+0x14c/0x284 CPU: 20 PID: 1 Comm: swapper/0 Contaminado: GW 6.2.0-rc3-rt1-yocto-preempt-rt #1 Nombre del hardware: Placa Marvell OcteonTX CN96XX (DT) Rastreo de llamadas: dump_backtrace.part.0+0xe8/0xf4 show_stack+0x20/0x30 dump_stack_lvl+0x9c/0xd8 dump_stack+0x18/0x34 __might_resched+0x188/0x224 rt_spin_lock+0x64/0x110 alloc_iova_fast+0x1ac/0x2ac iommu_dma_alloc_iova+0xd4/0x110 __iommu_dma_map+0x80/0x144 iommu_dma_map_page+0xe8/0x260 dma_map_page_attrs+0xb4/0xc0 __otx2_alloc_rbuf+0x90/0x150 otx2_rq_aura_pool_init+0x1c8/0x284 otx2_init_hw_resources+0xe4/0x3a4 otx2_open+0xf0/0x610 __dev_open+0x104/0x224 __dev_change_flags+0x1e4/0x274 dev_change_flags+0x2c/0x7c ic_open_devs+0x124/0x2f8 ip_auto_config+0x180/0x42c do_one_initcall+0x90/0x4dc do_basic_setup+0x10c/0x14c kernel_init_freeable+0x10c/0x13c kernel_init+0x2c/0x140 ret_from_fork+0x10/0x20 Por supuesto, podemos barajar el get/put_cpu() para solo envolver la invocaci\u00f3n de ->aura_freeptr() como lo hace el commit 87b93b678e95. Pero solo hay dos devoluciones de llamada ->aura_freeptr(): otx2_aura_freeptr() y cn10k_aura_freeptr(). La variable perpcu no se usa en absoluto en otx2_aura_freeptr(), por lo que get/put_cpu() parece redundante. Podemos mover get/put_cpu() a la devoluci\u00f3n de llamada correspondiente que s\u00ed usa la variable percpu y evitar as\u00ed la dispersi\u00f3n de get/put_cpu() en varios lugares." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53030.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53030.json index 5d1ee4e4766..80aeeef4270 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53030.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Avoid use of GFP_KERNEL in atomic context\n\nUsing GFP_KERNEL in preemption disable context, causing below warning\nwhen CONFIG_DEBUG_ATOMIC_SLEEP is enabled.\n\n[ 32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274\n[ 32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n[ 32.558707] preempt_count: 1, expected: 0\n[ 32.562710] RCU nest depth: 0, expected: 0\n[ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc2-00269-gae9dcb91c606 #7\n[ 32.576188] Hardware name: Marvell CN106XX board (DT)\n[ 32.581232] Call trace:\n[ 32.583670] dump_backtrace.part.0+0xe0/0xf0\n[ 32.587937] show_stack+0x18/0x30\n[ 32.591245] dump_stack_lvl+0x68/0x84\n[ 32.594900] dump_stack+0x18/0x34\n[ 32.598206] __might_resched+0x12c/0x160\n[ 32.602122] __might_sleep+0x48/0xa0\n[ 32.605689] __kmem_cache_alloc_node+0x2b8/0x2e0\n[ 32.610301] __kmalloc+0x58/0x190\n[ 32.613610] otx2_sq_aura_pool_init+0x1a8/0x314\n[ 32.618134] otx2_open+0x1d4/0x9d0\n\nTo avoid use of GFP_ATOMIC for memory allocation, disable preemption\nafter all memory allocation is done." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: Evitar el uso de GFP_KERNEL en un contexto at\u00f3mico. El uso de GFP_KERNEL en el contexto de deshabilitaci\u00f3n de preempci\u00f3n provoca la siguiente advertencia cuando CONFIG_DEBUG_ATOMIC_SLEEP est\u00e1 habilitado. [ 32.542271] ERROR: funci\u00f3n de suspensi\u00f3n llamada desde contexto no v\u00e1lido en include/linux/sched/mm.h:274 [ 32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0 [ 32.558707] preempt_count: 1, esperado: 0 [ 32.562710] Profundidad de anidamiento de RCU: 0, esperado: 0 [ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: GW 6.2.0-rc2-00269-gae9dcb91c606 #7 [ 32.576188] Nombre del hardware: Placa Marvell CN106XX (DT) [ 32.581232] Rastreo de llamadas: [ 32.583670] dump_backtrace.part.0+0xe0/0xf0 [ 32.587937] show_stack+0x18/0x30 [ 32.591245] dump_stack_lvl+0x68/0x84 [ 32.594900] dump_stack+0x18/0x34 [ 32.598206] __might_resched+0x12c/0x160 [ 32.602122] __might_sleep+0x48/0xa0 [ 32.605689] __kmem_cache_alloc_node+0x2b8/0x2e0 [ 32.610301] __kmalloc+0x58/0x190 [ 32.613610] otx2_sq_aura_pool_init+0x1a8/0x314 [ 32.618134] otx2_open+0x1d4/0x9d0 Para evitar el uso de GFP_ATOMIC para la asignaci\u00f3n de memoria, deshabilite la preempci\u00f3n una vez que se haya realizado toda la asignaci\u00f3n de memoria." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53031.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53031.json index 098444b90cf..a682ca52f28 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53031.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/imc-pmu: Fix use of mutex in IRQs disabled section\n\nCurrent imc-pmu code triggers a WARNING with CONFIG_DEBUG_ATOMIC_SLEEP\nand CONFIG_PROVE_LOCKING enabled, while running a thread_imc event.\n\nCommand to trigger the warning:\n # perf stat -e thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/ sleep 5\n\n Performance counter stats for 'sleep 5':\n\n 0 thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/\n\n 5.002117947 seconds time elapsed\n\n 0.000131000 seconds user\n 0.001063000 seconds sys\n\nBelow is snippet of the warning in dmesg:\n\n BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2869, name: perf-exec\n preempt_count: 2, expected: 0\n 4 locks held by perf-exec/2869:\n #0: c00000004325c540 (&sig->cred_guard_mutex){+.+.}-{3:3}, at: bprm_execve+0x64/0xa90\n #1: c00000004325c5d8 (&sig->exec_update_lock){++++}-{3:3}, at: begin_new_exec+0x460/0xef0\n #2: c0000003fa99d4e0 (&cpuctx_lock){-...}-{2:2}, at: perf_event_exec+0x290/0x510\n #3: c000000017ab8418 (&ctx->lock){....}-{2:2}, at: perf_event_exec+0x29c/0x510\n irq event stamp: 4806\n hardirqs last enabled at (4805): [] _raw_spin_unlock_irqrestore+0x94/0xd0\n hardirqs last disabled at (4806): [] perf_event_exec+0x394/0x510\n softirqs last enabled at (0): [] copy_process+0xc34/0x1ff0\n softirqs last disabled at (0): [<0000000000000000>] 0x0\n CPU: 36 PID: 2869 Comm: perf-exec Not tainted 6.2.0-rc2-00011-g1247637727f2 #61\n Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV\n Call Trace:\n dump_stack_lvl+0x98/0xe0 (unreliable)\n __might_resched+0x2f8/0x310\n __mutex_lock+0x6c/0x13f0\n thread_imc_event_add+0xf4/0x1b0\n event_sched_in+0xe0/0x210\n merge_sched_in+0x1f0/0x600\n visit_groups_merge.isra.92.constprop.166+0x2bc/0x6c0\n ctx_flexible_sched_in+0xcc/0x140\n ctx_sched_in+0x20c/0x2a0\n ctx_resched+0x104/0x1c0\n perf_event_exec+0x340/0x510\n begin_new_exec+0x730/0xef0\n load_elf_binary+0x3f8/0x1e10\n ...\n do not call blocking ops when !TASK_RUNNING; state=2001 set at [<00000000fd63e7cf>] do_nanosleep+0x60/0x1a0\n WARNING: CPU: 36 PID: 2869 at kernel/sched/core.c:9912 __might_sleep+0x9c/0xb0\n CPU: 36 PID: 2869 Comm: sleep Tainted: G W 6.2.0-rc2-00011-g1247637727f2 #61\n Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV\n NIP: c000000000194a1c LR: c000000000194a18 CTR: c000000000a78670\n REGS: c00000004d2134e0 TRAP: 0700 Tainted: G W (6.2.0-rc2-00011-g1247637727f2)\n MSR: 9000000000021033 CR: 48002824 XER: 00000000\n CFAR: c00000000013fb64 IRQMASK: 1\n\nThe above warning triggered because the current imc-pmu code uses mutex\nlock in interrupt disabled sections. The function mutex_lock()\ninternally calls __might_resched(), which will check if IRQs are\ndisabled and in case IRQs are disabled, it will trigger the warning.\n\nFix the issue by changing the mutex lock to spinlock.\n\n[mpe: Fix comments, trim oops in change log, add reported-by tags]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/imc-pmu: Se corrige el uso de mutex en la secci\u00f3n deshabilitada de IRQ. El c\u00f3digo imc-pmu actual activa una ADVERTENCIA con CONFIG_DEBUG_ATOMIC_SLEEP y CONFIG_PROVE_LOCKING habilitados, mientras se ejecuta un evento thread_imc. Comando para activar la advertencia: # perf stat -e thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/ sleep 5 Estad\u00edsticas del contador de rendimiento para 'sleep 5': 0 thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/ 5.002117947 segundos tiempo transcurrido 0.000131000 segundos usuario 0.001063000 segundos sys A continuaci\u00f3n se muestra un fragmento de la advertencia en dmesg: ERROR: funci\u00f3n de suspensi\u00f3n llamada desde un contexto no v\u00e1lido en kernel/locking/mutex.c:580 in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2869, name: perf-exec preempt_count: 2, expected: 0 4 bloqueos mantenidos por perf-exec/2869: #0: c00000004325c540 (&sig->cred_guard_mutex){+.+.}-{3:3}, en: bprm_execve+0x64/0xa90 #1: c00000004325c5d8 (&sig->exec_update_lock){++++}-{3:3}, en: begin_new_exec+0x460/0xef0 #2: c0000003fa99d4e0 (&cpuctx_lock){-...}-{2:2}, en: perf_event_exec+0x290/0x510 #3: c000000017ab8418 (&ctx->lock){....}-{2:2}, en: perf_event_exec+0x29c/0x510 marca de evento de irq: 4806 hardirqs habilitados por \u00faltima vez en (4805): [] _raw_spin_unlock_irqrestore+0x94/0xd0 hardirqs deshabilitados por \u00faltima vez en (4806): [] perf_event_exec+0x394/0x510 softirqs habilitados por \u00faltima vez en (0): [] copy_process+0xc34/0x1ff0 softirqs deshabilitados por \u00faltima vez en (0): [<000000000000000>] 0x0 CPU: 36 PID: 2869 Comm: perf-exec No contaminado 6.2.0-rc2-00011-g1247637727f2 #61 Nombre del hardware: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 Rastreo de llamadas de PowerNV: dump_stack_lvl+0x98/0xe0 (no confiable) __might_resched+0x2f8/0x310 __mutex_lock+0x6c/0x13f0 thread_imc_event_add+0xf4/0x1b0 event_sched_in+0xe0/0x210 merge_sched_in+0x1f0/0x600 visit_groups_merge.isra.92.constprop.166+0x2bc/0x6c0 ctx_flexible_sched_in+0xcc/0x140 ctx_sched_in+0x20c/0x2a0 ctx_resched+0x104/0x1c0 perf_event_exec+0x340/0x510 begin_new_exec+0x730/0xef0 load_elf_binary+0x3f8/0x1e10 ... no llamar a operaciones de bloqueo cuando !TASK_RUNNING; estado=2001 establecido en [<00000000fd63e7cf>] do_nanosleep+0x60/0x1a0 ADVERTENCIA: CPU: 36 PID: 2869 en kernel/sched/core.c:9912 __might_sleep+0x9c/0xb0 CPU: 36 PID: 2869 Comm: sleep Contaminado: GW 6.2.0-rc2-00011-g1247637727f2 #61 Nombre del hardware: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV NIP: c000000000194a1c LR: c000000000194a18 CTR: c000000000a78670 REGS: c00000004d2134e0 TRAP: 0700 Tainted: GW (6.2.0-rc2-00011-g1247637727f2) MSR: 9000000000021033 CR: 48002824 XER: 00000000 CFAR: c00000000013fb64 IRQMASK: 1 La advertencia anterior se activ\u00f3 porque el c\u00f3digo imc-pmu actual usa bloqueo mutex en secciones con interrupciones deshabilitadas. La funci\u00f3n mutex_lock() llama internamente a __might_resched(), que verificar\u00e1 si las IRQ est\u00e1n deshabilitadas y, en caso de que lo est\u00e9n, activar\u00e1 la advertencia. Solucione el problema cambiando el bloqueo mutex a spinlock. [mpe: Corregir comentarios, eliminar errores en el registro de cambios, agregar etiquetas reportadas por]" } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53032.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53032.json index a9ad9a4da05..0b6a64feaae 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53032.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function.\n\nWhen first_ip is 0, last_ip is 0xFFFFFFFF, and netmask is 31, the value of\nan arithmetic expression 2 << (netmask - mask_bits - 1) is subject\nto overflow due to a failure casting operands to a larger data type\nbefore performing the arithmetic.\n\nNote that it's harmless since the value will be checked at the next step.\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with SVACE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: ipset: Se corrige el desbordamiento antes de la funci\u00f3n \"widen\" en la funci\u00f3n bitmap_ip_create(). Cuando first_ip es 0, last_ip es 0xFFFFFFFF y netmask es 31, el valor de una expresi\u00f3n aritm\u00e9tica 2 << (netmask - mask_bits - 1) est\u00e1 sujeto a desbordamiento debido a un error al convertir operandos a un tipo de dato mayor antes de realizar la operaci\u00f3n aritm\u00e9tica. Tenga en cuenta que esto es inofensivo, ya que el valor se comprobar\u00e1 en el siguiente paso. Encontrado por InfoTeCS en nombre del Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53033.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53033.json index a57a72a9107..6aaa4c8e4b8 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53033.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits\n\nIf the offset + length goes over the ethernet + vlan header, then the\nlength is adjusted to copy the bytes that are within the boundaries of\nthe vlan_ethhdr scratchpad area. The remaining bytes beyond ethernet +\nvlan header are copied directly from the skbuff data area.\n\nFix incorrect arithmetic operator: subtract, not add, the size of the\nvlan header in case of double-tagged packets to adjust the length\naccordingly to address CVE-2023-0179." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_payload: aritm\u00e9tica incorrecta al obtener bits del encabezado VLAN. Si el desplazamiento + longitud sobrepasa el encabezado Ethernet + VLAN, esta se ajusta para copiar los bytes dentro de los l\u00edmites del \u00e1rea de borrador vlan_ethhdr. Los bytes restantes m\u00e1s all\u00e1 del encabezado Ethernet + VLAN se copian directamente del \u00e1rea de datos skbuff. Se corrige el operador aritm\u00e9tico incorrecto: restar, no sumar, el tama\u00f1o del encabezado VLAN en el caso de paquetes con doble etiqueta para ajustar la longitud seg\u00fan la soluci\u00f3n CVE-2023-0179." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json index 420260d6311..49d5059d7b0 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5825.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2023-11-06T11:15:09.740", "lastModified": "2024-11-21T08:42:34.227", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json index 4ef825834b7..3ab12799ae7 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json index d5b220591e6..44480d50c4e 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6175.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6175.json index d04bc3fd8fd..ceb66849a76 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6175.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-03-26T08:15:35.867", "lastModified": "2024-11-21T08:43:17.703", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json index e795737c682..b0943f14464 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6531.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json index 45769b90ad6..5cf173d1a19 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6731.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json index e8eb2b77fdc..0390ea774f9 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6955.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-01-12T14:15:49.233", "lastModified": "2024-11-21T08:44:54.833", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json index 605b1ece792..4acdae6f098 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0068.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0068.json index 33ed4bced82..7ad7238f03a 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0068.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0068.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json index e88d782ddc3..c708afa32fa 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "NVIDIA Hopper HGX para 8 GPU contiene una vulnerabilidad en el vBIOS de la GPU que puede permitir que un agente malintencionado con acceso a la GPU a nivel de inquilino escriba en un registro no compatible, lo que provoca un estado incorrecto. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la denegaci\u00f3n de servicio." + "value": "NVIDIA Hopper HGX para 8 GPU contiene una vulnerabilidad en el vBIOS de la GPU que puede permitir que un agente malintencionado con acceso a la GPU a nivel de tenant escriba en un registro no compatible, lo que provoca un estado incorrecto. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json index c21b66be683..cb22d1c53d8 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json index e3794487143..5b99fd7fb7f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-01-03T08:15:11.443", "lastModified": "2024-11-21T08:46:04.477", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json index ff9bc113e20..74d47c22f91 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json index 3297fc368bf..049023eb8b3 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json index e0758ba9ff0..adf02351129 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json index 4965cb00c0f..435ddb1a08f 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0698.json @@ -80,7 +80,7 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easyappointments:easy\\\\!appointments:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:easyappointments:easy\\\\\\\\!appointments:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.3.2", "matchCriteriaId": "0CC6D729-8A5F-4E85-BE8B-CEAEEDF0E81B" } diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json index 6ade0c510cb..bfbe9b90a25 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0819.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0819.json index 50c83c1d36d..a6c77d3d682 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0819.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0819.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json index 933e0b177e7..7bb259e1a16 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json index 28dc1154979..857d0a5b77c 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10307.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10307.json index ad5817efa40..09d0efc508e 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10307.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10307.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE/CE que afecta a todas las versiones desde la 12.10 hasta la 17.8.6, la 17.9 hasta la 17.9.3 y la 17.10 hasta la 17.10.1. Un archivo malintencionado puede causar un consumo descontrolado de CPU al visualizar la solicitud de fusi\u00f3n asociada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json index 59683f814ec..b02adb5fbea 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10494.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json index f1b6251b795..64efad2e4a7 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10495.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json index 5ee1d47a6ef..1bcb73e7f7f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10496.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10558.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10558.json index e5023447351..e88e9dbd5f9 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10558.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10558.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Form Maker by 10Web WordPress plugin before 1.15.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Form Maker de 10Web para WordPress anterior a la versi\u00f3n 1.15.30 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10706.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10706.json index cc3b9716224..19c8e00930a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10706.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10706.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-20T06:15:22.710", "lastModified": "2024-12-20T17:15:07.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json index 9983bb7281e..def0f7c2ab5 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10821.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el mecanismo de procesamiento de l\u00edmites de solicitud multiparte del servidor Invoke-AI (versi\u00f3n v5.0.1) permite a atacantes no autenticados consumir recursos excesivamente. El servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte, lo que genera un bucle infinito y una denegaci\u00f3n de servicio completa para todos los usuarios. El endpoint afectado es `/api/v1/images/upload`." + "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el mecanismo de procesamiento de los l\u00edmites de solicitud multiparte del servidor Invoke-AI (versi\u00f3n v5.0.1) permite a atacantes no autenticados consumir recursos excesivamente. El servidor no gestiona el exceso de caracteres a\u00f1adidos al final de los l\u00edmites multiparte, lo que genera un bucle infinito y una denegaci\u00f3n de servicio completa para todos los usuarios. El endpoint afectado es `/api/v1/images/upload`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json index 98f5e221c4d..f4956144a1a 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-02-07T22:15:09.797", "lastModified": "2024-11-21T08:49:43.170", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11088.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11088.json index a4693dacd17..2966d668112 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11088.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11088", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-21T14:15:08.250", - "lastModified": "2024-11-21T15:15:21.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:35:39.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -61,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.6", + "matchCriteriaId": "ED233A38-A0CD-4DFB-9002-6FC2ACC3C340" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3190023/simple-membership", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1558b08-a33b-4cf2-bacb-c88065f513cc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11155.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11155.json index e29c6533c70..189859c5390 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11155.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-05T18:15:20.933", "lastModified": "2024-12-06T19:15:10.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11158.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11158.json index aa228ee8161..816de9cd643 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11158.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-05T18:15:21.243", "lastModified": "2024-12-06T17:15:07.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json index 3db19e5eb7d..2a57eb29ee3 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Input from multiple fields in\u00a0Streamsoft Presti\u017c is not sanitized properly, leading to an SQL injection vulnerability, which might be exploited by an authenticated remote attacker.\u00a0\nThis issue was fixed in\u00a018.1.376.37 version of the software." + }, + { + "lang": "es", + "value": "La entrada de varios campos en Streamsoft Presti? no se desinfecta correctamente, lo que genera una vulnerabilidad de inyecci\u00f3n SQL que un atacante remoto autenticado podr\u00eda explotar. Este problema se solucion\u00f3 en la versi\u00f3n 18.1.376.37 del software." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11595.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11595.json index 26ff1d53c17..78f95f38938 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11595.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11595.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-21T11:15:32.820", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11596.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11596.json index 740bb525903..9a6393407b6 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11596.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-11-21T11:15:33.350", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11701.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11701.json index 7d99739e181..8f652791a24 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11701.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11701", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.617", - "lastModified": "2024-11-27T16:15:13.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:36:49.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "75D1724C-A89A-46A9-988C-09A4019D9956" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914797", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11702.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11702.json index 047b9934bc0..3e3d169a235 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11702.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11702", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.710", - "lastModified": "2024-11-27T16:15:13.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:41:30.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "75D1724C-A89A-46A9-988C-09A4019D9956" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918884", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11703.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11703.json index abc77d10d61..5eb38a31a9a 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11703.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11703", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.810", - "lastModified": "2024-12-04T15:15:09.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:46:01.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928779", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json index b5975099ef4..e49ae9e57dd 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T04:15:06.537", "lastModified": "2025-01-17T20:58:37.443", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12021.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12021.json index 22ef03aaebc..d52aa387de2 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12021.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Coverity versions prior to 2024.9.0 are vulnerable to stored cross-site scripting (XSS) in various administrative interfaces. The impact of exploitation may result in the compromise of local accounts managed by the Coverity platform as well as other standard impacts resulting from cross-site scripting." + }, + { + "lang": "es", + "value": "Las versiones de Coverity anteriores a la 2024.9.0 son vulnerables a ataques de cross-site scripting (XSS) almacenado en diversas interfaces administrativas. El impacto de esta explotaci\u00f3n puede comprometer las cuentas locales administradas por la plataforma Coverity, as\u00ed como otros impactos habituales derivados de los ataques de cross-site scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json index 45154443933..6cca882c1b4 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12045.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-08T08:15:24.683", "lastModified": "2025-01-08T08:15:24.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12189.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12189.json index 1ad77f7a5c9..a96ed8e2a60 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12189.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12189.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WDesignKit \u2013 Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom widgets in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WDesignKit \u2013 Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de widgets personalizados en todas las versiones hasta la 1.2.2 inclusive, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12238.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12238.json index 0a00ccbd993..ed07c71a5c0 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12238.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12238.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-29T06:15:05.487", "lastModified": "2024-12-29T06:15:05.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12335.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12335.json index 5539a594a60..709cd0bec6a 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12335.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-25T07:15:11.980", "lastModified": "2024-12-25T07:15:11.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12368.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12368.json index 25c588028fa..1ec3d466165 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12368.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12368.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12410.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12410.json index 083e909f63f..a1cb04a006b 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12410.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12410.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Front End Users plugin for WordPress is vulnerable to SQL Injection via the 'UserSearchField' parameter in all versions up to, and including, 3.2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Front End Users para WordPress es vulnerable a la inyecci\u00f3n SQL mediante el par\u00e1metro \"UserSearchField\" en todas las versiones hasta la 3.2.32 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json index a84b3798860..9bf63934560 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12477.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T22:15:08.683", "lastModified": "2025-01-22T22:15:08.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12619.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12619.json index ac8dcf8146e..5cd811929f6 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12619.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12619.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1, allowing internal users to gain unauthorized access to internal projects." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.0 hasta la 17.8.6, la 17.9 hasta la 17.9.3 y la 17.10 hasta la 17.10.1, lo que permite que los usuarios internos obtengan acceso no autorizado a proyectos internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12905.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12905.json index cda0046fd46..e3a5c7ec08f 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12905.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12905.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Improper Link Resolution Before File Access (\"Link Following\") and Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with index.js in the tar-fs package.\n\nThis issue affects tar-fs: from 0.0.0 before 1.16.4, from 2.0.0 before 2.1.2, from 3.0.0 before 3.0.8." + }, + { + "lang": "es", + "value": "Resoluci\u00f3n incorrecta de enlaces antes del acceso a archivos (\"Link Following\") y limitaci\u00f3n incorrecta de una ruta a un directorio restringido (\"Path Traversal\"). Esta vulnerabilidad se produce al extraer un archivo tar manipulado con fines maliciosos, lo que puede provocar escrituras o sobrescrituras no autorizadas de archivos fuera del directorio de extracci\u00f3n previsto. El problema est\u00e1 asociado con index.js en el paquete tar-fs. Este problema afecta a tar-fs: desde la versi\u00f3n 0.0.0 hasta la 1.16.4, desde la versi\u00f3n 2.0.0 hasta la 2.1.2, desde la versi\u00f3n 3.0.0 hasta la 3.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12935.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12935.json index df79dbc19c5..f843bccca87 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12935.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T05:15:05.837", "lastModified": "2024-12-26T18:15:17.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12936.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12936.json index cc82e847d41..427b9c72010 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12936.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12936.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T05:15:06.557", "lastModified": "2024-12-26T17:15:06.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1277.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1277.json index 373dc7e92b5..144717b091a 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1277.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1277.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1282.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1282.json index dc38faa583e..c1378889235 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1282.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1282.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1288.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1288.json index 0f0509d03ff..e6cda4c4962 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1288.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1288.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json index 4cfdb4c9e2c..048eea9041d 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13124.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13124.json index b3f3e5c32bf..75110d9bcd5 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13124.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13124.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.8.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Photo Gallery de 10Web para WordPress anterior a la versi\u00f3n 1.8.33 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13347.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13347.json index 267d36afa3a..ebdb6a0ce10 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13347.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-03T06:15:10.180", "lastModified": "2025-02-03T16:15:32.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json index 42b4bca4fe2..2868dc48ddd 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine if the plugin is in a playground environment. This makes it possible for unauthenticated attackers to spoof the Host header to make the OTP code \"1234\" and authenticate as any user, including administrators." + }, + { + "lang": "es", + "value": "El complemento SMS Alert Order Notifications \u2013 WooCommerce para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 3.7.9 incluida. Esto se debe a que el complemento utiliza el encabezado del Host para determinar si se encuentra en un entorno de prueba. Esto permite a atacantes no autenticados falsificar el encabezado del Host para generar el c\u00f3digo OTP \"1234\" y autenticarse como cualquier usuario, incluidos los administradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13567.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13567.json index b561381ad75..aa5a0e77ae7 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13567.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13567.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Awesome Support \u2013 WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.3.1 via the 'awesome-support' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/awesome-support directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 6.3.1." + }, + { + "lang": "es", + "value": "El complemento Awesome Support \u2013 WordPress HelpDesk & Support Plugin para WordPress es vulnerable a la Exposici\u00f3n de Informaci\u00f3n Sensible en todas las versiones hasta la 6.3.1 incluida, a trav\u00e9s del directorio \"awesome-support\". Esto permite a atacantes no autenticados extraer datos sensibles almacenados de forma insegura en el directorio /wp-content/uploads/awesome-support, que puede contener archivos adjuntos en los tickets de soporte. La vulnerabilidad se corrigi\u00f3 parcialmente en la versi\u00f3n 6.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13637.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13637.json index cdd8ac6ffb5..e11e9cc553e 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13637.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13637.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Demo Awesome plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the install_plugin function in all versions up to, and including, 1.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins.." + }, + { + "lang": "es", + "value": "El complemento Demo Awesome para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n install_plugin en todas las versiones hasta la 1.0.3 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, instalen y activen complementos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13640.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13640.json index 0097c45b5a4..50f10669ff6 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13640.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13640.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-08T05:15:31.673", "lastModified": "2025-03-08T05:15:31.673", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13666.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13666.json index 5dcc0ace4a4..7116364e1d3 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13666.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13666.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T09:15:12.897", "lastModified": "2025-03-22T09:15:12.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Fluent Forms \u2013 Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 5.2.12 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers spoof their IP address and submit forms that may have IP-based restrictions." + }, + { + "lang": "es", + "value": "El complemento Fluent Forms \u2013 Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder para WordPress es vulnerable a la suplantaci\u00f3n de direcciones IP en todas las versiones hasta la 5.2.12 incluida, debido a una validaci\u00f3n insuficiente de la direcci\u00f3n IP y al uso de encabezados HTTP proporcionados por el usuario como m\u00e9todo principal de obtenci\u00f3n de la IP. Esto permite que atacantes no autenticados suplanten su direcci\u00f3n IP y env\u00eden formularios que pueden tener restricciones basadas en IP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13768.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13768.json index 8cd31afff89..69c78e058dc 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13768.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13768.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:23.743", "lastModified": "2025-03-22T07:15:23.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CITS Support svg, webp Media and TTF,OTF File Upload, Use Custom Fonts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2. This is due to missing or incorrect nonce validation on the cits_assign_fonts_tab() function. This makes it possible for unauthenticated attackers to delete font assignments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento CITS Support svg, webp Media and TTF,OTF File Upload, Use Custom Fonts para WordPress, es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.2 incluida. Esto se debe a la falta o a una validaci\u00f3n incorrecta de nonce en la funci\u00f3n cits_assign_fonts_tab(). Esto permite que atacantes no autenticados eliminen asignaciones de fuentes mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13774.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13774.json index 5a7f210f35d..82c9f82304d 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13774.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13774.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento Wishlist for WooCommerce: Multi Wishlists Per Customer de WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.1.7 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n 'save_to_multiple_wishlist'. Esto permite que atacantes no autenticados actualicen configuraciones e inyecten secuencias de comandos web maliciosas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." + "value": "El complemento Wishlist for WooCommerce: Multi Wishlists Per Customer de WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.1.7 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n 'save_to_multiple_wishlist'. Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13856.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13856.json index 21dd01dd510..ac5868b7192 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13856.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13856.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.070", "lastModified": "2025-03-22T07:15:24.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Your Friendly Drag and Drop Page Builder \u2014 Make Builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.10 via the make_builder_ajax_subscribe() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Your Friendly Drag and Drop Page Builder \u2014 Make Builder para WordPress, es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 1.1.10 incluida, mediante la funci\u00f3n make_builder_ajax_subscribe(). Esto permite a atacantes autenticados, con acceso de suscriptor o superior, realizar solicitudes web a ubicaciones arbitrarias desde la aplicaci\u00f3n web y utilizarlas para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json index 0728f77cad8..3eee293cdfc 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json index 0450a4071f1..b02ff8b3837 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json index 6b5072822f3..4fef46a94ea 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1445.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1445.json index ad96ab1aee6..6c2f9c74a65 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1445.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1445.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json index 0729233c0e2..54b8b583302 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json index e8eb024e19a..dfbcb7261f1 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json index b9fa71087e8..d88ece7fe81 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json index 94e42ac9872..1846f6082b0 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json index 374213daea9..d6cd26508e6 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1496.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1496.json index 1791813be12..059dadae769 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1496.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1496.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json index 8275726bcf2..ffc09618d00 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json index 5af5d523828..012937dbcca 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1572.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1586.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1586.json index 4b39cc7dd1d..ddbb6a52143 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1586.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1586.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json index 0a82b0bc76a..701b3234011 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1619.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1619.json index d91e4e4e264..d073b232449 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1619.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1619.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json index a1f9198ed8e..b5aaad3bd32 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json index ed6f3866f2a..9e33ca74517 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json index d225365ca4e..5135d6ed172 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1758.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1758.json index 285e5e1ba72..a218e5f688c 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1758.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1758.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json index 4339a0c3f4c..ab6de6a36fb 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1759.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json index 09bd3a4fc70..b5de514cb63 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json index 6deda5cb842..d92f75fb928 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1797.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json index f0fe7067c5b..5ccab0fde22 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json index 18904f712bd..11de7cc5269 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json index 4766f610bcb..275eb01156c 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json index 360d8896f44..757828f46f4 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json index 8c2d0634592..c61a58fff3b 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-02-29T08:15:46.437", "lastModified": "2024-11-21T08:51:31.743", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json index 387ce4e2b2b..0ac5c348a57 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json index af7315447a0..941770fc9ea 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2024-10-23T18:15:06.100", "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json index 58e0033c1ca..9055499c2c5 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json index 8c7ee255533..c2c81d5e260 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20941.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20976.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20976.json index ca8652e2fa7..b32ec3f9741 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20976.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20976.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20978.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20978.json index 74f19386027..1b1006a4b61 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20978.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20978.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json index 5bc8e22c815..ce00e9e54df 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json index b83cf2de1d4..7fb41853ba1 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json index fc31961d95b..8d444f55eee 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21026.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:18.020", "lastModified": "2025-03-20T19:15:27.993", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json index 53bfbfe8b2e..d6f6102c623 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:18.350", "lastModified": "2025-04-10T19:53:40.083", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json index 6badd170a84..64f893cfc4b 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json index 458a4ecdacb..c4bfb1ef5ff 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21113.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21116.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21116.json index 35af209d546..088e70b5f4a 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21116.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:33.653", "lastModified": "2025-03-19T18:15:20.193", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json index cff81f75dfc..4a523912cb5 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:14.243", "lastModified": "2025-03-19T21:15:35.593", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json index 82222c62783..5809e2f63ab 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21143.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21143.json index 8bab3041e9f..82ae02ea324 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21143.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21143.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21163.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21163.json index 679889172f8..e9821739a79 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21163.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21163.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json index 229e4578e81..441a1e3831f 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21175.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21175.json index cf44dd652ba..8d26a40ea39 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21175.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:21.337", "lastModified": "2025-03-22T15:15:36.973", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json index 4131de2b810..6ae04aeefd6 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21245.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21245.json index 2fd61c5eb31..172169bab43 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21245.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21245.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json index 371ad4fc00d..08fdc5efe9c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json index 2cf1c9978a0..8d934e9fd2a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json index 969a05d9a99..f589c71590c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json index 6405aa90c1b..5250f9d5229 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json index 126a05e0ef6..90437c4a8e8 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json index 714966b5da2..bd674cb7975 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-01-12T01:15:46.697", "lastModified": "2024-11-21T08:54:40.447", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json index 14b04f22032..748ee1ece18 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json @@ -116,7 +116,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json index f04f8698376..0e633281575 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21683.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@atlassian.com", "published": "2024-05-21T23:15:07.923", "lastModified": "2025-04-10T19:54:01.040", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json index e5de7c7db76..4a468cfdad4 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21803.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21803.json index b4a116f8345..8085d608af5 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21803.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@openanolis.org", "published": "2024-01-30T08:15:41.373", "lastModified": "2024-11-21T08:55:01.910", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json index 9f87ce52e95..a41d6ca2b8c 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.597", "lastModified": "2024-11-21T09:09:02.193", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json index 3d0e3b6b643..9ded498ab22 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-17T05:15:48.650", "lastModified": "2024-11-21T09:09:02.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json index 8a692a43307..7f04a3588e4 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json index ad114351967..620004ab2e8 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2125", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.390", - "lastModified": "2025-02-26T19:15:20.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-07T13:07:17.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -71,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:donweb:envialosimple:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "3F12EF58-70E1-424C-B756-754BCCD97DC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/envialosimple-email-marketing-y-newsletters-gratis/trunk/api/gallery.php#L29", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b39abc8-9281-4d58-a9ec-877c5bae805a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/envialosimple-email-marketing-y-newsletters-gratis/trunk/api/gallery.php#L29", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b39abc8-9281-4d58-a9ec-877c5bae805a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2129.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2129.json index 3f9c6f4cb92..75acdfb373b 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2129.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2129.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22298.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22298.json index f1fc1e5efaa..d82e9c7654e 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22298.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22298.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json index b46cfbe87a4..e4a7ef7c0e6 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json index db152c1b569..8646a3da97e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json index 1f5416d5537..d04a41457a7 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json index efd2d347ce9..3901e7d308f 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json index 57c9a91dd6f..c48372aca0f 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@autodesk.com", "published": "2024-03-18T00:15:07.663", "lastModified": "2025-02-10T21:15:17.823", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json index ae91bcfde92..a32e57bb317 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23520.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json index 9545cdc8f44..978094623ca 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json index 2402883990e..2255c1db3c1 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json index 4b39261eb22..491f3223210 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json index 86389f5912a..4a077b51f34 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json index dbce32441f7..b3b78854bac 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24292.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24292.json index cc574574d58..c698faa0bfc 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24292.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:15.833", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24476.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24476.json index f97f568f9a9..28f541766b9 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24476.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T19:15:09.030", "lastModified": "2024-11-21T08:59:19.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json index 966974bad2e..b9d3103c7fd 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24478.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T17:15:09.567", "lastModified": "2024-11-21T08:59:19.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24479.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24479.json index 9ce5ca41444..a7af65b10d3 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24479.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24479.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T19:15:09.077", "lastModified": "2024-11-21T08:59:19.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json index ddb1c10615e..c1acc4e1943 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T15:15:09.260", "lastModified": "2024-11-21T08:59:38.960", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24835.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24835.json index fb47db67840..d1b6d69c7e9 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24835.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24835.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2403.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2403.json index d11c48be728..179ca32b700 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2403.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2403.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@devolutions.net", "published": "2024-03-13T18:15:07.917", "lastModified": "2025-03-26T20:15:20.150", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json index f16ba132500..250ae469789 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.083", "lastModified": "2024-11-21T09:09:44.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json index 52bb787ccde..2d4141ccda6 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.127", "lastModified": "2025-03-29T00:15:21.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json index fd253ad7439..0b74b3aa7bc 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.710", "lastModified": "2024-11-21T09:00:12.563", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json index 59fda291847..e0df8c6ec4d 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.763", "lastModified": "2024-11-21T09:00:12.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25251.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25251.json index 0ed75caeeba..8f606bbda0b 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25251.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T01:15:08.070", "lastModified": "2025-04-02T20:20:43.033", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25344.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25344.json index 5ca38f5dc5d..39cf4e1a12c 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25344.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.897", "lastModified": "2024-11-21T09:00:39.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json index a453a5303ec..690a9824b1a 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json index 306d7986a75..8cbf229c0b8 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json index 4abbe2d3597..bff9f2a70ed 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25763.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25763.json index 697429a9ec5..909a5c94e03 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25763.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25763.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.063", "lastModified": "2024-12-06T21:15:06.113", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json index 88be8584e60..f80cf5351d4 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-21T07:15:57.410", "lastModified": "2025-02-26T21:48:55.927", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json index effa5bc619d..916ef486ac4 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25920.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json index 1cc546296a4..d3dbe3992ce 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json index 2eabb4513c3..78df4d60432 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device" + }, + { + "lang": "es", + "value": "Vulnerabilidad de restricci\u00f3n indebida del canal de comunicaci\u00f3n a los endpoints previstos [CWE-923] en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.4, 7.2.0 a 7.2.8, 7.0.0 a 7.0.15, 6.4.0 a 6.4.15 y anteriores a 6.2.16, Fortinet FortiProxy versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.9 y anteriores a 7.0.15, Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.4, 7.0.0 a 7.0.11, 6.4.0 a 6.4.14 y anteriores a 6.2.13, Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2, Las versiones 7.2.0 a 7.2.4, 7.0.0 a 7.0.11, 6.4.0 a 6.4.14 y anteriores a 6.2.13, Fortinet FortiVoice versi\u00f3n 7.0.0 a 7.0.2 anteriores a 6.4.8 y Fortinet FortiWeb anterior a 7.4.2 pueden permitir que un atacante no autenticado en una posici\u00f3n intermedia se haga pasar por el dispositivo de administraci\u00f3n (servidor FortiCloud y/o en ciertas condiciones, FortiManager), al interceptar la solicitud de autenticaci\u00f3n FGFM entre el dispositivo de administraci\u00f3n y el dispositivo administrado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26152.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26152.json index aa3f0be5c0a..8d6140be20a 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26152.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T22:15:47.310", "lastModified": "2024-11-21T09:02:02.457", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26465.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26465.json index 35be336e41d..6128bc09ca8 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26465.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26465.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.730", "lastModified": "2024-11-25T19:15:08.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26466.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26466.json index d98a59e0a3d..c7b1ba4eeda 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26466.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26466.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.773", "lastModified": "2024-11-21T09:02:27.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json index 3ed844f2f6e..2042d90dbd9 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.823", "lastModified": "2024-11-21T09:02:27.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json index 856a7112ca6..eb148e1d151 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.870", "lastModified": "2024-11-21T09:02:27.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26632.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26632.json index 0e8aa89c180..0111004b480 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26632.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26632.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26660.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26660.json index 0632f8c2058..e011a72a24e 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26660.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26660.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26665.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26665.json index 1dfcd809e56..d7fe48a1018 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26665.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26665.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26691.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26691.json index 3b3ed5d7c21..8a20ea992a9 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26691.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26691.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26699.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26699.json index 100a2975e6c..cd03dfd128e 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26699.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26699.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26703.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26703.json index 24320167be3..74f421d41b4 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26703.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26703.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26711.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26711.json index d34deae40ac..35b8bd19b4f 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26711.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26711.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26724.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26724.json index 5cf1937bcc8..5179b113e46 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26724.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26724.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26753.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26753.json index 9b3af9ba3e2..dcdf4f96caf 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26753.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26753.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26760.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26760.json index b4a21c58297..8ad3ffa6e08 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26760.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26760.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26790.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26790.json index 74db2884d8c..2cee1f660d8 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26790.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26790.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json index 69fdf153e73..93c0693770f 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json index 325c465df64..c3d2c1ecd8d 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json index 3e078032265..bfeeb23ba2e 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json index a5acb2048ba..7e6307aa5df 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json index c373907319a..365e723aa1d 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json index f8efd24f047..9a33b562f35 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json index c0072be799f..cc2f6c205f3 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json index c41bcf0c756..fee30ff1fd5 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json index 93bf140f4f2..51c72321685 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json index 906ae5ba408..e328bfb2024 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json index cfd9ceb7f99..8307fed20b2 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json index 1d91612f335..492513df062 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json index d59e7b548a4..35cfff78909 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json index f5ccb87cdcb..2a308e5706b 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json index 2694739d4a2..51b5e0c2b1c 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json index 17a2c480a35..9b2f4bc3a24 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json index 97477d2ea83..2de7af87f5a 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json index ca828f5d9d3..c4050aeef28 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json index bbc2c645491..1c2c5cbc48d 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.163", "lastModified": "2024-11-21T09:10:06.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json index 4966299bc41..02605d671f1 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json index 7090a1d24a7..cb446e8e825 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27026.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json index af2c374755f..1545520d927 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27061.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json index 15e73df6137..a371e9d6181 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27079.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27136.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27136.json index db83cc05e7d..6c8b0cda014 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27136.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27136.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27952.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27952.json index 49e5191968c..bfb2700e9df 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27952.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27952.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json index e184e369d97..b3ccc1b044f 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27996.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27996.json index 2d66dda7a83..69d5597675f 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27996.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27996.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T17:15:10.097", "lastModified": "2024-11-21T09:05:35.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json index 27e1762b4b4..f86e77786ca 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json index 9739164f04d..d97b278266b 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:06.017", "lastModified": "2024-11-21T09:05:39.653", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28199.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28199.json index 64ff7221c1f..ab97758a33d 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28199.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-11T23:15:47.333", "lastModified": "2025-02-26T18:50:07.157", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json index e350cb7d4b8..bd5002fff89 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json index 1a4fb3494ea..f0991c01421 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-03T22:15:07.037", "lastModified": "2024-11-21T09:07:05.013", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json index 4e13ca6ba12..20aac6bd8d3 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.200", "lastModified": "2024-11-21T09:10:38.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2879.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2879.json index 643828e9e09..3a403f3366c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2879.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2879.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2879", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-03T04:15:11.960", - "lastModified": "2024-11-21T09:10:44.150", + "lastModified": "2025-03-17T17:03:45.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:layerslider:layerslider:7.9.11:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "C78F678E-B780-4DD8-8475-FCE833E5A588" + "criteria": "cpe:2.3:a:kreaturamedia:layerslider:7.9.11:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "C2A8236B-FD48-4F38-A619-9D941A9BCA86" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:layerslider:layerslider:7.10.0:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "5EFFEF58-28B0-450E-8A63-0B7C268C8A0C" + "criteria": "cpe:2.3:a:kreaturamedia:layerslider:7.10.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "389D1433-8E1D-4BE4-800D-F231D11C4945" } ] } diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json index 7686a649c16..f0174a3574a 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2888.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29117.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29117.json index e9012b0f154..8205d9255dd 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29117.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29117.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json index 98ff3099dfd..2c7dd2eca13 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json index 6fef1c4cce2..a9258da1966 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:09.590", "lastModified": "2024-11-21T09:07:59.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json index f5e0e284312..d74136b5486 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29915.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29928.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29928.json index d5032900fbe..982b2373aa7 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29928.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29928.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json index b500c9c1f3b..9a1f9691401 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json index 8d076ed23fc..d2061558191 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json index e7862514295..3bc00dcdecc 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30454.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json index 56e3377e82d..10e0de49382 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30840.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30840.json index 5bde246e217..00cea504024 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30840.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30840.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T20:15:11.030", "lastModified": "2024-11-21T09:12:27.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31296.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31296.json index 7a667a27e76..4107caf0ab3 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31296.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31296.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json index 7eb37f21698..35f34b7896e 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.627", "lastModified": "2024-11-21T09:13:40.963", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json index 4db9502bdfc..8693e8985d5 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31546.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T18:15:08.887", "lastModified": "2024-11-21T09:13:41.173", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json index 571f1134fef..2118b1d89ce 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T18:15:08.940", "lastModified": "2024-11-21T09:13:41.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json index 06e4d1b399e..f0aa0aeee9f 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31551.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.080", "lastModified": "2024-11-21T09:13:41.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json index 22773fe571e..653b6843ede 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A storing passwords in a recoverable format in Fortinet FortiOS versions 7.2.0 through 7.2.1 allows attacker to information disclosure via modification of LDAP server IP to point to a malicious server." + }, + { + "lang": "es", + "value": "El almacenamiento de contrase\u00f1as en un formato recuperable en las versiones 7.2.0 a 7.2.1 de Fortinet FortiOS permite a los atacantes divulgar informaci\u00f3n mediante la modificaci\u00f3n de la IP del servidor LDAP para apuntar a un servidor malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32139.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32139.json index acdc1ef1dc9..b0abb2100f7 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32139.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32139.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json index 1e5a2f3ba5f..083176cf6bf 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json index d594c08e47a..e25eeccf4af 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:08.060", "lastModified": "2024-11-21T09:14:34.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json index b13d69285f0..7eb06e38093 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:08.117", "lastModified": "2024-11-21T09:14:34.280", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json index 473178e46bb..98933193ad8 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:49.957", "lastModified": "2024-11-21T09:14:37.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json index 470e01b1c64..bdabdcf3670 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T21:15:08.747", "lastModified": "2024-11-21T09:14:51.733", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32505.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32505.json index dd50318f2f6..e92a44425fc 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32505.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-17T10:15:10.810", "lastModified": "2024-11-21T09:15:03.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32602.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32602.json index deeecbd7511..407c7660ba7 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32602.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32602.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json index 75e1f146f8d..20b18f4e2ca 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32680.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32812.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32812.json index e77a701922e..a0ee72421cc 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32812.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32812.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json index a20cfcfbd87..4db10bfaa77 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3218.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3218.json index 3c087bf4964..2ec72aab467 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3218.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3218.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T00:15:08.717", "lastModified": "2024-11-21T09:29:10.287", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33058.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33058.json index 3c964a46cc3..631e545c30f 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33058.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33058.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while assigning memory from the source DDR memory(HLOS) to ADSP." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al asignar memoria de la memoria DDR de origen (HLOS) a ADSP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json index 2834623cad1..2e7e44b0a17 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33218.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.550", "lastModified": "2024-11-21T09:16:38.573", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json index 6061b780869..2ec58849380 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33219.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.680", "lastModified": "2024-11-21T09:16:38.810", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json index de74bba9992..a895ea70c37 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.780", "lastModified": "2025-03-13T16:15:19.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json index f496fcfbbd4..6e1c68624e4 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.887", "lastModified": "2024-11-21T09:16:55.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json index 381b93795a4..c98c5474ef8 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33424.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:27.070", "lastModified": "2024-11-21T09:16:55.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json index f9706db9d43..3c2593ba5bf 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33489.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json index e681d9ceb12..9797cda6de4 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-11T21:15:53.050", "lastModified": "2025-03-01T02:04:54.647", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json index 4c0a4a885cf..8338a32b2c9 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33928.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33928.json index ca766de63d2..140b38a2aa7 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33928.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33928.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json index 9f83532df2c..95e576a4264 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.660", "lastModified": "2024-11-21T09:18:20.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json index 36b6459c008..eff805ec050 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.797", "lastModified": "2024-11-21T09:18:20.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json index 6f092a8bb35..858af4718ac 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34315.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.447", "lastModified": "2024-11-21T09:18:25.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json index e523a87ec16..ab216a17a06 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:44.170", "lastModified": "2025-04-10T19:54:38.783", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json index 4c1546c0246..7cabe715f38 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:10.580", "lastModified": "2024-11-21T09:18:41.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json index 061c0b911d0..18e4d96a5a9 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34553.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json index 9bc4ee29cc2..9ca9f0ffa9c 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34558.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json index 834084893e7..ebc183571d2 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34771.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json index df181b4e81f..6f122b3540e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34811.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34811.json index df3e13a37aa..0372ec310e2 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34811.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34811.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json index a060297af11..ce013a773fc 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:10.687", "lastModified": "2025-03-27T21:15:48.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35498.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35498.json index 97b5be226b6..5679c41972e 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35498.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35498.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T19:15:12.707", "lastModified": "2025-01-07T16:15:33.277", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json index 87aa705898b..6996802cce1 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json index 2b80b4f6dd9..00d48a42653 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json index fed6084b3f4..7b313d7c39a 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json index 8708215156b..e7c056c99e9 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json index ecd2885393d..f96829fd3ae 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json index 54a40b02693..20197c333b4 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35937.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json index dc625e8dca1..df327fce646 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json index 767c8898d77..1a955b298c9 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36265.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36265.json index 63aec441f20..6bc216ec58e 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36265.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36265.json @@ -69,7 +69,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json index 04cd8a7ce3e..04d983c1269 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.163", "lastModified": "2025-03-04T18:19:32.897", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36465.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36465.json index b7b7802e181..8fab9c1e656 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36465.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36465.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter." + }, + { + "lang": "es", + "value": "Un usuario de Zabbix con privilegios bajos (normal) y acceso a la API puede utilizar la vulnerabilidad de inyecci\u00f3n SQL en include/classes/api/CApiService.php para ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro groupBy." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36469.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36469.json index e11c7b467ca..0fb21e6c837 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36469.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36469.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one." + }, + { + "lang": "es", + "value": "El tiempo de ejecuci\u00f3n de un inicio de sesi\u00f3n fallido difiere cuando se utiliza un nombre de usuario inexistente en comparaci\u00f3n con el uso de uno existente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json index 94b69ec83dc..98513b93961 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36761.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T16:15:11.983", "lastModified": "2025-03-13T14:15:27.083", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36907.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36907.json index 07b991c4b7b..4ac696dfdd6 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36907.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36907.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36921.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36921.json index 50b18038304..cedcca42046 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36921.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36921.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36923.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36923.json index 344d04cefcc..9751b47851f 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36923.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36923.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json index ed7f0b775de..97d24d2c9b4 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37071.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37071.json index adde75d10e8..a0d616a11a8 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37071.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37071.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-07T13:15:04.047", "lastModified": "2024-12-07T13:15:04.047", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json index 55dde829498..64528db17be 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37159.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json index 1f96b8b71bd..4c695785ae1 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T15:15:10.500", "lastModified": "2024-11-21T09:24:02.950", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json index 840d8990cdc..d1462f3316d 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-04-15T14:15:08.213", "lastModified": "2025-04-10T19:54:59.537", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json index 363d3948f99..429380b48d2 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-14T15:42:20.967", "lastModified": "2025-04-10T19:54:51.197", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38379.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38379.json index 7a160054365..8f9118576f3 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38379.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38379.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json index 34735442dbf..847c5afa9d1 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38556.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38556.json index 5137a2f47ea..0fe2be4afa4 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38556.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38556.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38606.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38606.json index 5b89a885b7f..6ecaeb1f807 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38606.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38606.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json index 803670e2559..858fecb7be6 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38769.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json index e9143d32b67..8e8002a7857 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38783.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38985.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38985.json index 7cc7fde3cae..65e75c6e4a8 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38985.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38985.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:16.867", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38988.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38988.json index ee6a0bcb284..d017017b60d 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38988.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38988.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:16.967", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3827.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3827.json index 1adf9a6730b..66abc034dc2 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3827.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3827.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json index c34bd6736b8..c864afaf8df 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3893.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-25T08:15:07.490", "lastModified": "2024-11-21T09:30:38.763", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json index fd793560d7c..863938d49bb 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39090", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-18T20:15:04.163", - "lastModified": "2024-11-21T09:27:11.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:12:27.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_shopping_portal:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6E358155-68C0-4C86-8359-49F37445DC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/arijitdirghanji/My-CVEs/blob/main/CVE-2024-39090.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/arijitdirghanji/My-CVEs/blob/main/CVE-2024-39090.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json index 3c21918b9cc..f816067cd5f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-28T15:15:44.647", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue." + }, + { + "lang": "es", + "value": "Publify es una plataforma de publicaci\u00f3n web autoalojada en Rails. Antes de la versi\u00f3n 10.0.1 de Publify, correspondiente a las versiones anteriores a la 10.0.2 de la gema `publify_core`, un editor en una aplicaci\u00f3n `publify` pod\u00eda realizar un ataque de Cross Site Scripting (XSS) contra un administrador mediante la funci\u00f3n de redireccionamiento. Para explotar esta vulnerabilidad XSS, el administrador debe hacer clic en un enlace malicioso. Un ataque podr\u00eda intentar ocultar su payload mediante HTML u otras codificaciones para que el administrador no note que se trata de un enlace malicioso. Un editor podr\u00eda intentar aprovechar esta vulnerabilidad para aumentar sus privilegios y convertirse en administrador. Las versiones 10.0.1 de Publify y 10.0.2 de la gema `publify_core` solucionan el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39507.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39507.json index 9fa80500263..b93da1a1cdb 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39507.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39507.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39780.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39780.json index 542328681b2..f80666c576a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39780.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code. This issue has now been fixed for ROS Noetic via commit 3d93ac13603438323d7e9fa74e879e45c5fe2e8e." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de deserializaci\u00f3n de YAML en 'dynparam' del Sistema Operativo Robot (ROS), una herramienta de l\u00ednea de comandos para obtener, configurar y eliminar par\u00e1metros de un nodo configurable din\u00e1micamente. Esta vulnerabilidad afecta a las distribuciones de ROS Noetic y anteriores. El problema se debe al uso de la funci\u00f3n yaml.load() en los verbos 'set' y 'get', y permite la creaci\u00f3n de objetos Python arbitrarios. Gracias a esta vulnerabilidad, un usuario local o remoto puede crear y ejecutar c\u00f3digo Python arbitrario. Este problema se ha corregido para ROS Noetic mediante el commit 3d93ac13603438323d7e9fa74e879e45c5fe2e8e." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json index 6e6edae4f40..0c30a832e09 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json index 6809af489ec..7e2d7d3d0ea 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:12.953", "lastModified": "2025-03-03T14:35:41.590", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json index 2dd08b51414..7595a7e01d3 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-13T20:15:17.253", "lastModified": "2025-03-13T14:15:30.023", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json index 916b9b8365c..8f006f34615 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40926.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40926.json index 70677c4f4d1..a0001f6582b 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40926.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40926.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40931.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40931.json index 0974305568b..37c32095232 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40931.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40931.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40984.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40984.json index 322fbdb404a..948a618999e 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40984.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40984.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4061.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4061.json index 28a10a1e2fb..146b0cea442 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4061.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4061.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-21T06:15:09.247", "lastModified": "2025-03-29T00:15:23.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json index 1f7954af529..129ecf78cf1 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json index 64731b94113..586e6d1145d 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json index a6ce3ff6178..b5f31d1dcc2 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json index 3db19b292c6..b0d4acfcf63 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json index d3b55cd3680..88d7916c50d 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41765.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-04T15:15:06.713", "lastModified": "2025-03-21T14:13:55.840", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json index e73644f6007..dc89fa1eaed 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en el gestor de datos SENTRON 7KT PAC1260 (todas las versiones). La interfaz web de los dispositivos afectados no depura los par\u00e1metros de entrada en solicitudes GET espec\u00edficas. Esto podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario con privilegios de root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json index cd95cd71474..9a7d35a4210 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41937.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42195.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42195.json index 5b866cf607a..51fc2f71e68 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42195.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2024-12-05T05:15:06.923", "lastModified": "2024-12-05T05:15:06.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42196.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42196.json index ddd78fe91d5..5aa68f7bfd5 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42196.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2024-12-06T15:15:08.550", "lastModified": "2024-12-06T15:15:08.550", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42264.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42264.json index 4fecec97514..73f8303d93d 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42264.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42264.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42325.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42325.json index 729501c5dcf..c6cac6390ca 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42325.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42325.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc." + }, + { + "lang": "es", + "value": "La API de Zabbix user.get devuelve todos los usuarios que comparten un grupo con el usuario que realiza la llamada. Esto incluye informaci\u00f3n multimedia y otros datos, como intentos de inicio de sesi\u00f3n, etc." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42447.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42447.json index 137774e6faa..ac646a8946a 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42447.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42447.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43046.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43046.json index 32ae81a6b85..07f98ecf0e7 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43046.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43046.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There may be information disclosure during memory re-allocation in TZ Secure OS." + }, + { + "lang": "es", + "value": "Puede haber divulgaci\u00f3n de informaci\u00f3n durante la reasignaci\u00f3n de memoria en TZ Secure OS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43058.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43058.json index 75906ccead2..1c5ac23f8d4 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43058.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43058.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing IOCTL calls." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de llamadas IOCTL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43065.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43065.json index ef999c45255..0f47e177b77 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43065.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43065.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cryptographic issues while generating an asymmetric key pair for RKP use cases." + }, + { + "lang": "es", + "value": "Problemas criptogr\u00e1ficos al generar un par de claves asim\u00e9tricas para casos de uso de RKP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43066.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43066.json index 5f03d74f85b..d4c85dca72b 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43066.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while handling file descriptor during listener registration/de-registration." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al gestionar el descriptor de archivo durante el registro/de-registro del oyente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43067.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43067.json index edefab55542..80dc2af2540 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43067.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43067.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de memoria ocurre durante la copia de datos le\u00eddos desde la EEPROM porque la configuraci\u00f3n de E/S se expone como memoria compartida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json index c32b7ed84c0..023e90440f2 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json index 1a8a212b8a9..1c1f93ca1a7 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43328", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-19T20:15:07.853", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:30:50.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.10", + "matchCriteriaId": "BADB4683-AD71-4089-AF4D-B8DA1B59852D" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-4-0-9-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43331.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43331.json index 0125cb40745..1cb3430ce7d 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43331.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43331.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json index b8541d145a8..7223ac2cdea 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43984.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4442.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4442.json index 57c15664ebc..4834346d6af 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4442.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4442.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T07:15:08.460", "lastModified": "2024-11-21T09:42:50.383", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4443.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4443.json index 7e3b2ad7a72..5b2d9a7a16d 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4443.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-22T06:15:14.110", "lastModified": "2025-03-21T17:58:40.147", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4455.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4455.json index f207151f3b3..e355a47d714 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4455.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4455.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4455", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T11:15:09.613", - "lastModified": "2024-11-21T09:42:51.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T23:49:13.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yithemes:yith_woocommerce_ajax_search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "A79EA785-D9C5-478E-AFEF-585271823788" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/yith-woocommerce-ajax-search/trunk/includes/admin/class-yith-wcas-admin-statistic-list-table.php#L213", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3091321", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0f5fd4-cd06-4d11-9f22-1f417b546afb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/yith-woocommerce-ajax-search/trunk/includes/admin/class-yith-wcas-admin-statistic-list-table.php#L213", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3091321", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0f5fd4-cd06-4d11-9f22-1f417b546afb?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45064.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45064.json index 99240806fb6..12016812521 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45064.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A buffer overflow vulnerability exists in the FileX Internal RAM interface functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted set of network packets can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento del b\u00fafer en la funcionalidad de interfaz interna FileX Internal RAM de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Un conjunto especialmente manipulado de paquetes de red puede conducir a la ejecuci\u00f3n del c\u00f3digo. Un atacante puede enviar una secuencia de solicitudes para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json index 6ba129e22ec..ccd49f1105d 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45417.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json index 5daae4e5909..e8b51d46370 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45418.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json index e13e742ceed..e25b1d67393 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json index cf6b1079063..940a7b9c5bd 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json index 26aa7e4381a..6fd2f6ec1ad 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45426.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45426.json index 7efcf1c0aaa..472ff9d29cb 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45426.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45426.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45540.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45540.json index 7e340d601d6..f975fd10209 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45540.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while invoking IOCTL map buffer request from userspace." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al invocar la solicitud de b\u00fafer de mapa IOCTL desde el espacio de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45543.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45543.json index a3c79f30ed2..90684580d91 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45543.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45543.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while accessing MSM channel map and mixer functions." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al acceder al mapa de canales MSM y a las funciones del mezclador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45544.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45544.json index 0a8bdc220b1..48c19e3ec85 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45544.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45544.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing IOCTL calls to add route entry in the HW." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar llamadas IOCTL para agregar una entrada de ruta en el HW." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45549.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45549.json index df8fd26abe4..cbfcd209247 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45549.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45549.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Information disclosure while creating MQ channels." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n durante la creaci\u00f3n de canales MQ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45551.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45551.json index 25b71a61cd3..ee866415c39 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45551.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45551.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cryptographic issue occurs during PIN/password verification using Gatekeeper, where RPMB writes can be dropped on verification failure, potentially leading to a user throttling bypass." + }, + { + "lang": "es", + "value": "Se produce un problema criptogr\u00e1fico durante la verificaci\u00f3n de PIN/contrase\u00f1a con Gatekeeper, donde las escrituras RPMB pueden descartarse si falla la verificaci\u00f3n, lo que potencialmente puede llevar a una omisi\u00f3n de la limitaci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45552.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45552.json index dbfc2a6950f..059d34f89ac 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45552.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45552.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Information disclosure may occur during a video call if a device resets due to a non-conforming RTCP packet that doesn`t adhere to RFC standards." + }, + { + "lang": "es", + "value": "Puede ocurrir una divulgaci\u00f3n de informaci\u00f3n durante una videollamada si un dispositivo se reinicia debido a un paquete RTCP no conforme que no adhiere a los est\u00e1ndares RFC." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45556.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45556.json index ef2f63b4655..30eff4b5aa7 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45556.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45556.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR." + }, + { + "lang": "es", + "value": "Puede surgir un problema criptogr\u00e1fico porque la configuraci\u00f3n de control de acceso permite que Linux lea registros clave en TCSR." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45557.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45557.json index 961811f4fbe..1e113be246d 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45557.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45557.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de memoria puede ocurrir cuando TME procesa direcciones de solicitudes TZ y MPSS sin la validaci\u00f3n adecuada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45699.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45699.json index 91ea7ed0d43..765e2fec9ba 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45699.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45699.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser." + }, + { + "lang": "es", + "value": "El endpoint /zabbix.php?action=export.valuemaps presenta una vulnerabilidad de Cross-Site Scripting a trav\u00e9s del par\u00e1metro backurl. Esto se debe a la reflexi\u00f3n de datos proporcionados por el usuario sin el escape HTML ni la codificaci\u00f3n de salida adecuados. Como resultado, se puede inyectar un payload de JavaScript en el endpoint mencionado, lo que provoca su ejecuci\u00f3n en el contexto del navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45700.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45700.json index 8380d98e10b..abf8f59794a 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45700.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45700.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash." + }, + { + "lang": "es", + "value": "El servidor Zabbix es vulnerable a una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido al agotamiento incontrolado de recursos. Un atacante puede enviar solicitudes especialmente manipuladas al servidor, lo que provocar\u00e1 que este asigne una cantidad excesiva de memoria y realice operaciones de descompresi\u00f3n que consumen mucha CPU, lo que finalmente provocar\u00e1 un bloqueo del servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45799.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45799.json index 51c503a1813..bcdf72936b9 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45799.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-16T19:16:10.880", "lastModified": "2025-02-28T15:29:12.560", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4567.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4567.json index 6ebf7f418eb..d029961ce56 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4567.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4567.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json index fd943252048..bd2ce889706 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Incorrect User Management vulnerability [CWE-286] in FortiWeb version 7.6.2 and below, version 7.4.6 and below, version 7.2.10 and below, version 7.0.11 and below widgets dashboard may allow an authenticated attacker with at least read-only admin permission to perform operations on the dashboard of other administrators via crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de administraci\u00f3n incorrecta de usuarios [CWE-286] en los widgets del panel de control de FortiWeb versi\u00f3n 7.6.2 y anteriores, versi\u00f3n 7.4.6 y anteriores, versi\u00f3n 7.2.10 y anteriores, versi\u00f3n 7.0.11 y anteriores puede permitir que un atacante autenticado con al menos permiso de administrador de solo lectura realice operaciones en el panel de control de otros administradores a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46772.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46772.json index 416b534bb8b..ace4c56243a 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46772.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46772", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:05.073", - "lastModified": "2024-09-23T16:52:17.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-07T09:15:15.800", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -70,6 +70,14 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/04805efe8623f8721f3c01182ea73d68e88c62d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b9264aa24f628eba5779d1c916441e0cedde9b3d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/ea79068d4073bf303f8203f2625af7d9185a1bc6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47107.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47107.json index d5956a3ecf2..ea66831e9bd 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47107.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47107.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-07T15:15:04.123", "lastModified": "2024-12-07T15:15:04.123", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json index 42d75b9a0f7..b07e8362478 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.647", "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47215.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47215.json index 27983a971b0..11c54b7b9a3 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47215.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.873", "lastModified": "2025-04-07T19:15:53.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json index dd501184679..13420c3229b 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json index 4bdb42dd0ce..0efbbd9e862 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T15:15:45.023", "lastModified": "2025-04-01T14:15:20.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json index 8baf9f80422..1cdf0d6f603 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cambio de contrase\u00f1a no verificada en la GUI de Fortinet FortiSwitch puede permitir que un atacante remoto no autenticado cambie las contrase\u00f1as de administrador a trav\u00e9s de una solicitud especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4854.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4854.json index 9437eda5791..6530b2a998e 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4854.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4854.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-05-14T15:45:18.890", "lastModified": "2024-11-21T09:43:44.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json index 132e2130f0d..eda7041395f 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json index 83424fbe3f2..85ba1fc0b94 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T18:15:19.243", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json index 1d707405c62..6498cfe6e85 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49563.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos arbitrarios del sistema operativo con privilegios de root y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json index 1c8dbb19e3b..2f5eebc80df 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49564.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos arbitrarios del sistema operativo con privilegios de root y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json index 21a292565c0..eb51f1feeea 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49565.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json index d0240e738c7..ec6bca758d0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49601.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n del comando." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49697.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49697.json index baa0d931523..42853249601 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49697.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49697.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-19T17:15:09.870", "lastModified": "2024-11-19T21:57:32.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49848.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49848.json index 4ba35c62ed5..3a163105162 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49848.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49848.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing multiple IOCTL calls from HLOS to DSP." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar m\u00faltiples llamadas IOCTL desde HLOS a DSP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json index e71323afa36..023fed72a7f 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50056", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:17.853", - "lastModified": "2024-11-20T20:18:00.460", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-07T09:15:16.003", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,14 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/03fa71e97e9bb116993ec1d51b8a6fe776db0984", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/72a68d2bede3284b95ee93a5ab3a81758bba95b0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/a7bb96b18864225a694e3887ac2733159489e4b0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50137.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50137.json index fa7e8bdc29f..6b25f33e969 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50137.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50137", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:16.277", - "lastModified": "2024-11-08T14:29:05.563", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-07T09:15:16.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -93,6 +93,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/3918b2016d28c9b2bddd5ab194ab366a4e2310f5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/c923f1fb8ae8627322d167b73bb4f978404a05de", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50384.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50384.json index 10700a7f07b..5820228981a 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50384.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50384.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A denial of service vulnerability exists in the NetX Component HTTP server functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects X-CUBE-AZRTOS-F7 NetX Duo Web Component HTTP server v 1.1.0. This HTTP server implementation is contained in this file - x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\web\\nx_web_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad del servidor NetX Component HTTP de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Un paquete de red especialmente manipulado puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar un paquete malicioso para activar esta vulnerabilidad. Esta vulnerabilidad afecta X-Cube-Azrtos-F7 NetX Duo Web Component HTTP Server v 1.1.0. Esta implementaci\u00f3n del servidor HTTP est\u00e1 contenida en este archivo: X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Web \\ nx_web_http_server.c" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50385.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50385.json index 96508e7c0f3..0ec4f1088aa 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50385.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A denial of service vulnerability exists in the NetX Component HTTP server functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects X-CUBE-AZRTOS-F7 NetX Duo Component HTTP Server HTTP server v 1.1.0. This HTTP server implementation is contained in this file - x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\http\\nxd_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad del servidor NetX Component HTTP de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Un paquete de red especialmente manipulado puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar un paquete malicioso para activar esta vulnerabilidad. Esta vulnerabilidad afecta a X-Cube-Azrtos-F7 NetX Duo Component HTTP Server HTTP Server v 1.1.0. Esta implementaci\u00f3n del servidor HTTP est\u00e1 contenida en este archivo: X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Http \\ nxd_http_server.c" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json index d4eea3da5ea..039d9d9f9cd 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:10.383", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json index 0e86628711e..fde960dce14 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device" + }, + { + "lang": "es", + "value": "Vulnerabilidad de restricci\u00f3n indebida del canal de comunicaci\u00f3n a los endpoints previstos [CWE-923] en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.3, 7.2.0 a 7.2.7, 7.0.0 a 7.0.14, 6.4.0 a 6.4.15 y 6.2.0 a 6.2.16, Fortinet FortiProxy versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.9, 7.0.0 a 7.0.15 y 2.0.0 a 2.0.14, Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.4, 7.0.0 a 7.0.11, 6.4.0 a 6.4.14 y 6.2.0 a 6.2.17, 6.2.13, Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.4, 7.0.0 a 7.0.11, 6.4.0 a 6.4.14 y 6.2.0 a 6.2.13, Fortinet FortiVoice versi\u00f3n 7.0.0 a 7.0.2, 6.4.0 a 6.4.8 y 6.0.0 a 6.0.12 y Fortinet FortiWeb versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.10, 7.0.0 a 7.0.10 permite a un atacante no autenticado en una posici\u00f3n de intermediario hacerse pasar por el dispositivo de administraci\u00f3n (servidor FortiCloud y/o en ciertas condiciones, FortiManager), al interceptar la solicitud de autenticaci\u00f3n FGFM entre el dispositivo de administraci\u00f3n y el dispositivo administrado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50594.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50594.json index 21dbafee620..f1d3d169d2a 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50594.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50594.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted series of network requests can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.This vulnerability affects the NetX Duo Web Component HTTP Server implementation which can be found in x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\web\\nx_web_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de bajo flujo de enteros en el servidor HTTP, poner la funcionalidad de solicitud de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Una serie especialmente manipulado de solicitudes de red puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar una secuencia de paquetes maliciosos para desencadenar esta vulnerabilidad. Esta vulnerabilidad afecta la implementaci\u00f3n del servidor HTTP de componente web NetX Duo que se puede encontrar en X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Web \\ nx_web_http_server.c.C" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50595.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50595.json index aacf4c5715e..0949e97df1a 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50595.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50595.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted series of network requests can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\http\\nxd_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de bajo flujo de enteros en el servidor HTTP, poner la funcionalidad de solicitud de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Una serie especialmente manipulado de solicitudes de red puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar una secuencia de paquetes maliciosos para desencadenar esta vulnerabilidad. Esta vulnerabilidad afecta la implementaci\u00f3n del servidor HTTP de componente duo de NetX que se puede encontrar en X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Http \\ NXD_HTTP_Server.c.C" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50596.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50596.json index 7a16de75154..652e928de53 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50596.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50596.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects the NetX Duo Web Component HTTP Server implementation which can be found in x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\web\\nx_web_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de bajo flujo de enteros en el servidor HTTP, poner la funcionalidad de solicitud de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Un paquete de red especialmente manipulado puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar un paquete malicioso para activar esta vulnerabilidad. Esta vulnerabilidad afecta la implementaci\u00f3n del servidor HTTP de componente web de duo NetX que se puede encontrar en X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Web \\ nx_web_http_server.c" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50597.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50597.json index 7958b4a7efd..13f9d1cd940 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50597.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50597.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer underflow vulnerability exists in the HTTP server PUT request functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability affects the NetX Duo Component HTTP Server implementation which can be found in x-cube-azrtos-f7\\Middlewares\\ST\\netxduo\\addons\\http\\nxd_http_server.c" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de bajo flujo de enteros en el servidor HTTP, poner la funcionalidad de solicitud de STMicroelectronics X-Cube-Azrtos-WL 2.0.0. Un paquete de red especialmente manipulado puede conducir a la negaci\u00f3n del servicio. Un atacante puede enviar un paquete malicioso para activar esta vulnerabilidad. Esta vulnerabilidad afecta la implementaci\u00f3n del servidor HTTP del componente duo NetX que se puede encontrar en X-Cube-Azrtos-F7 \\ MiddleWares \\ ST \\ NetXDUO \\ Addons \\ Http \\ nxd_http_server.c" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json index 5efac73f5dd..b31cd0acf16 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50991", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T15:15:06.527", - "lastModified": "2024-11-12T19:35:12.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:00:24.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:user_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA3AF89-AA16-422A-ACD9-60BF47673374" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/User%20Management/Ums%20%20XSS%20pdf.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json index 474024ebd08..19f037d3f37 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5086.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json index 5914e0aac97..5809618ee14 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos J\u00e1-J\u00e1 Pagamentos for WooCommerce allows Reflected XSS. This issue affects J\u00e1-J\u00e1 Pagamentos for WooCommerce: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en jajapagamentos J\u00e1-J\u00e1 Pagamentos para WooCommerce permite XSS reflejado. Este problema afecta a J\u00e1-J\u00e1 Pagamentos para WooCommerce desde n/d hasta la versi\u00f3n 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json index d9ac68817d9..ee402e99cb6 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51962.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51993.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51993.json index d1d46a912bf..dd3dbfb5154 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51993.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51993", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-07T18:15:18.203", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:05:22.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -73,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.0", + "matchCriteriaId": "A59157AC-6016-4FB6-A3BD-08EAB161CF96" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-9mq5-349x-x427", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51994.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51994.json index de84d61562c..13cb894789c 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51994.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51994", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-07T18:15:18.470", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T20:03:59.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -71,12 +91,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.11", + "matchCriteriaId": "1BF82095-AA7D-454F-9228-78EC4D8CD5CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.2", + "matchCriteriaId": "91456038-80B6-479B-BBDF-9376B9D2F100" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-jjph-c25g-5c7g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json index 84e11e9fbd0..13e76f68088 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json index 758bd1301ed..5d9b5149d0b 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json index 3a5e85e8116..5677dae0e28 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json index 5d73add3d12..e6725f8cfd9 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json index 2602bc978c8..05c46b42e8f 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52676.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52676.json index 7390f8bd9d6..a2d2abf37ef 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52676.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52676.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-04T17:15:15.207", "lastModified": "2024-12-05T20:15:22.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52912.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52912.json index 73dd8e57444..660f76accd9 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52912.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.443", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52913.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52913.json index 5fb4ad4930e..a6824583f8e 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52913.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.500", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52914.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52914.json index c93e601e385..34a191d53b1 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52914.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52914.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.567", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52915.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52915.json index 1aeb73ede15..37cde53a46e 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52915.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52915.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.633", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52916.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52916.json index 77f0d1ec634..6db7e544cd8 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52916.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.697", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52917.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52917.json index 5847fdc8bf9..0d6747657cb 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52917.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52917.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.760", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52919.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52919.json index e838de5eb8e..868289cb58d 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52919.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52919.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.890", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52920.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52920.json index 7648719ef3e..6e6b069eaed 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52920.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:04.960", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52921.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52921.json index 5e938492026..c3faf6884cb 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52921.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:05.023", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52922.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52922.json index 561bd8d36e3..36b8a14cff6 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52922.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52922.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T04:15:05.083", "lastModified": "2024-11-18T17:35:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52941.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52941.json index d6afd935de7..6e5949baa5b 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52941.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52941.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:05.283", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52942.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52942.json index 652523d4deb..a6a470d5039 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52942.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52942.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:05.543", "lastModified": "2024-11-18T17:11:17.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json index 2f8f3126919..114ee1a1304 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:05.793", "lastModified": "2025-03-18T20:15:24.340", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52944.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52944.json index d26b8f70822..380faca424a 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52944.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:06.017", "lastModified": "2024-11-19T16:35:19.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52945.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52945.json index 170c86ab0f2..c5351f8a124 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52945.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52945.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:06.250", "lastModified": "2024-11-19T16:35:20.020", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json index f3ef487bde4..008df258580 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An\u00a0Improper Output Neutralization for Logs vulnerability [CWE-117] in FortiAnalyzer version 7.6.1 and below, version 7.4.5 and below, version 7.2.8 and below, version 7.0.13 and below and FortiManager version 7.6.1 and below, version 7.4.5 and below, version 7.2.8 and below, version 7.0.12 and below may allow an unauthenticated remote attacker to pollute the logs via crafted login requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n de salida inadecuada para registros [CWE-117] en FortiAnalyzer versi\u00f3n 7.6.1 y anteriores, versi\u00f3n 7.4.5 y anteriores, versi\u00f3n 7.2.8 y anteriores, versi\u00f3n 7.0.13 y anteriores y FortiManager versi\u00f3n 7.6.1 y anteriores, versi\u00f3n 7.4.5 y anteriores, versi\u00f3n 7.2.8 y anteriores, versi\u00f3n 7.0.12 y anteriores puede permitir que un atacante remoto no autenticado contamine los registros a trav\u00e9s de solicitudes de inicio de sesi\u00f3n manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json index b3162c4e3eb..8daaabd0db0 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash.\n\nA successful attack requires a malicious user to have read permissions for Observability assigned to them." + }, + { + "lang": "es", + "value": "Se ha identificado un problema en el que una solicitud especialmente manipulada enviada a una API de Observability podr\u00eda provocar el bloqueo del servidor Kibana. Para que el ataque tenga \u00e9xito, se requiere que un usuario malintencionado tenga permisos de lectura asignados a Observability." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json index 84fb3dd0171..4376897c7e1 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash.\n\nA successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una falla en Elasticsearch. Una recursi\u00f3n extensa con la funci\u00f3n innerForbidCircularReferences de la clase PatternBank pod\u00eda provocar el bloqueo del nodo Elasticsearch. Para que el ataque tenga \u00e9xito, se requiere que un usuario malintencionado tenga asignado el privilegio read_pipeline del cl\u00faster de Elasticsearch." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json index d0430d7f469..44897d28ea6 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Elasticsearch, donde una recursi\u00f3n grande que utiliza la cadena con formato Well-KnownText con objetos GeometryCollection anidados podr\u00eda provocar un desbordamiento de pila." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5226.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5226.json index 61824fc284c..b4bc26372e1 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5226.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5226.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5276.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5276.json index 47ac92e76e5..f1749f01ffd 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5276.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5276", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-06-25T20:15:14.013", - "lastModified": "2024-11-21T09:47:20.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T23:59:36.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -53,32 +73,112 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.6", + "matchCriteriaId": "1C632AF0-F353-4C2D-B753-01AFE9FB823E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:-:*:*:*:*:*:*", + "matchCriteriaId": "A949B5C7-EF1E-4B86-BC17-96A760DC3A76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*", + "matchCriteriaId": "1C338109-0CF4-4212-BF34-A3ECBEC7FDA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build114:*:*:*:*:*:*", + "matchCriteriaId": "D456C621-CB8F-4156-B17B-BCF6D4577D50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build126:*:*:*:*:*:*", + "matchCriteriaId": "0A5A4EF1-E857-4B2A-85AE-86E36BDA6719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build130:*:*:*:*:*:*", + "matchCriteriaId": "0522BC87-832E-43AE-8F05-75F7209B1D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build135:*:*:*:*:*:*", + "matchCriteriaId": "D02F4F65-9D40-47CC-B50B-46A9D208A549" + } + ] + } + ] } ], "references": [ { "url": "https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0", - "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.fortra.com/security/advisory/fi-2024-008", - "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2024-25", - "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.fortra.com/security/advisory/fi-2024-008", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2024-25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53163.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53163.json index d23d7d937b7..e03a6537e52 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53163.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53163.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53244.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53244.json index 6a49a7d4a2b..3f6ead2f07f 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53244.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53244.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53245.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53245.json index ccf6ce47673..4a7d40fff49 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53245.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53245.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53268.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53268.json index 67998da6286..b7c2e1be69a 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53268.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53268.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-25T20:15:10.583", "lastModified": "2024-11-25T20:15:10.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json index e5c03260ccf..ff3425eb861 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T20:15:21.033", "lastModified": "2024-12-10T21:15:20.003", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json index 4bb9fe76487..a6a23b5b519 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53504.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.763", "lastModified": "2024-12-02T17:15:13.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json index 69a8ef7d2a5..47dc1bb2d7e 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.853", "lastModified": "2024-12-02T17:15:13.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json index adfda9ceb91..97afa0400cd 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.943", "lastModified": "2024-12-02T17:15:13.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json index f3aeaaf6fba..562ae7836e1 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:21.027", "lastModified": "2024-12-02T17:15:13.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53961.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53961.json index 2c91dd34ec9..70f96977332 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53961.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53961.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json index 466bd9ff969..dbf912b91f0 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.313", "lastModified": "2025-03-19T17:15:40.313", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json index 285986269ac..cfbe533ef77 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53968.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.467", "lastModified": "2025-03-19T17:15:40.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json index 657bc841c6c..e6b75d85bb2 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53969.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.610", "lastModified": "2025-03-19T17:15:40.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json index 8f357c9dcca..6f9a2a8941d 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53970.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-19T17:15:40.750", "lastModified": "2025-03-19T17:15:40.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json index 316f304d9b7..3b583d09377 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del SO ('OS Command Injection') [CWE-78] en Fortinet FortiIsolator anterior a la versi\u00f3n 2.4.6 permite que un atacante privilegiado con perfil de s\u00faper administrador y acceso CLI ejecute c\u00f3digo no autorizado a trav\u00e9s de solicitudes HTTP espec\u00edficamente manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json index efbc1d8f4fe..ce888ceee96 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator CLI before version 2.4.6 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del SO ('OS Command Injection') [CWE-78] en Fortinet FortiIsolator CLI anterior a la versi\u00f3n 2.4.6 permite que un atacante privilegiado ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes CLI manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json index b382e9a62fc..904e296fef0 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound PluginPass allows Manipulating Web Input to File System Calls. This issue affects PluginPass: from n/a through 0.9.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad \"Limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido\" ('Path Traversal') en NotFound PluginPass permite manipular la entrada web en llamadas al sistema de archivos. Este problema afecta a PluginPass desde la versi\u00f3n n/d hasta la 0.9.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-543xx/CVE-2024-54357.json b/CVE-2024/CVE-2024-543xx/CVE-2024-54357.json index 277f51baf47..969a8cb0a30 100644 --- a/CVE-2024/CVE-2024-543xx/CVE-2024-54357.json +++ b/CVE-2024/CVE-2024-543xx/CVE-2024-54357.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-16T16:15:08.617", "lastModified": "2024-12-16T16:15:08.617", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json index 52fbfcf61e7..8dbf31739ca 100644 --- a/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json +++ b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal vulnerability in NotFound GetShop ecommerce allows Path Traversal. This issue affects GetShop ecommerce: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Path Traversal en NotFound GetShop ecommerce permite Path Traversal. Este problema afecta al comercio electr\u00f3nico GetShop desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json index 47e015bbdab..6af73520bd6 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json index 842a23807c0..392c1b601da 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json index 0fe30aa74e0..1091a0abfd8 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54818.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T19:15:38.290", "lastModified": "2025-01-08T20:15:28.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json index 27970690c49..3152a6848a1 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54918.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:15.707", "lastModified": "2024-12-12T18:15:25.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json index 642b640e317..a379a94dee4 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:15.940", "lastModified": "2024-12-11T16:15:15.127", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json index c150766f4ad..0dc331d4ebd 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54923.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.137", "lastModified": "2024-12-11T16:15:15.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json index 9649f1de70b..bbf260715d3 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.243", "lastModified": "2024-12-11T16:15:15.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json index a0b7f8584dd..39b01304a9e 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T19:15:16.350", "lastModified": "2024-12-12T18:15:26.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json index d96f8f365df..91098ad7622 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55072.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55072.json index b49c3962aa9..cd0396cba1b 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55072.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55072.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T19:15:48.330", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Broken Object Level Authorization vulnerability in the component /api/users/{user-id} of hay-kot mealie v2.2.0 allows users to edit their own profile in order to give themselves more permissions or to change their household." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de autorizaci\u00f3n a nivel de objeto roto en el componente /api/users/{user-id} de hay-kot mealie v2.2.0 permite a los usuarios editar su propio perfil para obtener m\u00e1s permisos o cambiar su propietario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json index 2379ecba48d..b95c986ddde 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T23:15:06.607", "lastModified": "2024-12-17T15:15:15.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55093.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55093.json index 7891ac922dc..7c0af9ff622 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55093.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55093.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "phpIPAM through 1.7.3 has a reflected Cross-Site Scripting (XSS) vulnerability in the install scripts." + }, + { + "lang": "es", + "value": "Desde phpIPAM hasta la versi\u00f3n 1.7.3 se refleja una vulnerabilidad de tipo Cross-Site Scripting (XSS) en los scripts de instalaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55505.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55505.json index 039953e2581..7119df1baca 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55505.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55505.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55505", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T22:15:07.477", - "lastModified": "2024-12-18T22:15:07.477", + "lastModified": "2025-04-04T21:15:43.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en CodeAstro Complaint Management System v.1.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente mess-view.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55505.md", diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55602.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55602.json index 055159174de..a46f84d1b22 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55602.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-10T17:15:15.423", "lastModified": "2024-12-10T18:15:43.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json index f5436e0a98a..4b8f9b4ffad 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-07T23:15:13.293", "lastModified": "2025-02-10T18:15:30.540", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55653.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55653.json index d0093fc19ec..a3cc338fa37 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55653.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-10T23:15:06.410", "lastModified": "2024-12-10T23:15:06.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json index 3e2a1512143..6c33d2c6a6c 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-30T12:15:10.807", "lastModified": "2025-03-04T17:09:25.197", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56325.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56325.json index 017ad7b258d..d0bea9aaefc 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56325.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56325.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication Bypass Issue\n\nIf the path does not contain / and contain., authentication is not required.\n\nExpected Normal Request and Response Example\n\ncurl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"} http://{server_ip}:9000/users \n\n\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}\n\n\nMalicious Request and Response Example \n\ncurl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .\n\n\nReturn: {\"users\":{}}\n\n\n\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot." + }, + { + "lang": "es", + "value": "Problema de omisi\u00f3n de autenticaci\u00f3n: Si la ruta no contiene / ni contiene., no se requiere autenticaci\u00f3n. Ejemplo de solicitud y respuesta normal esperada: curl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"} http://{server_ip}:9000/users. Devuelve: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}. Ejemplo de solicitud y respuesta maliciosa: curl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; . Devuelve: {\"users\":{}} Se agrega un nuevo usuario sin autenticaci\u00f3n, lo que le permite controlar Pinot." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json index 0497801b1ab..b00c21138dc 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.407", "lastModified": "2025-01-03T19:15:12.340", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json index 69e28cac33b..19e0f7d3f4c 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.550", "lastModified": "2025-01-03T19:15:12.443", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json index 1dcc85bdd6a..9010e6c5500 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T16:15:26.773", "lastModified": "2025-01-03T19:15:12.533", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json index 94955aa7d08..2d133480953 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.687", "lastModified": "2025-01-03T19:15:12.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json index 8542f330266..a3c02cc515e 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56410.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T18:15:15.987", "lastModified": "2025-01-03T21:15:13.723", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56469.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56469.json index 38972b7a772..f76c0650fec 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56469.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56469.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM UrbanCode Deploy (UCD) 7.1 through 7.1.2.22, 7.2 through 7.2.3.15, and 7.3 through 7.3.2.10 / IBM DevOps Deploy 8.0 through 8.0.1.5 and 8.1 through 8.1.0.1 could allow unauthorized access to other services or potential exposure of sensitive data due to missing authentication in its Agent Relay service." + }, + { + "lang": "es", + "value": "IBM UrbanCode Deploy (UCD) 7.1 a 7.1.2.22, 7.2 a 7.2.3.15 y 7.3 a 7.3.2.10 / IBM DevOps Deploy 8.0 a 8.0.1.5 y 8.1 a 8.1.0.1 podr\u00edan permitir el acceso no autorizado a otros servicios o la posible exposici\u00f3n de datos confidenciales debido a la falta de autenticaci\u00f3n en su servicio Agent Relay." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56528.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56528.json index b4cda751205..d94a55487d1 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56528.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:39.100", "lastModified": "2025-04-07T19:15:54.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56548.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56548.json index 3646f036d06..c0ab2d1e8e5 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56548.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56548.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56555.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56555.json index c1dcc2d6f13..92de7733511 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56555.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56555.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56620.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56620.json index b1ad489f789..84363c30a1c 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56620.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56620", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:21.540", - "lastModified": "2025-01-08T16:09:56.403", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-07T09:15:16.353", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -83,6 +83,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/f16a097047e38dcdd169a15e3eed1b2f2147a2e7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f99cb5f6344ef93777fd3add7979ebf291a852df", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json index 0b0456c59b3..a3a941f313d 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56703.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56703.json index 5a5cc2713f1..807e37c759e 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56703.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56703.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json index 1b155f09857..afeaa364696 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T22:15:38.903", "lastModified": "2025-03-18T15:15:58.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56975.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56975.json index d446b65dd6a..b5412228ba9 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56975.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:17.207", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json index 0a18a69cfa0..547904b7be1 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5668.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5668.json index 4611fa1f13b..9a1eae88701 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5668.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5668.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json index cc5718c2bfa..5e2d6b6da3e 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5685.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57083.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57083.json index 9186898a9b1..ace5d20e031 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57083.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:17.307", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json index 6d02af2e8e6..6c870d7d287 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.947", "lastModified": "2025-01-28T20:15:55.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json index b167850c17f..fc11d93e6c9 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.670", "lastModified": "2025-02-03T16:15:33.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json index 37cdf69c2df..369dfa4d564 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.780", "lastModified": "2025-02-03T16:15:33.490", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57834.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57834.json index 04f7e95d13b..8e7b5c94ef6 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57834.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57834.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json index e7dc26afe0d..0504d32cead 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json index aa183e784c8..ef978e5b608 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json index 941467b0fba..d303d848ecc 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57913.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57913.json index 1c5db740427..b0a07db62b0 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57913.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57913.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57922.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57922.json index a301794acbe..a6fac0a09a4 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57922.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57922.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57925.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57925.json index 50c2a0f1f7e..691c2435098 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57925.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57925.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57939.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57939.json index 06727bbcfb8..9ea0fe9e72e 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57939.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57939.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json index 2c2089df7d9..e35adbf5184 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json index 6b431852bfe..0771a046840 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json index 4246f235b6c..90c717a3a3f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57982.json @@ -82,24 +82,24 @@ "url": "https://git.kernel.org/stable/c/a16871c7832ea6435abb6e0b58289ae7dcb7e4fc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/dd4c2a174994238d55ab54da2545543d36f4e0d0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/e952837f3ddb0ff726d5b582aa1aad9aa38d024d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json index 21716595788..653fc1d84ed 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57983.json @@ -75,16 +75,16 @@ "url": "https://git.kernel.org/stable/c/2cd12c7fba59f30369e8647a2b726c7280903304", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/db049866943a38bf46a34fa120d526663339d7a5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json index d33339fd7ed..1c4399f5ea0 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json @@ -82,24 +82,24 @@ "url": "https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json index d6ad81f2f1b..cbfbe9fc30c 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json @@ -82,24 +82,24 @@ "url": "https://git.kernel.org/stable/c/2f709fe755c16b811ba7339ae4c3ee2c72323d3d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/5872530c2862700070223a2c2ea85642bf2f8875", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/5cd0bd815c8a48862a296df9b30e0ea0da14acd3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json index 87aea9b915a..800dcc9a90f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json @@ -89,24 +89,24 @@ "url": "https://git.kernel.org/stable/c/08fa656c91fd5fdf47ba393795b9c0d1e97539ed", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/2d1628d32300e4f67ac0b7409cbfa7b912a8fe9d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/d03b8fe1b518fc2ea2d82588e905f56d80cd64b2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json index 49baacd04c2..3e0d4d558d4 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json @@ -75,24 +75,24 @@ "url": "https://git.kernel.org/stable/c/01d2d34e9fcc9897081c3c16a666f793c8a38c58", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/223ba95fdcd3c6090e2bd51dce66abb6dd4f9df9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/e4790b3e314a4814f1680a5dc552031fb199b878", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json index 85c868c9a79..315bf079464 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json @@ -75,16 +75,16 @@ "url": "https://git.kernel.org/stable/c/5a10971c7645a95f5d5dc23c26fbac4bf61801d0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/f3a95a312419e4f1e992525917da9dbcd247038f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json index b68319ae4bd..1f5be52f181 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json index 0d7d78fa2da..e9c7ca87dec 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json index 891da7202dd..cf7f8740405 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58010.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58010.json index f5ec4e1d089..06c7c6393ce 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58010.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58010.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58011.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58011.json index a504b425d5c..3fd502dc476 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58011.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58011.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58012.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58012.json index 9b73e1a83f9..ed3417296fb 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58012.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58012.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58017.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58017.json index e1b33d321fe..7fdce4385e4 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58017.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58017.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58020.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58020.json index 553347e834c..852c99372ad 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58020.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58020.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58021.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58021.json index 497151dc10d..db4b2142dd6 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58021.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58021.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58022.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58022.json index ba8ea622c89..e6df14bf48e 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58022.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58022.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58042.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58042.json index 4c5a82dfca7..c71dd9fb99a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58042.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58042.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json index 567a6f7c6d8..269e623b7ae 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json index 5d97921b8ad..5d6de7172f3 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json index 03a11042720..2d6e5147c3a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json index 63ca5954fdf..b4ea13a60d2 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json index 8435b8b77e0..a1976493902 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json index b2aaa91e066..92f9a1aef7f 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json index 7fb2ef9999d..e1fdc76ad37 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json index 3cba8162d25..f68f243a13a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json index 1018d4890a1..638b513ec23 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.230", "lastModified": "2025-03-21T15:41:13.050", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58090.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58090.json index ed0483ba460..98a2a1d5a20 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58090.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Prevent rescheduling when interrupts are disabled\n\nDavid reported a warning observed while loop testing kexec jump:\n\n Interrupts enabled after irqrouter_resume+0x0/0x50\n WARNING: CPU: 0 PID: 560 at drivers/base/syscore.c:103 syscore_resume+0x18a/0x220\n kernel_kexec+0xf6/0x180\n __do_sys_reboot+0x206/0x250\n do_syscall_64+0x95/0x180\n\nThe corresponding interrupt flag trace:\n\n hardirqs last enabled at (15573): [] __up_console_sem+0x7e/0x90\n hardirqs last disabled at (15580): [] __up_console_sem+0x63/0x90\n\nThat means __up_console_sem() was invoked with interrupts enabled. Further\ninstrumentation revealed that in the interrupt disabled section of kexec\njump one of the syscore_suspend() callbacks woke up a task, which set the\nNEED_RESCHED flag. A later callback in the resume path invoked\ncond_resched() which in turn led to the invocation of the scheduler:\n\n __cond_resched+0x21/0x60\n down_timeout+0x18/0x60\n acpi_os_wait_semaphore+0x4c/0x80\n acpi_ut_acquire_mutex+0x3d/0x100\n acpi_ns_get_node+0x27/0x60\n acpi_ns_evaluate+0x1cb/0x2d0\n acpi_rs_set_srs_method_data+0x156/0x190\n acpi_pci_link_set+0x11c/0x290\n irqrouter_resume+0x54/0x60\n syscore_resume+0x6a/0x200\n kernel_kexec+0x145/0x1c0\n __do_sys_reboot+0xeb/0x240\n do_syscall_64+0x95/0x180\n\nThis is a long standing problem, which probably got more visible with\nthe recent printk changes. Something does a task wakeup and the\nscheduler sets the NEED_RESCHED flag. cond_resched() sees it set and\ninvokes schedule() from a completely bogus context. The scheduler\nenables interrupts after context switching, which causes the above\nwarning at the end.\n\nQuite some of the code paths in syscore_suspend()/resume() can result in\ntriggering a wakeup with the exactly same consequences. They might not\nhave done so yet, but as they share a lot of code with normal operations\nit's just a question of time.\n\nThe problem only affects the PREEMPT_NONE and PREEMPT_VOLUNTARY scheduling\nmodels. Full preemption is not affected as cond_resched() is disabled and\nthe preemption check preemptible() takes the interrupt disabled flag into\naccount.\n\nCure the problem by adding a corresponding check into cond_resched()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/core: Evitar la reprogramaci\u00f3n cuando las interrupciones est\u00e1n deshabilitadas David inform\u00f3 una advertencia observada durante la prueba del bucle kexec jump: Interrupciones habilitadas despu\u00e9s de irqrouter_resume+0x0/0x50 ADVERTENCIA: CPU: 0 PID: 560 en drivers/base/syscore.c:103 syscore_resume+0x18a/0x220 kernel_kexec+0xf6/0x180 __do_sys_reboot+0x206/0x250 do_syscall_64+0x95/0x180 El seguimiento del indicador de interrupci\u00f3n correspondiente: hardirqs se habilit\u00f3 por \u00faltima vez en (15573): [] __up_console_sem+0x7e/0x90 hardirqs se desactiv\u00f3 por \u00faltima vez en (15580): [] __up_console_sem+0x63/0x90. Esto significa que __up_console_sem() se invoc\u00f3 con las interrupciones habilitadas. Una instrumentaci\u00f3n m\u00e1s detallada revel\u00f3 que, en la secci\u00f3n de interrupci\u00f3n deshabilitada de kexec jump, una de las devoluciones de llamada syscore_suspend() despert\u00f3 una tarea, lo que activ\u00f3 el indicador NEED_RESCHED. Una devoluci\u00f3n de llamada posterior en la ruta de reanudaci\u00f3n invoc\u00f3 cond_resched(), que a su vez condujo a la invocaci\u00f3n del programador: __cond_resched+0x21/0x60 down_timeout+0x18/0x60 acpi_os_wait_semaphore+0x4c/0x80 acpi_ut_acquire_mutex+0x3d/0x100 acpi_ns_get_node+0x27/0x60 acpi_ns_evaluate+0x1cb/0x2d0 acpi_rs_set_srs_method_data+0x156/0x190 acpi_pci_link_set+0x11c/0x290 irqrouter_resume+0x54/0x60 syscore_resume+0x6a/0x200 kernel_kexec+0x145/0x1c0 __do_sys_reboot+0xeb/0x240 do_syscall_64+0x95/0x180 Este es un problema de larga data, que probablemente se hizo m\u00e1s visible con los cambios recientes de printk. Algo hace una activaci\u00f3n de tarea y el programador establece el indicador NEED_RESCHED. cond_resched() lo ve establecido e invoca schedule() desde un contexto completamente falso. El programador habilita interrupciones despu\u00e9s del cambio de contexto, lo que causa la advertencia anterior al final. Algunas de las rutas de c\u00f3digo en syscore_suspend()/resume() pueden provocar la activaci\u00f3n de una activaci\u00f3n con exactamente las mismas consecuencias. Puede que no lo hayan hecho todav\u00eda, pero como comparten mucho c\u00f3digo con las operaciones normales, es solo cuesti\u00f3n de tiempo. El problema solo afecta a los modelos de programaci\u00f3n PREEMPT_NONE y PREEMPT_VOLUNTARY. La preempci\u00f3n completa no se ve afectada, ya que cond_resched() est\u00e1 deshabilitado y la comprobaci\u00f3n de preempci\u00f3n preemptible() tiene en cuenta la bandera de interrupci\u00f3n deshabilitada. Solucione el problema a\u00f1adiendo una comprobaci\u00f3n correspondiente a cond_resched()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58091.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58091.json index 30965dd0ef4..8fed84b9445 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58091.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/fbdev-dma: Add shadow buffering for deferred I/O\n\nDMA areas are not necessarily backed by struct page, so we cannot\nrely on it for deferred I/O. Allocate a shadow buffer for drivers\nthat require deferred I/O and use it as framebuffer memory.\n\nFixes driver errors about being \"Unable to handle kernel NULL pointer\ndereference at virtual address\" or \"Unable to handle kernel paging\nrequest at virtual address\".\n\nThe patch splits drm_fbdev_dma_driver_fbdev_probe() in an initial\nallocation, which creates the DMA-backed buffer object, and a tail\nthat sets up the fbdev data structures. There is a tail function for\ndirect memory mappings and a tail function for deferred I/O with\nthe shadow buffer.\n\nIt is no longer possible to use deferred I/O without shadow buffer.\nIt can be re-added if there exists a reliably test for usable struct\npage in the allocated DMA-backed buffer object." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/fbdev-dma: Se ha a\u00f1adido un b\u00fafer de sombra para E/S diferida. Las \u00e1reas de DMA no est\u00e1n necesariamente respaldadas por struct page, por lo que no podemos confiar en \u00e9l para la E/S diferida. Se asigna un b\u00fafer de sombra a los controladores que requieren E/S diferida y se utiliza como memoria de framebuffer. Se corrigen los errores del controlador \"No se puede gestionar la desreferencia de puntero nulo del kernel en la direcci\u00f3n virtual\" o \"No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual\". El parche divide drm_fbdev_dma_driver_fbdev_probe() en una asignaci\u00f3n inicial, que crea el objeto de b\u00fafer respaldado por DMA, y una cola, que configura las estructuras de datos fbdev. Hay una funci\u00f3n de cola para asignaciones directas de memoria y otra para E/S diferida con el b\u00fafer de sombra. Ya no es posible utilizar la E/S diferida sin el b\u00fafer de sombra. Se puede volver a agregar si existe una prueba confiable de una p\u00e1gina de estructura utilizable en el objeto de b\u00fafer respaldado por DMA asignado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6254.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6254.json index 3aeff9c9ae6..b93f0264481 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6254.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6254.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json index f1981fe35f0..00696e3729f 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json index b946ab187a3..6717a42b8e9 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json index af6d4ee7a02..f7b2c295c66 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6346.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6416.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6416.json index cc686800fa9..d4a1dd01bc4 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6416.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6416", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-30T22:15:02.113", - "lastModified": "2024-11-21T09:49:36.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:02:56.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://fushuling.com/index.php/2024/06/24/test4/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.270007", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270007", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.363407", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://fushuling.com/index.php/2024/06/24/test4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.270007", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270007", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.363407", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6470.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6470.json index 7e0fdf90de3..529ac8db98b 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6470.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6470", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-03T13:15:03.703", - "lastModified": "2024-11-21T09:49:42.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:09:09.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -120,30 +140,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:playsms:playsms:1.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "628D1561-3070-4A23-BD7E-131784A67D59" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.270278", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270278", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.363733", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?ctiid.270278", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270278", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.363733", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6497.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6497.json index 9cedc13940f..781ab0d5458 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6497.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6497", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-20T09:15:10.530", - "lastModified": "2024-11-21T09:49:45.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-05T00:23:47.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,44 +69,100 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "12.3.20", + "matchCriteriaId": "D48D6808-E4DF-450E-B9C6-22813C6914F5" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Api.php#L267", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3121853/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/squirrly-seo/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb3aa613-8f34-4d96-8ddf-41fcdcf65c59?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://nowotarski.info/wordpress-nonce-authorization/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Api.php#L267", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3121853/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/squirrly-seo/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb3aa613-8f34-4d96-8ddf-41fcdcf65c59?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6522.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6522.json index f4abc12fc56..ee5f7a92c51 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6522.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6522.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json index 213f01c3518..ce8a5070e05 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6709.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6709.json index bdb37592a3d..998b9ba9f8f 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6709.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6709.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6869.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6869.json index 1ed426c5264..5b5a3f8ec29 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6869.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6869.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6872.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6872.json index ba06111bc0b..5ba60abd8c2 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6872.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6872.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6987.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6987.json index 49aeae0c9f1..b73f0c77b4c 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6987.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6987.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json index 931987e78e9..4947b4b91d0 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7302.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7355.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7355.json index 58c8c8b5458..238682c1f67 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7355.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7355.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json index 78dc2f69165..aab34c10d5e 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use of a custom password encoding algorithm\u00a0in Streamsoft Presti\u017c software allows straightforward decoding of passwords using their encoded forms, which are stored in the application's database. One has to know the encoding algorithm, but it can be deduced by observing how password are transformed.\u00a0\nThis issue was fixed in 18.2.377 version of the software." + }, + { + "lang": "es", + "value": "El uso de un algoritmo de codificaci\u00f3n de contrase\u00f1as personalizado en el software Streamsoft Presti? permite decodificar f\u00e1cilmente las contrase\u00f1as mediante sus formas codificadas, almacenadas en la base de datos de la aplicaci\u00f3n. Es necesario conocer el algoritmo de codificaci\u00f3n, pero se puede deducir observando c\u00f3mo se transforman las contrase\u00f1as. Este problema se solucion\u00f3 en la versi\u00f3n 18.2.377 del software." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json index 35a98d61d9c..0da0e78c4cd 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7492.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7492.json index e04ea8c04f7..45b2e3ebca3 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7492.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7492.json @@ -52,7 +52,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json index b6e9a647965..892bd4d600d 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json index 46c9752e898..a077bc74692 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T11:15:13.233", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json index 7aa18771c98..13c471c8e83 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json index b577293384b..cb1f3294715 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-02-12T21:15:16.290", "lastModified": "2025-02-20T03:15:12.317", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0115.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0115.json index d788fc7a988..6a09bb11e3e 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0115.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0115.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad en el software PAN-OS de Palo Alto Networks permite que un administrador autenticado en la CLI de PAN-OS lea archivos arbitrarios. Este problema no afecta a Cloud NGFW ni a Prisma Access." + "value": "Una vulnerabilidad en el software PAN-OS de Palo Alto Networks permite que un administrador autenticado en la CLI de PAN-OS lea archivos arbitrarios. El atacante debe tener acceso de red a la interfaz de administraci\u00f3n (web, SSH, consola o Telnet) y autenticarse correctamente para explotar este problema. Puede reducir considerablemente el riesgo de este problema restringiendo el acceso a la interfaz de administraci\u00f3n \u00fanicamente a usuarios de confianza y direcciones IP internas, seg\u00fan nuestras directrices de implementaci\u00f3n cr\u00edtica recomendadas (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Este problema no afecta a Cloud NGFW ni a Prisma Access." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json index 9753fd063fb..efed167323d 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T16:15:39.887", "lastModified": "2025-01-07T16:15:39.887", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json index 2e9d58f199f..4a6f1500a8e 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0349.json @@ -131,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0415.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0415.json index e5351056230..490c8ddc503 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0415.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0415.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A remote attacker with web administrator privileges can exploit the device\u2019s web interface to execute arbitrary system commands through the NTP settings. Successful exploitation may result in the device entering an infinite reboot loop, leading to a total or partial denial of connectivity for downstream systems that rely on its network services." + }, + { + "lang": "es", + "value": "Un atacante remoto con privilegios de administrador web puede explotar la interfaz web del dispositivo para ejecutar comandos arbitrarios del sistema a trav\u00e9s de la configuraci\u00f3n NTP. Una explotaci\u00f3n exitosa puede provocar que el dispositivo entre en un bucle de reinicio infinito, lo que resulta en la denegaci\u00f3n total o parcial de la conectividad para los sistemas posteriores que dependen de sus servicios de red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0416.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0416.json index 63438d5823b..9099594f9ed 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0416.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0416.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Local privilege escalation through insecure DCOM configuration in Valmet DNA versions prior to C2023.\u00a0The DCOM object Valmet DNA Engineering has permissions that allow it to run commands as a user with the SeImpersonatePrivilege privilege. The SeImpersonatePrivilege privilege is a Windows permission that allows a process to impersonate another user. An attacker can use this vulnerability to escalate their privileges and take complete control of the system." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales mediante una configuraci\u00f3n DCOM insegura en versiones de Valmet DNA anteriores a C2023. El objeto DCOM Valmet DNA Engineering tiene permisos que le permiten ejecutar comandos como un usuario con el privilegio SeImpersonatePrivilege. Este privilegio es un permiso de Windows que permite a un proceso suplantar la identidad de otro usuario. Un atacante puede aprovechar esta vulnerabilidad para escalar sus privilegios y tomar el control total del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0417.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0417.json index dfaccfe969d..64f4ba579b6 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0417.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0417.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Lack of protection against brute force attacks in Valmet DNA visualization in DNA Operate.\u00a0The possibility to make an arbitrary number of login attempts without any rate limit gives an attacker an increased chance of guessing passwords and then performing switching operations." + }, + { + "lang": "es", + "value": "Falta de protecci\u00f3n contra ataques de fuerza bruta en la visualizaci\u00f3n de DNA de Valmet en DNA Operate. La posibilidad de realizar un n\u00famero arbitrario de intentos de inicio de sesi\u00f3n sin l\u00edmite de velocidad aumenta la probabilidad de que un atacante adivine contrase\u00f1as y realice operaciones de cambio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0418.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0418.json index d05f8ef7d9e..11ac840526e 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0418.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0418.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Valmet DNA user passwords in plain text.\u00a0This practice poses a security risk as attackers who gain access to local project data can read the passwords." + }, + { + "lang": "es", + "value": "Contrase\u00f1as de usuario de Valmet DNA en texto plano. Esta pr\u00e1ctica supone un riesgo de seguridad, ya que los atacantes que accedan a los datos locales del proyecto pueden leer las contrase\u00f1as." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json index bf7aa877ff6..ed48506a432 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:06.973", "lastModified": "2025-01-16T13:15:06.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json index 9df01519337..dcfc4af4717 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:07.353", "lastModified": "2025-01-16T13:15:07.353", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json index 2af54bccb2d..3ba4a584381 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:07.540", "lastModified": "2025-01-16T13:15:07.540", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json index c3fd74484c4..af7fe49504c 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T18:15:31.237", "lastModified": "2025-01-21T16:15:14.560", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json index c8b67a8d455..4af8b561f73 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T19:15:28.990", "lastModified": "2025-01-21T17:15:16.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0676.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0676.json index 5357890fa3a..35f07a71b7d 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0676.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad implica la inyecci\u00f3n de comandos en tcpdump dentro de los productos Moxa, lo que permite a un atacante autenticado con acceso a la consola explotar una validaci\u00f3n de entrada incorrecta para inyectar y ejecutar comandos del sistema. Una explotaci\u00f3n exitosa podr\u00eda resultar en una escalada de privilegios, lo que permite al atacante obtener acceso root y mantener el control persistente del dispositivo, lo que podr\u00eda interrumpir los servicios de red y afectar la disponibilidad de los sistemas dependientes que dependen de su conectividad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0807.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0807.json index 2040f0e8e24..966f76d77bf 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0807.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0807.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.260", "lastModified": "2025-03-22T07:15:24.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CITS Support svg, webp Media and TTF,OTF File Upload, Use Custom Fonts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2. This is due to missing or incorrect nonce validation on the cits_settings_tab() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento CITS Support svg, webp Media and TTF,OTF File Upload, Use Custom Fonts de WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.2 incluida. Esto se debe a la falta o a una validaci\u00f3n de nonce incorrecta en la funci\u00f3n cits_settings_tab(). Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n del plugin mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0838.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0838.json index c151123ca0e..c2c7c63d826 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0838.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0838.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0838", "sourceIdentifier": "cve-coordination@google.com", "published": "2025-02-21T15:15:11.890", - "lastModified": "2025-02-21T15:15:11.890", + "lastModified": "2025-04-05T16:15:33.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -77,6 +77,10 @@ { "url": "https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1", "source": "cve-coordination@google.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json index 1b20cbd2cbe..316a9b6b022 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T21:15:14.650", "lastModified": "2025-01-30T22:15:09.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json index a01c475cbb4..92308f9b6ef 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration." + }, + { + "lang": "es", + "value": "IBM PowerVM Hypervisor FW1050.00 a FW1050.30 y FW1060.00 a FW1060.20 podr\u00edan permitir que un usuario local, bajo ciertas configuraciones del modo de compatibilidad del procesador Linux, cause p\u00e9rdida de datos no detectados o errores al realizar la compresi\u00f3n gzip utilizando aceleraci\u00f3n de hardware." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json index 0051cc9540f..1728ff832f1 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029." + }, + { + "lang": "es", + "value": "IBM Personal Communications v14 y v15 incluyen un servicio de Windows vulnerable a la escalada de privilegios locales (LPE). Esta vulnerabilidad permite a cualquier usuario conectado interactivamente en el equipo objetivo ejecutar comandos con privilegios completos en el contexto de NT AUTHORITY\\SYSTEM. Esto permite que un atacante con pocos privilegios escale sus privilegios. Esta vulnerabilidad se debe a una correcci\u00f3n incompleta para CVE-2024-25029." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json index e0e1d8207e0..6446b4cf523 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1217.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2025-03-29T06:15:36.557", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1219.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1219.json index c04cf6ed018..23da2bda6d3 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1219.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1219.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2025-03-30T06:15:13.570", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1267.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1267.json index ef188fc64c2..276fce006c3 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1267.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1267.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Groundhogg plugin for Wordpress is vulnerable to Stored Cross-Site Scripting via the \u2018label' parameter in versions up to, and including, 3.7.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Groundhogg para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s del par\u00e1metro \"label\" en versiones hasta la 3.7.4.1 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de administrador, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio y a instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json index 81d3850a958..2f51b20e7c7 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T06:15:21.990", "lastModified": "2025-02-27T06:15:21.990", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1311.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1311.json index 85453a2b1ab..9bd702dcf4f 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1311.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.433", "lastModified": "2025-03-22T07:15:24.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Multivendor Marketplace \u2013 REST API plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in the update_delivery_status() function in all versions up to, and including, 1.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Multivendor Marketplace \u2013 API REST para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' de la funci\u00f3n update_delivery_status() en todas las versiones hasta la 1.6.2 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json index f7dbc4069ae..60be7d97cf2 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json @@ -58,95 +58,6 @@ "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } - }, - { - "source": "cna@vuldb.com", - "type": "Secondary", - "cvssData": { - "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "attackRequirements": "NONE", - "privilegesRequired": "HIGH", - "userInteraction": "PASSIVE", - "vulnConfidentialityImpact": "NONE", - "vulnIntegrityImpact": "LOW", - "vulnAvailabilityImpact": "NONE", - "subConfidentialityImpact": "NONE", - "subIntegrityImpact": "NONE", - "subAvailabilityImpact": "NONE", - "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirement": "NOT_DEFINED", - "integrityRequirement": "NOT_DEFINED", - "availabilityRequirement": "NOT_DEFINED", - "modifiedAttackVector": "NOT_DEFINED", - "modifiedAttackComplexity": "NOT_DEFINED", - "modifiedAttackRequirements": "NOT_DEFINED", - "modifiedPrivilegesRequired": "NOT_DEFINED", - "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnConfidentialityImpact": "NOT_DEFINED", - "modifiedVulnIntegrityImpact": "NOT_DEFINED", - "modifiedVulnAvailabilityImpact": "NOT_DEFINED", - "modifiedSubConfidentialityImpact": "NOT_DEFINED", - "modifiedSubIntegrityImpact": "NOT_DEFINED", - "modifiedSubAvailabilityImpact": "NOT_DEFINED", - "Safety": "NOT_DEFINED", - "Automatable": "NOT_DEFINED", - "Recovery": "NOT_DEFINED", - "valueDensity": "NOT_DEFINED", - "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED" - } - } - ], - "cvssMetricV31": [ - { - "source": "cna@vuldb.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 2.4, - "baseSeverity": "LOW", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 0.9, - "impactScore": 1.4 - } - ], - "cvssMetricV2": [ - { - "source": "cna@vuldb.com", - "type": "Secondary", - "cvssData": { - "version": "2.0", - "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", - "baseScore": 3.3, - "accessVector": "NETWORK", - "accessComplexity": "LOW", - "authentication": "MULTIPLE", - "confidentialityImpact": "NONE", - "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE" - }, - "baseSeverity": "LOW", - "exploitabilityScore": 6.4, - "impactScore": 2.9, - "acInsufInfo": false, - "obtainAllPrivilege": false, - "obtainUserPrivilege": false, - "obtainOtherPrivilege": false, - "userInteractionRequired": false } ] }, @@ -160,20 +71,6 @@ "value": "CWE-79" } ] - }, - { - "source": "cna@vuldb.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - }, - { - "lang": "en", - "value": "CWE-94" - } - ] } ], "references": [ @@ -196,22 +93,6 @@ { "url": "https://www.asus.com/supportonly/rt-n12e/helpdesk_bios/", "source": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1" - }, - { - "url": "https://vuldb.com/?ctiid.295962", - "source": "cna@vuldb.com" - }, - { - "url": "https://vuldb.com/?id.295962", - "source": "cna@vuldb.com" - }, - { - "url": "https://vuldb.com/?submit.496013", - "source": "cna@vuldb.com" - }, - { - "url": "https://www.asus.com/", - "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json index 4a493f664d8..dbeed350f38 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@openanolis.org", "published": "2025-02-18T03:15:10.447", "lastModified": "2025-02-18T03:15:10.447", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1449.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1449.json index 5cbc9b87dc9..0d5e45596bc 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1449.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1449.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en Rockwell Automation Verve Asset Manager debido a una depuraci\u00f3n insuficiente de variables. Una parte de la interfaz web administrativa de la funci\u00f3n Inventario de Dispositivos sin Agente (ADI) heredada de Verve (obsoleta desde la versi\u00f3n 1.36) permite a los usuarios modificar una variable con una depuraci\u00f3n insuficiente. De ser explotada, podr\u00eda permitir que un atacante con acceso administrativo ejecute comandos arbitrarios en el contexto del contenedor que ejecuta el servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json index 2f1135fea5f..11e375c315f 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json index a3d7aef8969..75517f2f291 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1512.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1512.json index bff1e4c9bd3..233d5784039 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1512.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1512.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The PowerPack Elementor Addons (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Cursor Extension in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento PowerPack Elementor Addons (Free Widgets, Extensions and Templates) para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de la extensi\u00f3n de cursor personalizado en todas las versiones hasta la 2.9.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json index 38bfc11c039..c72b948499b 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWFX complemento con fines maliciosos, al analizarse mediante Autodesk Navisworks, puede forzar una vulnerabilidad de lectura fuera de los l\u00edmites. Un agente malicioso puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json index 1384f59fed7..cb941febac5 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWFX manipulado con fines maliciosos, al analizarse mediante Autodesk Navisworks, puede forzar una vulnerabilidad de lectura fuera de los l\u00edmites. Un agente malicioso puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json index ae58dd89414..16c07f26576 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo DWFX manipulado con fines maliciosos, al analizarse mediante Autodesk Navisworks, puede generar una vulnerabilidad de corrupci\u00f3n de memoria. Un agente malicioso puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1673.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1673.json index 94932a17d58..814b2be5fcc 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1673.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1673.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1674.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1674.json index 8c1609d7bd6..6d29e046817 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1674.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1674.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json index 06d594c3255..241c20b7c73 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1705.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1705.json index fef57710814..0e4c839108c 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1705.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1705.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation within the td_ajax_get_views AJAX action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento tagDiv Composer para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.3 incluida. Esto se debe a la falta o a una validaci\u00f3n incorrecta de nonce en la acci\u00f3n AJAX td_ajax_get_views. Esto permite que atacantes no autenticados inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json index 2af7052ae09..926f5660e74 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-28T06:15:32.770", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Event Tickets with Ticket Scanner WordPress plugin before 2.5.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento Event Tickets with Ticket Scanner de WordPress anterior a la versi\u00f3n 2.5.4 no tiene la comprobaci\u00f3n CSRF activada al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n la cambie mediante un ataque CSRF." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json index 289a839e39f..e226b2277aa 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a XXE in W3CSS Validator versions before\u00a0cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF).\u00a0 This could be exploited to read arbitrary local files if an attacker has access to exception messages." + }, + { + "lang": "es", + "value": "Existe una excepci\u00f3n XXE en las versiones del Validador W3CSS anteriores a cssval-20250226 que permite a un atacante usar objetos XML especialmente manipulados para forzar server-side request forgery (SSRF). Esto podr\u00eda aprovecharse para leer archivos locales arbitrarios si un atacante tiene acceso a los mensajes de excepci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json index 4cab54b4f7b..4e21354f2e4 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json @@ -96,7 +96,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json index 89c4c5ed112..fe11423dd2e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429." + }, + { + "lang": "es", + "value": "La vulnerabilidad de expiraci\u00f3n de sesi\u00f3n insuficiente en Progress Software Corporation Sitefinity en algunas circunstancias espec\u00edficas y poco comunes permite reutilizar los ID de sesi\u00f3n (ataques de reproducci\u00f3n de sesi\u00f3n). Este problema afecta a Sitefinity: desde la versi\u00f3n 14.0 hasta la 14.3, desde la versi\u00f3n 14.4 hasta la 14.4.8145, desde la versi\u00f3n 15.0 hasta la 15.0.8231, desde la versi\u00f3n 15.1 hasta la 15.1.8332, desde la versi\u00f3n 15.2 hasta la 15.2.8429." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1970.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1970.json index 19e208cbe48..905239564ae 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1970.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1970.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:25.797", "lastModified": "2025-03-22T12:15:25.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export and Import Users and Customers plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.6.2 via the validate_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Export and Import Users and Customers para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.6.2 incluida, mediante la funci\u00f3n validate_file(). Esto permite a atacantes autenticados, con acceso de administrador o superior, realizar solicitudes web a ubicaciones arbitrarias desde la aplicaci\u00f3n web y utilizarlas para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1971.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1971.json index 7c41232a91e..d714e77ac3b 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1971.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1971.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:26.250", "lastModified": "2025-03-22T12:15:26.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export and Import Users and Customers plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento Export and Import Users and Customers para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 2.6.2 incluida, mediante la deserializaci\u00f3n de entradas no confiables del par\u00e1metro 'form_data'. Esto permite a atacantes autenticados, con acceso de administrador o superior, inyectar un objeto PHP. No se conoce ninguna cadena POP presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si una cadena POP est\u00e1 presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema objetivo, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo, dependiendo de la cadena POP presente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1972.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1972.json index 10f01edb17a..108685366e1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1972.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1972.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:26.453", "lastModified": "2025-03-22T12:15:26.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server." + }, + { + "lang": "es", + "value": "El complemento Export and Import Users and Customers para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n admin_log_page() en todas las versiones hasta la 2.6.2 incluida. Esto permite que atacantes autenticados, con acceso de administrador o superior, eliminen archivos de registro arbitrarios en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1973.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1973.json index c08dfdb6864..38a277e4f5e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1973.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1973.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:26.653", "lastModified": "2025-03-22T12:15:26.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Export and Import Users and Customers plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.6.2 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Export and Import Users and Customers para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 2.6.2 incluida, a trav\u00e9s de la funci\u00f3n download_file(). Esto permite a atacantes autenticados, con acceso de administrador o superior, leer el contenido de archivos de registro arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1986.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1986.json index d2ab6fbc94d..3acb5449a95 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1986.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Gutentor WordPress plugin before 3.4.7 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento Gutentor de WordPress anterior a la versi\u00f3n 3.4.7 no depura ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que permite a los administradores realizar ataques de inyecci\u00f3n SQL." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1997.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1997.json index 9f8f956a494..65b90c1a277 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1997.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1997.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.0 / IBM DevOps Deploy 8.0 through 8.0.1.4 and 8.1 through 8.1 could allow unauthorized access to other services or potential exposure of sensitive data due to missing authentication in its Agent Relay service." + }, + { + "lang": "es", + "value": "IBM UrbanCode Deploy (UCD) 7.0 a 7.0.5.25, 7.1 a 7.1.2.21, 7.2 a 7.2.3.14 y 7.3 a 7.3.2.0 / IBM DevOps Deploy 8.0 a 8.0.1.4 y 8.1 a 8.1 podr\u00edan permitir el acceso no autorizado a otros servicios o la posible exposici\u00f3n de datos confidenciales debido a la falta de autenticaci\u00f3n en su servicio Agent Relay." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1998.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1998.json index 018c59b31cc..1e72952cb40 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1998.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1998.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM UrbanCode Deploy (UCD) through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.0 / IBM DevOps Deploy 8.0 through 8.0.1.4 and 8.1 through 8.1 \n\nstores potentially sensitive authentication token information in log files that could be read by a local user." + }, + { + "lang": "es", + "value": "IBM UrbanCode Deploy (UCD) versiones 7.1.2.21, 7.2 a 7.2.3.14 y 7.3 a 7.3.2.0 / IBM DevOps Deploy versiones 8.0 a 8.0.1.4 y 8.1 a 8.1 almacenan informaci\u00f3n de token de autenticaci\u00f3n potencialmente confidencial en archivos de registro que un usuario local podr\u00eda leer." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20227.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20227.json index 65226bc1e43..fc1737ac1f1 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20227.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20227.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En las versiones de Splunk Enterprise anteriores a 9.4.1, 9.3.3, 9.2.5 y 9.1.8, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 y 9.1.2308.214, un usuario con privilegios bajos que no tenga los roles de \"administrador\" o \"poder\" de Splunk podr\u00eda omitir el cuadro de di\u00e1logo modal de advertencia de contenido externo en los paneles de Dashboard Studio, lo que podr\u00eda provocar una divulgaci\u00f3n de informaci\u00f3n." + "value": "En las versiones de Splunk Enterprise anteriores a 9.4.1, 9.3.3, 9.2.5 y 9.1.8, y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 y 9.1.2308.214, un usuario con pocos privilegios que no tenga los roles de \"admin\" o \"power\" de Splunk podr\u00eda omitir el cuadro de di\u00e1logo modal de advertencia de contenido externo en los paneles de Dashboard Studio, lo que podr\u00eda provocar una divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20661.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20661.json index 46af0712b58..ac5445857ba 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20661.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20661.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mediatek.com", "published": "2025-04-07T04:15:20.057", "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20662.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20662.json index b52d9070d92..8f3aaf38900 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20662.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20662.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mediatek.com", "published": "2025-04-07T04:15:20.187", "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2005.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2005.json index 9585e2ea5dc..38eda8c78bf 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2005.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Front End Users para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en el campo de carga de archivos del formulario de registro en todas las versiones hasta la 3.2.32 incluida. Esto permite que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda posibilitar la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2007.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2007.json index 0b96e18eb37..c5a91d41a02 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2007.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Import Export Suite for CSV and XML Datafeed plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteImage() function in all versions up to, and including, 7.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Import Export Suite para CSV y XML Datafeed de WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n deleteImage() en todas las versiones hasta la 7.19 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo al eliminar el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2008.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2008.json index 5e1be15465e..3545f43e6f7 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2008.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Import Export Suite for CSV and XML Datafeed plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import_single_post_as_csv() function in all versions up to, and including, 7.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Import Export Suite para CSV y XML Datafeed de WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n import_single_post_as_csv() en todas las versiones hasta la 7.19 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda posibilitar la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2027.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2027.json index 2ad173c4132..593c89d80ac 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2027.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A double free vulnerability has been identified in the ASUS System Analysis service. This vulnerability can be triggered by sending specially crafted local RPC requests, leading to the service crash and potentially memory manipulation in some rare circumstances.\nRefer to the 'Security Update for MyASUS' section on the ASUS Security Advisory for more information." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de doble liberaci\u00f3n en ASUS System Analysis service. Esta vulnerabilidad puede activarse mediante el env\u00edo de solicitudes RPC locales especialmente manipuladas, lo que provoca el bloqueo del servicio y, en raras ocasiones, la manipulaci\u00f3n de la memoria. Consulte la secci\u00f3n \"Actualizaci\u00f3n de seguridad para MyASUS\" en el Aviso de seguridad de ASUS para obtener m\u00e1s informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2048.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2048.json index 05784061660..18dfc05ebe1 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2048.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2048.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Lana Downloads Manager WordPress plugin before 1.10.0 does not validate user input used in a path, which could allow users with an admin role to perform path traversal attacks and download arbitrary files on the server" + }, + { + "lang": "es", + "value": "El complemento Lana Downloads Manager de WordPress anterior a la versi\u00f3n 1.10.0 no valida la entrada del usuario utilizada en una ruta, lo que podr\u00eda permitir a los usuarios con un rol de administrador realizar ataques de Path Traversal y descargar archivos arbitrarios en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2071.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2071.json index 6b53dc00375..3b0883f03ec 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2071.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2071.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are \"hd\" and \"pi\"." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad cr\u00edtica de inyecci\u00f3n de comandos del sistema operativo en la interfaz web de FAST LTA Silent Brick, que permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo mediante una entrada especialmente manipulada. Esta vulnerabilidad surge debido a la gesti\u00f3n inadecuada de entradas no confiables, que se pasan directamente a comandos del sistema sin la debida limpieza ni validaci\u00f3n. Una explotaci\u00f3n exitosa podr\u00eda permitir a los atacantes ejecutar comandos arbitrarios en el sistema afectado, lo que podr\u00eda resultar en acceso no autorizado, fuga de datos o la vulneraci\u00f3n total del sistema. Los par\u00e1metros de la interfaz web afectados son \"hd\" y \"pi\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2072.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2072.json index 16258025f90..2a250387315 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2072.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2072.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in FAST LTA Silent Brick WebUI, allowing attackers to inject malicious JavaScript code into web pages viewed by users. This issue arises when user-supplied input is improperly handled and reflected directly in the output of a web page without proper sanitization or encoding. Exploiting this vulnerability, an attacker can execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, and other malicious actions. Affected WebUI parameters are \"h\", \"hd\", \"p\", \"pi\", \"s\", \"t\", \"x\", \"y\"." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de cross-site scripting (XSS) reflejado en la interfaz web de FAST LTA Silent Brick, que permite a los atacantes inyectar c\u00f3digo JavaScript malicioso en las p\u00e1ginas web que visitan los usuarios. Este problema surge cuando la informaci\u00f3n proporcionada por el usuario se gestiona incorrectamente y se refleja directamente en la salida de una p\u00e1gina web sin la debida codificaci\u00f3n ni limpieza. Al explotar esta vulnerabilidad, un atacante puede ejecutar JavaScript arbitrario en el navegador de la v\u00edctima, lo que podr\u00eda provocar secuestro de sesi\u00f3n, robo de datos y otras acciones maliciosas. Los par\u00e1metros de la interfaz web afectados son \"h\", \"hd\", \"p\", \"pi\", \"s\", \"t\", \"x\" e \"y\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2074.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2074.json index 392000e6a2e..7c1bd567077 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2074.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Advanced Google reCAPTCHA plugin for WordPress is vulnerable to generic SQL Injection via the \u2018sSearch\u2019 parameter in all versions up to, and including, 1.29 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries, particularly when the plugin\u2019s settings page hasn\u2019t been visited and its welcome message has not been dismissed. This issue can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Advanced Google reCAPTCHA para WordPress es vulnerable a la inyecci\u00f3n SQL gen\u00e9rica a trav\u00e9s del par\u00e1metro 'sSearch' en todas las versiones hasta la 1.29 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, a\u00f1adir consultas SQL adicionales a las consultas ya existentes, especialmente cuando no se ha visitado la p\u00e1gina de configuraci\u00f3n del complemento ni se ha descartado su mensaje de bienvenida. Este problema puede utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json index 3ba8c92dac1..1c189141a2a 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T17:16:18.423", "lastModified": "2025-03-11T17:16:18.423", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json index f7294725ede..265d63cab17 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T21:15:42.150", "lastModified": "2025-03-11T21:15:42.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json index ca7ff3f6a37..a6da1c5d9f8 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json index 5a36f027f0a..8b15f85ce86 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.650", "lastModified": "2025-02-05T19:12:24.030", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json index 159cd7cdba3..f4547613e6a 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json index 79c27849cea..698cdf7c2e6 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json index 3240b6cec0e..797f47aeedb 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json index 545817f0d5f..64100fe70f3 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json index d61c0a6b79c..e0215ebbff5 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json index 10caefa4e99..766518fd441 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json index e1712791206..6b018bf2de4 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21384.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "An authenticated attacker can exploit an Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges over a network." + }, + { + "lang": "es", + "value": "Un atacante autenticado puede explotar una vulnerabilidad de Server-Side Request Forgery (SSRF) en Microsoft Azure Health Bot para elevar privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21421.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21421.json index cb9e62f6d04..f7e8caa6268 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21421.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21421.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing escape code in API." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar el c\u00f3digo de escape en la API." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21423.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21423.json index 5cbfe8e2312..6e780c4b7a6 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21423.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21423.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption occurs when handling client calls to EnableTestMode through an Escape call." + }, + { + "lang": "es", + "value": "Se produce corrupci\u00f3n de memoria al gestionar llamadas de cliente a EnableTestMode a trav\u00e9s de una llamada Escape." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21425.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21425.json index d82b7ca9833..690ac293fa3 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21425.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption may occur due top improper access control in HAB process." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de memoria puede ocurrir debido a un control de acceso inadecuado en el proceso HAB." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21428.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21428.json index 21c7c43e80d..0d1cc46946f 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21428.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21428.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session." + }, + { + "lang": "es", + "value": "Se produce una corrupci\u00f3n de memoria al conectar una STA a un AP y al iniciar una solicitud ADD TS desde el AP para establecer una sesi\u00f3n TSpec." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21429.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21429.json index 55006a9b5d8..05fb57baa77 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21429.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21429.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request." + }, + { + "lang": "es", + "value": "Se produce una corrupci\u00f3n de memoria al conectar una STA a un AP y al iniciar una solicitud ADD TS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21430.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21430.json index 46e919e956e..e8aa04c5a52 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21430.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21430.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Transient DOS while connecting STA to AP and initiating ADD TS request from AP to establish TSpec session." + }, + { + "lang": "es", + "value": "DOS transitorio al conectar STA a AP e iniciar solicitud ADD TS desde AP para establecer sesi\u00f3n TSpec." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21431.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21431.json index b77a4306042..a28a490c412 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21431.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21431.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Information disclosure may be there when a guest VM is connected." + }, + { + "lang": "es", + "value": "Puede haber divulgaci\u00f3n de informaci\u00f3n cuando se conecta una m\u00e1quina virtual invitada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21434.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21434.json index a1234bf0438..c462b7f273f 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21434.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21434.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Transient DOS may occur while parsing EHT operation IE or EHT capability IE." + }, + { + "lang": "es", + "value": "Puede ocurrir una DOS transitoria al analizar el IE de operaci\u00f3n EHT o el IE de capacidad EHT." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21435.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21435.json index 853242e3383..3d18f4dddbf 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21435.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21435.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Transient DOS may occur while parsing extended IE in beacon." + }, + { + "lang": "es", + "value": "Puede ocurrir un DOS transitorio mientras se analiza IE extendido en Beacon." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21436.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21436.json index 50df46d88a5..19e0a023149 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21436.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21436.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption may occur while initiating two IOCTL calls simultaneously to create processes from two different threads." + }, + { + "lang": "es", + "value": "Puede producirse una corrupci\u00f3n de memoria al iniciar dos llamadas IOCTL simult\u00e1neamente para crear procesos desde dos subprocesos diferentes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21437.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21437.json index 01973273c49..07869af1d73 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21437.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21437.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing memory map or unmap IOCTL operations simultaneously." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar operaciones IOCTL de mapeo o desasignamiento de memoria simult\u00e1neamente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21438.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21438.json index 9aeacfffd6d..75c0ca0b626 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21438.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21438.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while IOCTL call is invoked from user-space to read board data." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria mientras se invoca la llamada IOCTL desde el espacio del usuario para leer datos de la placa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21439.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21439.json index ab05c56ecec..645d5db5971 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21439.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21439.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption may occur while reading board data via IOCTL call when the WLAN driver copies the content to the provided output buffer." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n en la memoria al leer datos de la placa a trav\u00e9s de la llamada IOCTL cuando el controlador WLAN copia el contenido al b\u00fafer de salida provisto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21440.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21440.json index 7283201a1a1..31216bb337f 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21440.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando se invoca la llamada IOCTL desde el espacio del usuario para escribir datos de la placa en el controlador WLAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21441.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21441.json index 08843765b6e..fd2051759d8 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21441.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21441.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando se invoca la llamada IOCTL desde el espacio del usuario para escribir datos de la placa en el controlador WLAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21442.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21442.json index 02bfe1ad597..6f7861a6ce0 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21442.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21442.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while transmitting packet mapping information with invalid header payload size." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al transmitir informaci\u00f3n de mapeo de paquetes con un tama\u00f1o de payload de encabezado no v\u00e1lido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21443.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21443.json index 11dbea2e2db..f6ec613b843 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21443.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption while processing message content in eAVB." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar el contenido del mensaje en eAVB." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21447.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21447.json index 57e75ba4380..6f9c89483bc 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21447.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21447.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory corruption may occur while processing device IO control call for session control." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n de memoria mientras se procesa la llamada de control de E/S del dispositivo para el control de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21448.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21448.json index 7dc24adb543..7f9baeb5530 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21448.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21448.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Transient DOS may occur while parsing SSID in action frames." + }, + { + "lang": "es", + "value": "Puede ocurrir un DOS transitorio al analizar el SSID en frames de acci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21507.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21507.json index 7b10c1de583..3acdaaa02be 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21507.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21507.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21508.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21508.json index 380248f321c..bd69f88311d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21508.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21508.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json index d3421417c28..9190b5d574b 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json index c0b0d830842..04688b6f24e 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21511.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21511.json index 17824d8623b..857d699c228 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21511.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21511.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21512.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21512.json index 2a63db419c1..dec1e16c674 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21512.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21512.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21513.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21513.json index 5a1a7f4f553..0f6c659773d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21513.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21513.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json index 0fd707da97b..28609f12399 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21514.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json index c28e8fafb3f..74a8e1d3aad 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21515.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21517.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21517.json index 3e9613c013e..6b2782930eb 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21517.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21517.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json index 1e25e428c9d..8ecda312471 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21524.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json index b734343f47b..7634908792f 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21527.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21538.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21538.json index 32b9a32300d..074f54fc8bd 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21538.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21538.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json index 28c4bfb3732..e692e4ff83a 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21613.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.043", "lastModified": "2025-01-06T17:15:47.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json index 59d386b707e..c89c97d016c 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-06T17:15:47.310", "lastModified": "2025-01-06T17:15:47.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json index 4b91da83b52..93a71aaa795 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21635.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21636.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21636.json index e72a5cf55b2..d204a1ba179 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21636.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21636.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21637.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21637.json index 721fcabf49a..76141006e8d 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21637.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21637.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21639.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21639.json index 13e9702497c..0ee6219f778 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21639.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21639.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json index c4d054cb27b..204b6ac3676 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21641.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json index 2494186fff0..2bed8512eec 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21642.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json index 947ede74053..c155147b4d7 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21650.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json index 3473bd0618a..199dade9d8f 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21735.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21735.json index ea3a8fabbb7..c8d43c3583b 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21735.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21735.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21736.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21736.json index d7575627845..a97974bed23 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21736.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21736.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21737.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21737.json index fcd5ad0dd32..31c4c2d0ff4 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21737.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21737.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21741.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21741.json index 0fdc39022f1..3f75e90bcf2 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21741.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21741.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21742.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21742.json index ea8db561dbd..7db7e2d2841 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21742.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21742.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21743.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21743.json index a8e6c4749d8..1087b1d00c9 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21743.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21743.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21744.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21744.json index 34338605416..2069b911989 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21744.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21744.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21745.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21745.json index 7170ccb55cb..329ef7df46d 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21745.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21745.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21748.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21748.json index fdbc39edee2..d85687b9d43 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21748.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21748.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json index ad544c075ac..04f1cf9928c 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21769.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21769.json index cd185818c22..3c0daf415e9 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21769.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21769.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21770.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21770.json index 379949ddaf0..bdfe11edd44 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21770.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21770.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21773.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21773.json index 1768b9204f6..d9ef86b1d3e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21773.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21773.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21774.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21774.json index 4e4ba7cc18b..3a2d26a28ca 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21774.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21774.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21775.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21775.json index 4882d873f7c..382e7fa1b44 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21775.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21775.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21776.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21776.json index 7140ee3a6b3..cc5e9f3dda0 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21776.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21776.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json index b1237813490..46abb7c3819 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -105,40 +105,40 @@ "url": "https://git.kernel.org/stable/c/1abb2648698bf10783d2236a6b4a7ca5e8021699", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/231075c5a8ea54f34b7c4794687baa980814e6de", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/2498d2db1d35e88a2060ea191ae75dce853dd084", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/3484ea33157bc7334f57e64826ec5a4bf992151a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/e43a8b9c4d700ffec819c5043a48769b3e7d9cab", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json index 44e400380d6..dec16eb37a8 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json index 0d1aaada597..575f800bdcd 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -99,32 +99,32 @@ "url": "https://git.kernel.org/stable/c/189fb76215e479c10731baabb50f1a352d2078f5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/4d9b2b62e1136d10f661ec4c0c268140b6f74f4f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/7b4aebeecbbd5b5fe73e35fad3f62ed21aa7ef44", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/a7052afa9eae2239e25943baa8817a6a56e8aa68", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json index 7ec3f623025..0153825eff3 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json index 2e40e07470b..1ba81cdd319 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json index cb214328e20..28903098821 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -92,24 +92,24 @@ "url": "https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json index 33f663ba3e8..af84ac6e10f 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -99,32 +99,32 @@ "url": "https://git.kernel.org/stable/c/6287f1a8c16138c2ec750953e35039634018c84a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/964a8895704a22efc06a2a3276b624a5ae985a06", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/9f15a8df542c0f08732a67d1a14ee7c22948fb97", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/d6508ffff32b44b6d0de06704034e4eef1c307a7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json index 73f644816d1..8bff79b9a77 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -106,40 +106,40 @@ "url": "https://git.kernel.org/stable/c/3215f5aafc49aaa993991633833854694e73b439", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/5805402dcc56241987bca674a1b4da79a249bab7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/79aea5e55156c87dc570e43fcd8bba01b9d6ab3f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/a303649b99b64858d62ce7428125d8e71675d2b6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/e860f847787fbbf0d8dacd638c019c7c3d4a9bd3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json index fe6301d6be1..97b73aca620 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -141,40 +141,40 @@ "url": "https://git.kernel.org/stable/c/470bda72fda0fcf54300466d70ce2de62f7835d2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/90056ece99966182dc0e367f3fd2afab46ada847", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/94a0de224ed52eb2ecd4f4cb1b937b674c9fb955", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/b58f7ca86a7b8e480c06e30c5163c5d2f4e24023", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] }, { "url": "https://git.kernel.org/stable/c/bca0902e61731a75fc4860c8720168d9f1bae3b6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ - "Patch", - "Mailing List" + "Mailing List", + "Patch" ] } ] diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21793.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21793.json index ab0fed8b35c..c0d30166271 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21793.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21793.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21794.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21794.json index 9c448067e1d..e800a897c6c 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21794.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21794.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21798.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21798.json index 7504d15ac82..3d741529836 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21798.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21798.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21809.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21809.json index d343f1e7d3a..11dbfecc9e6 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21809.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21809.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21814.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21814.json index e571f0d27c8..834f0969f01 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21814.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21814.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21820.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21820.json index 6c7921dcad4..a9587a5c172 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21820.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21820.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21824.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21824.json index e5d6d4e043c..e875b1fa06a 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21824.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21824.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21868.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21868.json index 271da714337..7b8c7b3ed40 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21868.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: allow small head cache usage with large MAX_SKB_FRAGS values\n\nSabrina reported the following splat:\n\n WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_locked+0x8f2/0xba0\n Modules linked in:\n CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.14.0-rc1-net-00092-g011b03359038 #996\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\n RIP: 0010:netif_napi_add_weight_locked+0x8f2/0xba0\n Code: e8 c3 e6 6a fe 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc c7 44 24 10 ff ff ff ff e9 8f fb ff ff e8 9e e6 6a fe <0f> 0b e9 d3 fe ff ff e8 92 e6 6a fe 48 8b 04 24 be ff ff ff ff 48\n RSP: 0000:ffffc9000001fc60 EFLAGS: 00010293\n RAX: 0000000000000000 RBX: ffff88806ce48128 RCX: 1ffff11001664b9e\n RDX: ffff888008f00040 RSI: ffffffff8317ca42 RDI: ffff88800b325cb6\n RBP: ffff88800b325c40 R08: 0000000000000001 R09: ffffed100167502c\n R10: ffff88800b3a8163 R11: 0000000000000000 R12: ffff88800ac1c168\n R13: ffff88800ac1c168 R14: ffff88800ac1c168 R15: 0000000000000007\n FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffff888008201000 CR3: 0000000004c94001 CR4: 0000000000370ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n gro_cells_init+0x1ba/0x270\n xfrm_input_init+0x4b/0x2a0\n xfrm_init+0x38/0x50\n ip_rt_init+0x2d7/0x350\n ip_init+0xf/0x20\n inet_init+0x406/0x590\n do_one_initcall+0x9d/0x2e0\n do_initcalls+0x23b/0x280\n kernel_init_freeable+0x445/0x490\n kernel_init+0x20/0x1d0\n ret_from_fork+0x46/0x80\n ret_from_fork_asm+0x1a/0x30\n \n irq event stamp: 584330\n hardirqs last enabled at (584338): [] __up_console_sem+0x77/0xb0\n hardirqs last disabled at (584345): [] __up_console_sem+0x5c/0xb0\n softirqs last enabled at (583242): [] netlink_insert+0x14d/0x470\n softirqs last disabled at (583754): [] netif_napi_add_weight_locked+0x77d/0xba0\n\non kernel built with MAX_SKB_FRAGS=45, where SKB_WITH_OVERHEAD(1024)\nis smaller than GRO_MAX_HEAD.\n\nSuch built additionally contains the revert of the single page frag cache\nso that napi_get_frags() ends up using the page frag allocator, triggering\nthe splat.\n\nNote that the underlying issue is independent from the mentioned\nrevert; address it ensuring that the small head cache will fit either TCP\nand GRO allocation and updating napi_alloc_skb() and __netdev_alloc_skb()\nto select kmalloc() usage for any allocation fitting such cache." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: permite el uso de cach\u00e9 de cabeza peque\u00f1a con valores MAX_SKB_FRAGS grandes Sabrina inform\u00f3 el siguiente splat: ADVERTENCIA: CPU: 0 PID: 1 en net/core/dev.c:6935 netif_napi_add_weight_locked+0x8f2/0xba0 M\u00f3dulos vinculados: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 No contaminado 6.14.0-rc1-net-00092-g011b03359038 #996 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014 RIP: 0010:netif_napi_add_weight_locked+0x8f2/0xba0 C\u00f3digo: e8 c3 e6 6a fe 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc c7 44 24 10 ff ff ff ff e9 8f fb ff ff e8 9e e6 6a fe <0f> 0b e9 d3 fe ff ff e8 92 e6 6a fe 48 8b 04 24 be ff ff ff ff 48 RSP: 0000:ffffc9000001fc60 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff88806ce48128 RCX: 1ffff11001664b9e RDX: ffff888008f00040 RSI: ffffffff8317ca42 RDI: ffff88800b325cb6 RBP: ffff88800b325c40 R08: 0000000000000001 R09: ffffed100167502c R10: ffff88800b3a8163 R11: 0000000000000000 R12: ffff88800ac1c168 R13: ffff88800ac1c168 R14: ffff88800ac1c168 R15: 0000000000000007 FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888008201000 CR3: 0000000004c94001 CR4: 0000000000370ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: gro_cells_init+0x1ba/0x270 xfrm_input_init+0x4b/0x2a0 xfrm_init+0x38/0x50 ip_rt_init+0x2d7/0x350 ip_init+0xf/0x20 inet_init+0x406/0x590 do_one_initcall+0x9d/0x2e0 do_initcalls+0x23b/0x280 kernel_init_freeable+0x445/0x490 kernel_init+0x20/0x1d0 ret_from_fork+0x46/0x80 ret_from_fork_asm+0x1a/0x30 marca de evento de irq: 584330 hardirqs habilitados por \u00faltima vez en (584338): [] __up_console_sem+0x77/0xb0 hardirqs deshabilitados por \u00faltima vez en (584345): [] __up_console_sem+0x5c/0xb0 softirqs habilitados por \u00faltima vez en (583242): [] netlink_insert+0x14d/0x470 softirqs deshabilitados por \u00faltima vez en (583754): [] netif_napi_add_weight_locked+0x77d/0xba0 en el kernel creado con MAX_SKB_FRAGS=45, donde SKB_WITH_OVERHEAD(1024) es menor que GRO_MAX_HEAD. Esta compilaci\u00f3n tambi\u00e9n incluye la reversi\u00f3n de la cach\u00e9 de fragmentos de p\u00e1gina \u00fanica, de modo que napi_get_frags() termine usando el asignador de fragmentos de p\u00e1gina, lo que activa el splat. Tenga en cuenta que el problema subyacente es independiente de la reversi\u00f3n mencionada; ab\u00f3rdelo asegurando que la cach\u00e9 de encabezado peque\u00f1o se ajuste a la asignaci\u00f3n TCP y GRO, y actualizando napi_alloc_skb() y __netdev_alloc_skb() para seleccionar el uso de kmalloc() para cualquier asignaci\u00f3n que se ajuste a dicha cach\u00e9." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21869.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21869.json index 12dcc4ad22b..dd578fb831a 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21869.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21869.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/code-patching: Disable KASAN report during patching via temporary mm\n\nErhard reports the following KASAN hit on Talos II (power9) with kernel 6.13:\n\n[ 12.028126] ==================================================================\n[ 12.028198] BUG: KASAN: user-memory-access in copy_to_kernel_nofault+0x8c/0x1a0\n[ 12.028260] Write of size 8 at addr 0000187e458f2000 by task systemd/1\n\n[ 12.028346] CPU: 87 UID: 0 PID: 1 Comm: systemd Tainted: G T 6.13.0-P9-dirty #3\n[ 12.028408] Tainted: [T]=RANDSTRUCT\n[ 12.028446] Hardware name: T2P9D01 REV 1.01 POWER9 0x4e1202 opal:skiboot-bc106a0 PowerNV\n[ 12.028500] Call Trace:\n[ 12.028536] [c000000008dbf3b0] [c000000001656a48] dump_stack_lvl+0xbc/0x110 (unreliable)\n[ 12.028609] [c000000008dbf3f0] [c0000000006e2fc8] print_report+0x6b0/0x708\n[ 12.028666] [c000000008dbf4e0] [c0000000006e2454] kasan_report+0x164/0x300\n[ 12.028725] [c000000008dbf600] [c0000000006e54d4] kasan_check_range+0x314/0x370\n[ 12.028784] [c000000008dbf640] [c0000000006e6310] __kasan_check_write+0x20/0x40\n[ 12.028842] [c000000008dbf660] [c000000000578e8c] copy_to_kernel_nofault+0x8c/0x1a0\n[ 12.028902] [c000000008dbf6a0] [c0000000000acfe4] __patch_instructions+0x194/0x210\n[ 12.028965] [c000000008dbf6e0] [c0000000000ade80] patch_instructions+0x150/0x590\n[ 12.029026] [c000000008dbf7c0] [c0000000001159bc] bpf_arch_text_copy+0x6c/0xe0\n[ 12.029085] [c000000008dbf800] [c000000000424250] bpf_jit_binary_pack_finalize+0x40/0xc0\n[ 12.029147] [c000000008dbf830] [c000000000115dec] bpf_int_jit_compile+0x3bc/0x930\n[ 12.029206] [c000000008dbf990] [c000000000423720] bpf_prog_select_runtime+0x1f0/0x280\n[ 12.029266] [c000000008dbfa00] [c000000000434b18] bpf_prog_load+0xbb8/0x1370\n[ 12.029324] [c000000008dbfb70] [c000000000436ebc] __sys_bpf+0x5ac/0x2e00\n[ 12.029379] [c000000008dbfd00] [c00000000043a228] sys_bpf+0x28/0x40\n[ 12.029435] [c000000008dbfd20] [c000000000038eb4] system_call_exception+0x334/0x610\n[ 12.029497] [c000000008dbfe50] [c00000000000c270] system_call_vectored_common+0xf0/0x280\n[ 12.029561] --- interrupt: 3000 at 0x3fff82f5cfa8\n[ 12.029608] NIP: 00003fff82f5cfa8 LR: 00003fff82f5cfa8 CTR: 0000000000000000\n[ 12.029660] REGS: c000000008dbfe80 TRAP: 3000 Tainted: G T (6.13.0-P9-dirty)\n[ 12.029735] MSR: 900000000280f032 CR: 42004848 XER: 00000000\n[ 12.029855] IRQMASK: 0\n GPR00: 0000000000000169 00003fffdcf789a0 00003fff83067100 0000000000000005\n GPR04: 00003fffdcf78a98 0000000000000090 0000000000000000 0000000000000008\n GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000\n GPR12: 0000000000000000 00003fff836ff7e0 c000000000010678 0000000000000000\n GPR16: 0000000000000000 0000000000000000 00003fffdcf78f28 00003fffdcf78f90\n GPR20: 0000000000000000 0000000000000000 0000000000000000 00003fffdcf78f80\n GPR24: 00003fffdcf78f70 00003fffdcf78d10 00003fff835c7239 00003fffdcf78bd8\n GPR28: 00003fffdcf78a98 0000000000000000 0000000000000000 000000011f547580\n[ 12.030316] NIP [00003fff82f5cfa8] 0x3fff82f5cfa8\n[ 12.030361] LR [00003fff82f5cfa8] 0x3fff82f5cfa8\n[ 12.030405] --- interrupt: 3000\n[ 12.030444] ==================================================================\n\nCommit c28c15b6d28a (\"powerpc/code-patching: Use temporary mm for\nRadix MMU\") is inspired from x86 but unlike x86 is doesn't disable\nKASAN reports during patching. This wasn't a problem at the begining\nbecause __patch_mem() is not instrumented.\n\nCommit 465cabc97b42 (\"powerpc/code-patching: introduce\npatch_instructions()\") use copy_to_kernel_nofault() to copy several\ninstructions at once. But when using temporary mm the destination is\nnot regular kernel memory but a kind of kernel-like memory located\nin user address space. \n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/code-patching: Deshabilitar el informe de KASAN durante la aplicaci\u00f3n de parches a trav\u00e9s de mm temporal Erhard informa el siguiente impacto de KASAN en Talos II (power9) con kernel 6.13: [ 12.028126] ====================================================================== [ 12.028198] ERROR: KASAN: acceso a memoria de usuario en copy_to_kernel_nofault+0x8c/0x1a0 [ 12.028260] Escritura de tama\u00f1o 8 en la direcci\u00f3n 0000187e458f2000 por la tarea systemd/1 [ 12.028346] CPU: 87 UID: 0 PID: 1 Comm: systemd Contaminado: GT 6.13.0-P9-dirty #3 [ 12.028408] Contaminado: [T]=RANDSTRUCT [ 12.028446] Nombre del hardware: T2P9D01 REV 1.01 POWER9 0x4e1202 opal:skiboot-bc106a0 PowerNV [ 12.028500] Rastreo de llamadas: [ 12.028536] [c000000008dbf3b0] [c000000001656a48] dump_stack_lvl+0xbc/0x110 (no confiable) [ 12.028609] [c000000008dbf3f0] [c0000000006e2fc8] informe_de_impresi\u00f3n+0x6b0/0x708 [12.028666] [c000000008dbf4e0] [c0000000006e2454] informe_de_kasan+0x164/0x300 [12.028725] [c000000008dbf600] [c0000000006e54d4] rango_de_comprobaci\u00f3n_de_kasan+0x314/0x370 [12.028784] [c000000008dbf640] [c0000000006e6310] __escritura_de_comprobaci\u00f3n_de_kasan+0x20/0x40 [12.028842] [c000000008dbf660] [c000000000578e8c] copia_al_n\u00facleo_no_ofault+0x8c/0x1a0 [ 12.028902] [c000000008dbf6a0] [c0000000000acfe4] __instrucciones_de_parche+0x194/0x210 [ 12.028965] [c000000008dbf6e0] [c0000000000ade80] instrucciones_de_parche+0x150/0x590 [ 12.029026] [c000000008dbf7c0] [c0000000001159bc] copia_de_texto_de_archivo_bpf+0x6c/0xe0 [ 12.029085] bpf_jit_binary_pack_finalize+0x40/0xc0 [12.029147] [c000000008dbf830] [c000000000115dec] bpf_int_jit_compile+0x3bc/0x930 [12.029206] [c000000008dbf990] [c000000000423720] bpf_prog_select_runtime+0x1f0/0x280 [12.029266] [c000000008dbfa00] [c000000000434b18] bpf_prog_load+0xbb8/0x1370 [ 12.029324] [c000000008dbfb70] [c000000000436ebc] __sys_bpf+0x5ac/0x2e00 [ 12.029379] [c000000008dbfd00] [c00000000043a228] sys_bpf+0x28/0x40 [ 12.029435] [c000000008dbfd20] [c000000000038eb4] excepci\u00f3n de llamada del sistema+0x334/0x610 [ 12.029497] [c000000008dbfe50] [c00000000000c270] llamada_del_sistema_vectorizada_com\u00fan+0xf0/0x280 [12.029561] --- interrupci\u00f3n: 3000 en 0x3fff82f5cfa8 [12.029608] NIP: 00003fff82f5cfa8 LR: 00003fff82f5cfa8 CTR: 000000000000000 [12.029660] REG: c000000008dbfe80 TRAMPA: 3000 Contaminado: GT (6.13.0-P9-sucio) [12.029735] MSR: 900000000280f032 CR: 42004848 XER: 00000000 [ 12.029855] IRQMASK: 0 GPR00: 0000000000000169 00003fffdcf789a0 00003fff83067100 0000000000000005 GPR04: 00003fffdcf78a98 0000000000000090 0000000000000000 0000000000000008 GPR08: 0000000000000000 00000000000000000 0000000000000000 00000000000000000 GPR12: 0000000000000000 00003fff836ff7e0 c000000000010678 0000000000000000 GPR16: 000000000000000 000000000000000 00003fffdcf78f28 00003fffdcf78f90 GPR20: 000000000000000 000000000000000 000000000000000 0000000000000000 00003fffdcf78f80 GPR24: 00003fffdcf78f70 00003fffdcf78d10 00003fff835c7239 00003fffdcf78bd8 GPR28: 00003fffdcf78a98 0000000000000000 000000000000000 0000000011f547580 [ 12.030316] NIP [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030361] LR [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030405] --- interrupci\u00f3n: 3000 [ 12.030444] ================================================================================= El commit c28c15b6d28a (\"powerpc/code-patching: Usar mm temporal para MMU de base\") est\u00e1 inspirada en x86, pero a diferencia de x86, no deshabilita los informes de KASAN durante la aplicaci\u00f3n de parches. Esto no fue un problema al principio, ya que __patch_mem() no est\u00e1 instrumentado. El commit 465cabc97b42 (\"powerpc/code-patching: introducir patch_instructions()\") usa copy_to_kernel_nofault() para copiar varias instrucciones a la vez. Pero cuando se utiliza mm temporal, el destino no es la memoria del n\u00facleo normal, sino un tipo de memoria similar al n\u00facleo ubicada en el espacio de direcciones del usuario. ---truncado---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21870.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21870.json index 0607bc5a258..53578d84564 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21870.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21870.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers\n\nOther, non DAI copier widgets could have the same stream name (sname) as\nthe ALH copier and in that case the copier->data is NULL, no alh_data is\nattached, which could lead to NULL pointer dereference.\nWe could check for this NULL pointer in sof_ipc4_prepare_copier_module()\nand avoid the crash, but a similar loop in sof_ipc4_widget_setup_comp_dai()\nwill miscalculate the ALH device count, causing broken audio.\n\nThe correct fix is to harden the matching logic by making sure that the\n1. widget is a DAI widget - so dai = w->private is valid\n2. the dai (and thus the copier) is ALH copier" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: SOF: ipc4-topology: Bucles reforzados para la b\u00fasqueda de copiadores ALH. Otros widgets de copiadores no DAI podr\u00edan tener el mismo nombre de flujo (sname) que el copiador ALH y, en ese caso, copier->data es NULL, sin alh_data adjunto, lo que podr\u00eda provocar una desreferencia de puntero NULL. Podr\u00edamos comprobar este puntero NULL en sof_ipc4_prepare_copier_module() y evitar el fallo, pero un bucle similar en sof_ipc4_widget_setup_comp_dai() calcular\u00eda err\u00f3neamente el n\u00famero de dispositivos ALH, lo que provocar\u00eda un audio interrumpido. La soluci\u00f3n correcta es reforzar la l\u00f3gica de coincidencia asegur\u00e1ndose de que: 1. el widget sea un widget DAI, por lo que dai = w->private es v\u00e1lido; 2. el dai (y, por lo tanto, el copiador) sea un copiador ALH." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21871.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21871.json index 813939b4a4d..46cb71d69e6 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21871.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21871.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: optee: Fix supplicant wait loop\n\nOP-TEE supplicant is a user-space daemon and it's possible for it\nbe hung or crashed or killed in the middle of processing an OP-TEE\nRPC call. It becomes more complicated when there is incorrect shutdown\nordering of the supplicant process vs the OP-TEE client application which\ncan eventually lead to system hang-up waiting for the closure of the\nclient application.\n\nAllow the client process waiting in kernel for supplicant response to\nbe killed rather than indefinitely waiting in an unkillable state. Also,\na normal uninterruptible wait should not have resulted in the hung-task\nwatchdog getting triggered, but the endless loop would.\n\nThis fixes issues observed during system reboot/shutdown when supplicant\ngot hung for some reason or gets crashed/killed which lead to client\ngetting hung in an unkillable state. It in turn lead to system being in\nhung up state requiring hard power off/on to recover." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tee: optee: Fix supplicant wait loop OP-TEE supplicant es un daemon de espacio de usuario y es posible que se cuelgue, se bloquee o se elimine en medio del procesamiento de una llamada RPC OP-TEE. Se vuelve m\u00e1s complicado cuando hay un orden de apagado incorrecto del proceso suplicante frente a la aplicaci\u00f3n cliente OP-TEE, lo que puede eventualmente provocar que el sistema se cuelgue esperando el cierre de la aplicaci\u00f3n cliente. Permita que el proceso cliente que espera en el kernel la respuesta del suplicante se elimine en lugar de esperar indefinidamente en un estado imposible de eliminar. Adem\u00e1s, una espera ininterrumpida normal no deber\u00eda haber provocado que se activara el watchdog de tareas colgadas, pero el bucle infinito s\u00ed. Esto soluciona los problemas observados durante el reinicio/apagado del sistema cuando el suplicante se colgaba por alguna raz\u00f3n o se bloqueaba/eliminaba, lo que provocaba que el cliente se colgara en un estado imposible de eliminar. A su vez, provocaba que el sistema quedara en un estado colgado que requer\u00eda un apagado/encendido forzado para recuperarse." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21872.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21872.json index 7daaaa3b8fc..cd4c9ea7c0b 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21872.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21872.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: Don't map the entire mokvar table to determine its size\n\nCurrently, when validating the mokvar table, we (re)map the entire table\non each iteration of the loop, adding space as we discover new entries.\nIf the table grows over a certain size, this fails due to limitations of\nearly_memmap(), and we get a failure and traceback:\n\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 0 at mm/early_ioremap.c:139 __early_ioremap+0xef/0x220\n ...\n Call Trace:\n \n ? __early_ioremap+0xef/0x220\n ? __warn.cold+0x93/0xfa\n ? __early_ioremap+0xef/0x220\n ? report_bug+0xff/0x140\n ? early_fixup_exception+0x5d/0xb0\n ? early_idt_handler_common+0x2f/0x3a\n ? __early_ioremap+0xef/0x220\n ? efi_mokvar_table_init+0xce/0x1d0\n ? setup_arch+0x864/0xc10\n ? start_kernel+0x6b/0xa10\n ? x86_64_start_reservations+0x24/0x30\n ? x86_64_start_kernel+0xed/0xf0\n ? common_startup_64+0x13e/0x141\n \n ---[ end trace 0000000000000000 ]---\n mokvar: Failed to map EFI MOKvar config table pa=0x7c4c3000, size=265187.\n\nMapping the entire structure isn't actually necessary, as we don't ever\nneed more than one entry header mapped at once.\n\nChanges efi_mokvar_table_init() to only map each entry header, not the\nentire table, when determining the table size. Since we're not mapping\nany data past the variable name, it also changes the code to enforce\nthat each variable name is NUL terminated, rather than attempting to\nverify it in place." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efi: No asigne toda la tabla mokvar para determinar su tama\u00f1o Actualmente, al validar la tabla mokvar, (re)asignamos la tabla completa en cada iteraci\u00f3n del bucle, agregando espacio a medida que descubrimos nuevas entradas. Si la tabla crece por encima de cierto tama\u00f1o, esto falla debido a las limitaciones de early_memmap(), y obtenemos un error y seguimiento: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 0 en mm/early_ioremap.c:139 __early_ioremap+0xef/0x220 ... Seguimiento de llamada: ? __early_ioremap+0xef/0x220 ? __warn.cold+0x93/0xfa ? __early_ioremap+0xef/0x220 ? report_bug+0xff/0x140 ? early_fixup_exception+0x5d/0xb0 ? early_idt_handler_common+0x2f/0x3a ? __early_ioremap+0xef/0x220 ? efi_mokvar_table_init+0xce/0x1d0 ? setup_arch+0x864/0xc10 ? start_kernel+0x6b/0xa10 ? x86_64_start_reservations+0x24/0x30 ? x86_64_start_kernel+0xed/0xf0 ? common_startup_64+0x13e/0x141 ---[ fin del seguimiento 0000000000000000 ]--- mokvar: Error al asignar la tabla de configuraci\u00f3n EFI MOKvar pa=0x7c4c3000, tama\u00f1o=265187. No es necesario asignar toda la estructura, ya que no necesitamos asignar m\u00e1s de un encabezado de entrada a la vez. Se modifica efi_mokvar_table_init() para que solo asigne cada encabezado de entrada, no toda la tabla, al determinar el tama\u00f1o de la tabla. Dado que no se asignan datos m\u00e1s all\u00e1 del nombre de la variable, tambi\u00e9n se modifica el c\u00f3digo para que cada nombre de variable termine en NUL, en lugar de intentar verificarlo en su lugar." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21873.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21873.json index 3e57a8d7ad7..2e76e267887 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21873.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21873.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: bsg: Fix crash when arpmb command fails\n\nIf the device doesn't support arpmb we'll crash due to copying user data in\nbsg_transport_sg_io_fn().\n\nIn the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, do not\nset the job's reply_len.\n\nMemory crash backtrace:\n3,1290,531166405,-;ufshcd 0000:00:12.5: ARPMB OP failed: error code -22\n\n4,1308,531166555,-;Call Trace:\n\n4,1309,531166559,-; \n\n4,1310,531166565,-; ? show_regs+0x6d/0x80\n\n4,1311,531166575,-; ? die+0x37/0xa0\n\n4,1312,531166583,-; ? do_trap+0xd4/0xf0\n\n4,1313,531166593,-; ? do_error_trap+0x71/0xb0\n\n4,1314,531166601,-; ? usercopy_abort+0x6c/0x80\n\n4,1315,531166610,-; ? exc_invalid_op+0x52/0x80\n\n4,1316,531166622,-; ? usercopy_abort+0x6c/0x80\n\n4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20\n\n4,1318,531166643,-; ? usercopy_abort+0x6c/0x80\n\n4,1319,531166652,-; __check_heap_object+0xe3/0x120\n\n4,1320,531166661,-; check_heap_object+0x185/0x1d0\n\n4,1321,531166670,-; __check_object_size.part.0+0x72/0x150\n\n4,1322,531166679,-; __check_object_size+0x23/0x30\n\n4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: core: bsg: Se corrige el fallo cuando falla el comando arpmb. Si el dispositivo no es compatible con arpmb, se producir\u00e1 un fallo debido a la copia de datos de usuario en bsg_transport_sg_io_fn(). Si ufs_bsg_exec_advanced_rpmb_req() devuelve un error, no se debe establecer el valor de respuesta de la tarea. Seguimiento de fallos de memoria: 3,1290,531166405,-;ufshcd 0000:00:12.5: Error en la operaci\u00f3n ARPMB: c\u00f3digo de error -22 4,1308,531166555,-; Seguimiento de llamadas: 4,1309,531166559,-; 4,1310,531166565,-; ? show_regs+0x6d/0x80 4,1311,531166575,-; ? die+0x37/0xa0 4,1312,531166583,-; ? do_trap+0xd4/0xf0 4,1313,531166593,-; ? do_error_trap+0x71/0xb0 4,1314,531166601,-; ? usercopy_abort+0x6c/0x80 4,1315,531166610,-; ? exc_invalid_op+0x52/0x80 4,1316,531166622,-; ? usercopy_abort+0x6c/0x80 4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20 4,1318,531166643,-; ? usercopy_abort+0x6c/0x80 4,1319,531166652,-; __check_heap_object+0xe3/0x120 4,1320,531166661,-; check_heap_object+0x185/0x1d0 4,1321,531166670,-; __check_object_size.part.0+0x72/0x150 4,1322,531166679,-; __check_object_size+0x23/0x30 4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21874.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21874.json index daba10c4f97..0ec98a2f873 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21874.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21874.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-integrity: Avoid divide by zero in table status in Inline mode\n\nIn Inline mode, the journal is unused, and journal_sectors is zero.\n\nCalculating the journal watermark requires dividing by journal_sectors,\nwhich should be done only if the journal is configured.\n\nOtherwise, a simple table query (dmsetup table) can cause OOPS.\n\nThis bug did not show on some systems, perhaps only due to\ncompiler optimization.\n\nOn my 32-bit testing machine, this reliably crashes with the following:\n\n : Oops: divide error: 0000 [#1] PREEMPT SMP\n : CPU: 0 UID: 0 PID: 2450 Comm: dmsetup Not tainted 6.14.0-rc2+ #959\n : EIP: dm_integrity_status+0x2f8/0xab0 [dm_integrity]\n ..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm-integrity: Evitar la divisi\u00f3n por cero en el estado de la tabla en modo en l\u00ednea. En modo en l\u00ednea, el diario no se utiliza y journal_sectors es cero. Calcular la marca de agua del diario requiere dividir por journal_sectors, lo cual solo debe hacerse si el diario est\u00e1 configurado. De lo contrario, una simple consulta de tabla (dmsetup table) puede causar un error OOPS. Este error no se present\u00f3 en algunos sistemas, quiz\u00e1s solo debido a la optimizaci\u00f3n del compilador. En mi equipo de pruebas de 32 bits, esto falla de forma fiable con el siguiente error: : Oops: divide error: 0000 [#1] PREEMPT SMP : CPU: 0 UID: 0 PID: 2450 Comm: dmsetup Not tainted 6.14.0-rc2+ #959 : EIP: dm_integrity_status+0x2f8/0xab0 [dm_integrity] ..." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21875.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21875.json index 746ac8113f4..117e705571a 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21875.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21875.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: always handle address removal under msk socket lock\n\nSyzkaller reported a lockdep splat in the PM control path:\n\n WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock_owned_by_me include/net/sock.h:1711 [inline]\n WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n Modules linked in:\n CPU: 0 UID: 0 PID: 6693 Comm: syz.0.205 Not tainted 6.14.0-rc2-syzkaller-00303-gad1b832bf1cf #0\n Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\n RIP: 0010:sock_owned_by_me include/net/sock.h:1711 [inline]\n RIP: 0010:msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n RIP: 0010:mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ca 7b d3 f5 eb b9 e8 c3 7b d3 f5 90 0f 0b 90 e9 dd fb ff ff e8 b5 7b d3 f5 90 <0f> 0b 90 e9 3e fb ff ff 44 89 f1 80 e1 07 38 c1 0f 8c eb fb ff ff\n RSP: 0000:ffffc900034f6f60 EFLAGS: 00010283\n RAX: ffffffff8bee3c2b RBX: 0000000000000001 RCX: 0000000000080000\n RDX: ffffc90004d42000 RSI: 000000000000a407 RDI: 000000000000a408\n RBP: ffffc900034f7030 R08: ffffffff8bee37f6 R09: 0100000000000000\n R10: dffffc0000000000 R11: ffffed100bcc62e4 R12: ffff88805e6316e0\n R13: ffff88805e630c00 R14: dffffc0000000000 R15: ffff88805e630c00\n FS: 00007f7e9a7e96c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000001b2fd18ff8 CR3: 0000000032c24000 CR4: 00000000003526f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n mptcp_pm_remove_addr+0x103/0x1d0 net/mptcp/pm.c:59\n mptcp_pm_remove_anno_addr+0x1f4/0x2f0 net/mptcp/pm_netlink.c:1486\n mptcp_nl_remove_subflow_and_signal_addr net/mptcp/pm_netlink.c:1518 [inline]\n mptcp_pm_nl_del_addr_doit+0x118d/0x1af0 net/mptcp/pm_netlink.c:1629\n genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0xb1f/0xec0 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2543\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]\n netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1348\n netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1892\n sock_sendmsg_nosec net/socket.c:718 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:733\n ____sys_sendmsg+0x53a/0x860 net/socket.c:2573\n ___sys_sendmsg net/socket.c:2627 [inline]\n __sys_sendmsg+0x269/0x350 net/socket.c:2659\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f7e9998cde9\n Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\n RSP: 002b:00007f7e9a7e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 00007f7e99ba5fa0 RCX: 00007f7e9998cde9\n RDX: 000000002000c094 RSI: 0000400000000000 RDI: 0000000000000007\n RBP: 00007f7e99a0e2a0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n R13: 0000000000000000 R14: 00007f7e99ba5fa0 R15: 00007fff49231088\n\nIndeed the PM can try to send a RM_ADDR over a msk without acquiring\nfirst the msk socket lock.\n\nThe bugged code-path comes from an early optimization: when there\nare no subflows, the PM should (usually) not send RM_ADDR\nnotifications.\n\nThe above statement is incorrect, as without locks another process\ncould concur\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: siempre maneja la eliminaci\u00f3n de direcci\u00f3n bajo el bloqueo del socket msk Syzkaller inform\u00f3 un splat lockdep en la ruta de control de PM: ADVERTENCIA: CPU: 0 PID: 6693 en ./include/net/sock.h:1711 sock_owned_by_me include/net/sock.h:1711 [en l\u00ednea] ADVERTENCIA: CPU: 0 PID: 6693 en ./include/net/sock.h:1711 msk_owned_by_me net/mptcp/protocol.h:363 [en l\u00ednea] ADVERTENCIA: CPU: 0 PID: 6693 en ./include/net/sock.h:1711 mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788 M\u00f3dulos vinculado: CPU: 0 UID: 0 PID: 6693 Comm: syz.0.205 No contaminado 6.14.0-rc2-syzkaller-00303-gad1b832bf1cf #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 27/12/2024 RIP: 0010:sock_owned_by_me include/net/sock.h:1711 [en l\u00ednea] RIP: 0010:msk_owned_by_me net/mptcp/protocol.h:363 [en l\u00ednea] RIP: 0010:mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788 C\u00f3digo: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ca 7b d3 f5 eb b9 e8 c3 7b d3 f5 90 0f 0b 90 e9 dd fb ff ff e8 b5 7b d3 f5 90 <0f> 0b 90 e9 3e fb ff ff 44 89 f1 80 e1 07 38 c1 0f 8c eb fb ff ff RSP: 0000:ffffc900034f6f60 EFLAGS: 00010283 RAX: ffffffff8bee3c2b RBX: 0000000000000001 RCX: 0000000000080000 RDX: ffffc90004d42000 RSI: 000000000000a407 RDI: 000000000000a408 RBP: ffffc900034f7030 R08: ffffffff8bee37f6 R09: 0100000000000000 R10: dffffc000000000 R11: ffffed100bcc62e4 R12: ffff88805e6316e0 R13: ffff88805e630c00 R14: dffffc000000000 R15: ffff88805e630c00 FS: 00007f7e9a7e96c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2fd18ff8 CR3: 0000000032c24000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: mptcp_pm_remove_addr+0x103/0x1d0 net/mptcp/pm.c:59 mptcp_pm_remove_anno_addr+0x1f4/0x2f0 net/mptcp/pm_netlink.c:1486 mptcp_nl_remove_subflow_and_signal_addr net/mptcp/pm_netlink.c:1518 [inline] mptcp_pm_nl_del_addr_doit+0x118d/0x1af0 net/mptcp/pm_netlink.c:1629 genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline] genl_rcv_msg+0xb1f/0xec0 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2543 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline] netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1348 netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1892 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:733 ____sys_sendmsg+0x53a/0x860 net/socket.c:2573 ___sys_sendmsg net/socket.c:2627 [inline] __sys_sendmsg+0x269/0x350 net/socket.c:2659 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7e9998cde9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7e9a7e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f7e99ba5fa0 RCX: 00007f7e9998cde9 RDX: 000000002000c094 RSI: 0000400000000000 RDI: 0000000000000007 RBP: 00007f7e99a0e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f7e99ba5fa0 R15: 00007fff49231088 De hecho, el PM puede intentar enviar una RM_ADDR a trav\u00e9s de un msk sin adquirir primero el bloqueo del socket msk. La ruta de c\u00f3digo con errores proviene de una optimizaci\u00f3n anterior: cuando no hay subflujos, el PM no deber\u00eda (normalmente) enviar notificaciones RM_ADDR. La afirmaci\u00f3n anterior es incorrecta, ya que sin bloqueos, otro proceso podr\u00eda concurrir ---truncado---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21876.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21876.json index 7177399c30d..c07d11b8c04 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21876.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21876.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix suspicious RCU usage\n\nCommit (\"iommu/vt-d: Allocate DMAR fault interrupts\nlocally\") moved the call to enable_drhd_fault_handling() to a code\npath that does not hold any lock while traversing the drhd list. Fix\nit by ensuring the dmar_global_lock lock is held when traversing the\ndrhd list.\n\nWithout this fix, the following warning is triggered:\n =============================\n WARNING: suspicious RCU usage\n 6.14.0-rc3 #55 Not tainted\n -----------------------------\n drivers/iommu/intel/dmar.c:2046 RCU-list traversed in non-reader section!!\n other info that might help us debug this:\n rcu_scheduler_active = 1, debug_locks = 1\n 2 locks held by cpuhp/1/23:\n #0: ffffffff84a67c50 (cpu_hotplug_lock){++++}-{0:0}, at: cpuhp_thread_fun+0x87/0x2c0\n #1: ffffffff84a6a380 (cpuhp_state-up){+.+.}-{0:0}, at: cpuhp_thread_fun+0x87/0x2c0\n stack backtrace:\n CPU: 1 UID: 0 PID: 23 Comm: cpuhp/1 Not tainted 6.14.0-rc3 #55\n Call Trace:\n \n dump_stack_lvl+0xb7/0xd0\n lockdep_rcu_suspicious+0x159/0x1f0\n ? __pfx_enable_drhd_fault_handling+0x10/0x10\n enable_drhd_fault_handling+0x151/0x180\n cpuhp_invoke_callback+0x1df/0x990\n cpuhp_thread_fun+0x1ea/0x2c0\n smpboot_thread_fn+0x1f5/0x2e0\n ? __pfx_smpboot_thread_fn+0x10/0x10\n kthread+0x12a/0x2d0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x4a/0x60\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n\nHolding the lock in enable_drhd_fault_handling() triggers a lockdep splat\nabout a possible deadlock between dmar_global_lock and cpu_hotplug_lock.\nThis is avoided by not holding dmar_global_lock when calling\niommu_device_register(), which initiates the device probe process." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: Correcci\u00f3n de uso sospechoso de RCU. El commit (\"iommu/vt-d: Asignar interrupciones de fallo DMAR localmente\") movi\u00f3 la llamada a enable_drhd_fault_handling() a una ruta de c\u00f3digo que no mantiene ning\u00fan bloqueo al recorrer la lista drhd. Corr\u00edjala asegur\u00e1ndose de que el bloqueo dmar_global_lock se mantenga al recorrer la lista drhd. Sin esta correcci\u00f3n, se activa la siguiente advertencia: ============================= ADVERTENCIA: uso sospechoso de RCU 6.14.0-rc3 #55 No contaminado ----------------------------- drivers/iommu/intel/dmar.c:2046 \u00a1Lista de RCU recorrida en una secci\u00f3n que no es de lectura! Otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: rcu_scheduler_active = 1, debug_locks = 1 2 bloqueos mantenidos por cpuhp/1/23: #0: ffffffff84a67c50 (cpu_hotplug_lock){++++}-{0:0}, en: cpuhp_thread_fun+0x87/0x2c0 #1: ffffffff84a6a380 (cpuhp_state-up){+.+.}-{0:0}, en: cpuhp_thread_fun+0x87/0x2c0 seguimiento de pila: CPU: 1 UID: 0 PID: 23 Comm: cpuhp/1 No contaminado 6.14.0-rc3 #55 Seguimiento de llamadas: dump_stack_lvl+0xb7/0xd0 lockdep_rcu_suspicious+0x159/0x1f0 ? __pfx_enable_drhd_fault_handling+0x10/0x10 enable_drhd_fault_handling+0x151/0x180 cpuhp_invoke_callback+0x1df/0x990 cpuhp_thread_fun+0x1ea/0x2c0 smpboot_thread_fn+0x1f5/0x2e0 ? __pfx_smpboot_thread_fn+0x10/0x10 kthread+0x12a/0x2d0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x4a/0x60 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Mantener el bloqueo en enable_drhd_fault_handling() activa un aviso de bloqueo sobre un posible interbloqueo entre dmar_global_lock y cpu_hotplug_lock. Esto se evita al no mantener dmar_global_lock al llamar a iommu_device_register(), que inicia el proceso de sondeo del dispositivo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21877.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21877.json index e41276e1a28..f1ef6b3075d 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21877.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21877.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: gl620a: fix endpoint checking in genelink_bind()\n\nSyzbot reports [1] a warning in usb_submit_urb() triggered by\ninconsistencies between expected and actually present endpoints\nin gl620a driver. Since genelink_bind() does not properly\nverify whether specified eps are in fact provided by the device,\nin this case, an artificially manufactured one, one may get a\nmismatch.\n\nFix the issue by resorting to a usbnet utility function\nusbnet_get_endpoints(), usually reserved for this very problem.\nCheck for endpoints and return early before proceeding further if\nany are missing.\n\n[1] Syzbot report:\nusb 5-1: Manufacturer: syz\nusb 5-1: SerialNumber: syz\nusb 5-1: config 0 descriptor??\ngl620a 5-1:0.23 usb0: register 'gl620a' at usb-dummy_hcd.0-1, ...\n------------[ cut here ]------------\nusb 5-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 2 PID: 1841 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503\nModules linked in:\nCPU: 2 UID: 0 PID: 1841 Comm: kworker/2:2 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nWorkqueue: mld mld_ifc_work\nRIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \n usbnet_start_xmit+0x6be/0x2780 drivers/net/usb/usbnet.c:1467\n __netdev_start_xmit include/linux/netdevice.h:5002 [inline]\n netdev_start_xmit include/linux/netdevice.h:5011 [inline]\n xmit_one net/core/dev.c:3590 [inline]\n dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3606\n sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343\n __dev_xmit_skb net/core/dev.c:3827 [inline]\n __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4400\n dev_queue_xmit include/linux/netdevice.h:3168 [inline]\n neigh_resolve_output net/core/neighbour.c:1514 [inline]\n neigh_resolve_output+0x5bc/0x950 net/core/neighbour.c:1494\n neigh_output include/net/neighbour.h:539 [inline]\n ip6_finish_output2+0xb1b/0x2070 net/ipv6/ip6_output.c:141\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\n ip6_finish_output+0x3f9/0x1360 net/ipv6/ip6_output.c:226\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\n ip6_output+0x1f8/0x540 net/ipv6/ip6_output.c:247\n dst_output include/net/dst.h:450 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n mld_sendpack+0x9f0/0x11d0 net/ipv6/mcast.c:1819\n mld_send_cr net/ipv6/mcast.c:2120 [inline]\n mld_ifc_work+0x740/0xca0 net/ipv6/mcast.c:2651\n process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229\n process_scheduled_works kernel/workqueue.c:3310 [inline]\n worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: gl620a: correcci\u00f3n de la comprobaci\u00f3n de endpoints en genelink_bind(). Syzbot informa [1] de una advertencia en usb_submit_urb() provocada por inconsistencias entre los endpoints esperados y los realmente presentes en el controlador gl620a. Dado que genelink_bind() no verifica correctamente si el dispositivo proporciona los eps especificados (en este caso, uno fabricado artificialmente), es posible que se produzca una discrepancia. Solucione el problema recurriendo a la funci\u00f3n de utilidad usbnet, usbnet_get_endpoints(), normalmente reservada para este problema. Compruebe los endpoints y vuelva antes de continuar si falta alguno. [1] Informe de Syzbot: usb 5-1: Fabricante: syz usb 5-1: N\u00famero de serie: syz usb 5-1: \u00bfdescriptor de configuraci\u00f3n 0? gl620a 5-1:0.23 usb0: registro 'gl620a' en usb-dummy_hcd.0-1, ... ------------[ cortar aqu\u00ed ]------------ usb 5-1: transferencia urb FALSA, tuber\u00eda 3 != tipo 1 ADVERTENCIA: CPU: 2 PID: 1841 en drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503 M\u00f3dulos vinculados: CPU: 2 UID: 0 PID: 1841 Comm: kworker/2:2 No contaminado 6.12.0-syzkaller-07834-g06afb0f36106 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 01/04/2014 Cola de trabajo: mld mld_ifc_work RIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503 ... Rastreo de llamadas: usbnet_start_xmit+0x6be/0x2780 drivers/net/usb/usbnet.c:1467 __netdev_start_xmit include/linux/netdevice.h:5002 [inline] netdev_start_xmit include/linux/netdevice.h:5011 [inline] xmit_one net/core/dev.c:3590 [inline] dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3606 sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3827 [inline] __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4400 dev_queue_xmit include/linux/netdevice.h:3168 [inline] neigh_resolve_output net/core/neighbour.c:1514 [inline] neigh_resolve_output+0x5bc/0x950 net/core/neighbour.c:1494 neigh_output include/net/neighbour.h:539 [inline] ip6_finish_output2+0xb1b/0x2070 net/ipv6/ip6_output.c:141 __ip6_finish_output net/ipv6/ip6_output.c:215 [inline] ip6_finish_output+0x3f9/0x1360 net/ipv6/ip6_output.c:226 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip6_output+0x1f8/0x540 net/ipv6/ip6_output.c:247 dst_output include/net/dst.h:450 [inline] NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] mld_sendpack+0x9f0/0x11d0 net/ipv6/mcast.c:1819 mld_send_cr net/ipv6/mcast.c:2120 [inline] mld_ifc_work+0x740/0xca0 net/ipv6/mcast.c:2651 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21878.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21878.json index 69d1a429c55..bb8e5b6370b 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21878.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21878.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: npcm: disable interrupt enable bit before devm_request_irq\n\nThe customer reports that there is a soft lockup issue related to\nthe i2c driver. After checking, the i2c module was doing a tx transfer\nand the bmc machine reboots in the middle of the i2c transaction, the i2c\nmodule keeps the status without being reset.\n\nDue to such an i2c module status, the i2c irq handler keeps getting\ntriggered since the i2c irq handler is registered in the kernel booting\nprocess after the bmc machine is doing a warm rebooting.\nThe continuous triggering is stopped by the soft lockup watchdog timer.\n\nDisable the interrupt enable bit in the i2c module before calling\ndevm_request_irq to fix this issue since the i2c relative status bit\nis read-only.\n\nHere is the soft lockup log.\n[ 28.176395] watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [swapper/0:1]\n[ 28.183351] Modules linked in:\n[ 28.186407] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.15.120-yocto-s-dirty-bbebc78 #1\n[ 28.201174] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 28.208128] pc : __do_softirq+0xb0/0x368\n[ 28.212055] lr : __do_softirq+0x70/0x368\n[ 28.215972] sp : ffffff8035ebca00\n[ 28.219278] x29: ffffff8035ebca00 x28: 0000000000000002 x27: ffffff80071a3780\n[ 28.226412] x26: ffffffc008bdc000 x25: ffffffc008bcc640 x24: ffffffc008be50c0\n[ 28.233546] x23: ffffffc00800200c x22: 0000000000000000 x21: 000000000000001b\n[ 28.240679] x20: 0000000000000000 x19: ffffff80001c3200 x18: ffffffffffffffff\n[ 28.247812] x17: ffffffc02d2e0000 x16: ffffff8035eb8b40 x15: 00001e8480000000\n[ 28.254945] x14: 02c3647e37dbfcb6 x13: 02c364f2ab14200c x12: 0000000002c364f2\n[ 28.262078] x11: 00000000fa83b2da x10: 000000000000b67e x9 : ffffffc008010250\n[ 28.269211] x8 : 000000009d983d00 x7 : 7fffffffffffffff x6 : 0000036d74732434\n[ 28.276344] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : 0000000000000198\n[ 28.283476] x2 : ffffffc02d2e0000 x1 : 00000000000000e0 x0 : ffffffc008bdcb40\n[ 28.290611] Call trace:\n[ 28.293052] __do_softirq+0xb0/0x368\n[ 28.296625] __irq_exit_rcu+0xe0/0x100\n[ 28.300374] irq_exit+0x14/0x20\n[ 28.303513] handle_domain_irq+0x68/0x90\n[ 28.307440] gic_handle_irq+0x78/0xb0\n[ 28.311098] call_on_irq_stack+0x20/0x38\n[ 28.315019] do_interrupt_handler+0x54/0x5c\n[ 28.319199] el1_interrupt+0x2c/0x4c\n[ 28.322777] el1h_64_irq_handler+0x14/0x20\n[ 28.326872] el1h_64_irq+0x74/0x78\n[ 28.330269] __setup_irq+0x454/0x780\n[ 28.333841] request_threaded_irq+0xd0/0x1b4\n[ 28.338107] devm_request_threaded_irq+0x84/0x100\n[ 28.342809] npcm_i2c_probe_bus+0x188/0x3d0\n[ 28.346990] platform_probe+0x6c/0xc4\n[ 28.350653] really_probe+0xcc/0x45c\n[ 28.354227] __driver_probe_device+0x8c/0x160\n[ 28.358578] driver_probe_device+0x44/0xe0\n[ 28.362670] __driver_attach+0x124/0x1d0\n[ 28.366589] bus_for_each_dev+0x7c/0xe0\n[ 28.370426] driver_attach+0x28/0x30\n[ 28.373997] bus_add_driver+0x124/0x240\n[ 28.377830] driver_register+0x7c/0x124\n[ 28.381662] __platform_driver_register+0x2c/0x34\n[ 28.386362] npcm_i2c_init+0x3c/0x5c\n[ 28.389937] do_one_initcall+0x74/0x230\n[ 28.393768] kernel_init_freeable+0x24c/0x2b4\n[ 28.398126] kernel_init+0x28/0x130\n[ 28.401614] ret_from_fork+0x10/0x20\n[ 28.405189] Kernel panic - not syncing: softlockup: hung tasks\n[ 28.411011] SMP: stopping secondary CPUs\n[ 28.414933] Kernel Offset: disabled\n[ 28.418412] CPU features: 0x00000000,00000802\n[ 28.427644] Rebooting in 20 seconds.." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: npcm: deshabilitar el bit de habilitaci\u00f3n de interrupci\u00f3n antes de devm_request_irq El cliente informa que hay un problema de bloqueo suave relacionado con el controlador i2c. Despu\u00e9s de verificar, el m\u00f3dulo i2c estaba haciendo una transferencia tx y la m\u00e1quina bmc se reinicia en medio de la transacci\u00f3n i2c, el m\u00f3dulo i2c mantiene el estado sin reiniciarse. Debido a dicho estado del m\u00f3dulo i2c, el controlador de irq i2c sigue activ\u00e1ndose ya que el controlador de irq i2c se registra en el proceso de arranque del kernel despu\u00e9s de que la m\u00e1quina bmc est\u00e9 haciendo un reinicio en caliente. El temporizador de vigilancia de bloqueo suave detiene la activaci\u00f3n continua. Deshabilite el bit de habilitaci\u00f3n de interrupci\u00f3n en el m\u00f3dulo i2c antes de llamar a devm_request_irq para corregir este problema, ya que el bit de estado relativo de i2c es de solo lectura. Aqu\u00ed est\u00e1 el registro de bloqueo suave. [ 28.176395] watchdog: ERROR: bloqueo suave: \u00a1CPU n.\u00b0 0 bloqueada durante 26 s! [swapper/0:1] [ 28.183351] M\u00f3dulos vinculados: [ 28.186407] CPU: 0 PID: 1 Comm: swapper/0 No contaminado 5.15.120-yocto-s-dirty-bbebc78 #1 [ 28.201174] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 28.208128] pc : __do_softirq+0xb0/0x368 [ 28.212055] lr : __do_softirq+0x70/0x368 [ 28.215972] sp : ffffff8035ebca00 [ 28.219278] x29: ffffff8035ebca00 x28: 0000000000000002 x27: ffffff80071a3780 [ 28.226412] x26: ffffffc008bdc000 x25: ffffffc008bcc640 x24: ffffffc008be50c0 [ 28.233546] x23: ffffffc00800200c x22: 0000000000000000 x21: 000000000000001b [ 28.240679] x20: 0000000000000000 x19: ffffff80001c3200 x18: ffffffffffffffff [ 28.247812] x17: ffffffc02d2e0000 x16: ffffff8035eb8b40 x15: 00001e8480000000 [ 28.254945] x14: 02c3647e37dbfcb6 x13: 02c364f2ab14200c x12: 0000000002c364f2 [ 28.262078] x11: 00000000fa83b2da x10: 000000000000b67e x9 : ffffffc008010250 [ 28.269211] x8 : 000000009d983d00 x7 : 7fffffffffffffff x6 : 0000036d74732434 [ 28.276344] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : 0000000000000198 [ 28.283476] x2 : ffffffc02d2e0000 x1 : 00000000000000e0 x0 : ffffffc008bdcb40 [ 28.290611] Call trace: [ 28.293052] __do_softirq+0xb0/0x368 [ 28.296625] __irq_exit_rcu+0xe0/0x100 [ 28.300374] irq_exit+0x14/0x20 [ 28.303513] handle_domain_irq+0x68/0x90 [ 28.307440] gic_handle_irq+0x78/0xb0 [ 28.311098] call_on_irq_stack+0x20/0x38 [ 28.315019] do_interrupt_handler+0x54/0x5c [ 28.319199] el1_interrupt+0x2c/0x4c [ 28.322777] el1h_64_irq_handler+0x14/0x20 [ 28.326872] el1h_64_irq+0x74/0x78 [ 28.330269] __setup_irq+0x454/0x780 [ 28.333841] request_threaded_irq+0xd0/0x1b4 [ 28.338107] devm_request_threaded_irq+0x84/0x100 [ 28.342809] npcm_i2c_probe_bus+0x188/0x3d0 [ 28.346990] platform_probe+0x6c/0xc4 [ 28.350653] really_probe+0xcc/0x45c [ 28.354227] __driver_probe_device+0x8c/0x160 [ 28.358578] driver_probe_device+0x44/0xe0 [ 28.362670] __driver_attach+0x124/0x1d0 [ 28.366589] bus_for_each_dev+0x7c/0xe0 [ 28.370426] driver_attach+0x28/0x30 [ 28.373997] bus_add_driver+0x124/0x240 [ 28.377830] driver_register+0x7c/0x124 [ 28.381662] __platform_driver_register+0x2c/0x34 [ 28.386362] npcm_i2c_init+0x3c/0x5c [ 28.389937] do_one_initcall+0x74/0x230 [ 28.393768] kernel_init_freeable+0x24c/0x2b4 [ 28.398126] kernel_init+0x28/0x130 [ 28.401614] ret_from_fork+0x10/0x20 [ 28.405189] Kernel panic - not syncing: softlockup: hung tasks [ 28.411011] SMP: stopping secondary CPUs [ 28.414933] Kernel Offset: disabled [ 28.418412] CPU features: 0x00000000,00000802 [ 28.427644] Reiniciando en 20 segundos." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21880.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21880.json index aad7b02b196..d295f8f1a9d 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21880.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21880.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/userptr: fix EFAULT handling\n\nCurrently we treat EFAULT from hmm_range_fault() as a non-fatal error\nwhen called from xe_vm_userptr_pin() with the idea that we want to avoid\nkilling the entire vm and chucking an error, under the assumption that\nthe user just did an unmap or something, and has no intention of\nactually touching that memory from the GPU. At this point we have\nalready zapped the PTEs so any access should generate a page fault, and\nif the pin fails there also it will then become fatal.\n\nHowever it looks like it's possible for the userptr vma to still be on\nthe rebind list in preempt_rebind_work_func(), if we had to retry the\npin again due to something happening in the caller before we did the\nrebind step, but in the meantime needing to re-validate the userptr and\nthis time hitting the EFAULT.\n\nThis explains an internal user report of hitting:\n\n[ 191.738349] WARNING: CPU: 1 PID: 157 at drivers/gpu/drm/xe/xe_res_cursor.h:158 xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe]\n[ 191.738551] Workqueue: xe-ordered-wq preempt_rebind_work_func [xe]\n[ 191.738616] RIP: 0010:xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe]\n[ 191.738690] Call Trace:\n[ 191.738692] \n[ 191.738694] ? show_regs+0x69/0x80\n[ 191.738698] ? __warn+0x93/0x1a0\n[ 191.738703] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe]\n[ 191.738759] ? report_bug+0x18f/0x1a0\n[ 191.738764] ? handle_bug+0x63/0xa0\n[ 191.738767] ? exc_invalid_op+0x19/0x70\n[ 191.738770] ? asm_exc_invalid_op+0x1b/0x20\n[ 191.738777] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe]\n[ 191.738834] ? ret_from_fork_asm+0x1a/0x30\n[ 191.738849] bind_op_prepare+0x105/0x7b0 [xe]\n[ 191.738906] ? dma_resv_reserve_fences+0x301/0x380\n[ 191.738912] xe_pt_update_ops_prepare+0x28c/0x4b0 [xe]\n[ 191.738966] ? kmemleak_alloc+0x4b/0x80\n[ 191.738973] ops_execute+0x188/0x9d0 [xe]\n[ 191.739036] xe_vm_rebind+0x4ce/0x5a0 [xe]\n[ 191.739098] ? trace_hardirqs_on+0x4d/0x60\n[ 191.739112] preempt_rebind_work_func+0x76f/0xd00 [xe]\n\nFollowed by NPD, when running some workload, since the sg was never\nactually populated but the vma is still marked for rebind when it should\nbe skipped for this special EFAULT case. This is confirmed to fix the\nuser report.\n\nv2 (MattB):\n - Move earlier.\nv3 (MattB):\n - Update the commit message to make it clear that this indeed fixes the\n issue.\n\n(cherry picked from commit 6b93cb98910c826c2e2004942f8b060311e43618)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/userptr: correcci\u00f3n de la gesti\u00f3n de EFAULT Actualmente tratamos EFAULT de hmm_range_fault() como un error no fatal cuando se llama desde xe_vm_userptr_pin() con la idea de que queremos evitar matar toda la m\u00e1quina virtual y arrojar un error, bajo el supuesto de que el usuario solo hizo una desasignaci\u00f3n o algo as\u00ed, y no tiene intenci\u00f3n de tocar esa memoria de la GPU. En este punto, ya hemos eliminado los PTE, por lo que cualquier acceso deber\u00eda generar un fallo de p\u00e1gina, y si el pin tambi\u00e9n falla all\u00ed, se volver\u00e1 fatal. Sin embargo, parece que es posible que la vma userptr a\u00fan est\u00e9 en la lista de revinculaci\u00f3n en preempt_rebind_work_func(), si tuvi\u00e9ramos que volver a intentar el pin debido a que algo sucede en el llamador antes de realizar el paso de revinculaci\u00f3n, pero mientras tanto necesitamos volver a validar el userptr y esta vez golpeando el EFAULT. Esto explica un informe interno de usuario sobre el resultado: [ 191.738349] ADVERTENCIA: CPU: 1 PID: 157 at drivers/gpu/drm/xe/xe_res_cursor.h:158 xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738551] Workqueue: xe-ordered-wq preempt_rebind_work_func [xe] [ 191.738616] RIP: 0010:xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738690] Call Trace: [ 191.738692] [ 191.738694] ? show_regs+0x69/0x80 [ 191.738698] ? __warn+0x93/0x1a0 [ 191.738703] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738759] ? report_bug+0x18f/0x1a0 [ 191.738764] ? handle_bug+0x63/0xa0 [ 191.738767] ? exc_invalid_op+0x19/0x70 [ 191.738770] ? asm_exc_invalid_op+0x1b/0x20 [ 191.738777] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738834] ? ret_from_fork_asm+0x1a/0x30 [ 191.738849] bind_op_prepare+0x105/0x7b0 [xe] [ 191.738906] ? dma_resv_reserve_fences+0x301/0x380 [ 191.738912] xe_pt_update_ops_prepare+0x28c/0x4b0 [xe] [ 191.738966] ? kmemleak_alloc+0x4b/0x80 [ 191.738973] ops_execute+0x188/0x9d0 [xe] [ 191.739036] xe_vm_rebind+0x4ce/0x5a0 [xe] [ 191.739098] ? trace_hardirqs_on+0x4d/0x60 [ 191.739112] preempt_rebind_work_func+0x76f/0xd00 [xe] Seguido de NPD, al ejecutar alguna carga de trabajo, ya que el grupo de secuencias nunca se rellen\u00f3, pero el administrador de m\u00e1quinas virtuales (VMMA) sigue marcado para revincular cuando deber\u00eda omitirse para este caso especial de EFAULT. Esto se ha confirmado para corregir el informe del usuario. v2 (MattB): - Se ha movido a una versi\u00f3n anterior. v3 (MattB): - Actualizar el mensaje de confirmaci\u00f3n para dejar claro que esto realmente soluciona el problema. (seleccionado del commit 6b93cb98910c826c2e2004942f8b060311e43618)" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21881.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21881.json index 5643ee593c0..d7250d2636b 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21881.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21881.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nuprobes: Reject the shared zeropage in uprobe_write_opcode()\n\nWe triggered the following crash in syzkaller tests:\n\n BUG: Bad page state in process syz.7.38 pfn:1eff3\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1eff3\n flags: 0x3fffff00004004(referenced|reserved|node=0|zone=1|lastcpupid=0x1fffff)\n raw: 003fffff00004004 ffffe6c6c07bfcc8 ffffe6c6c07bfcc8 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000\n page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n Call Trace:\n \n dump_stack_lvl+0x32/0x50\n bad_page+0x69/0xf0\n free_unref_page_prepare+0x401/0x500\n free_unref_page+0x6d/0x1b0\n uprobe_write_opcode+0x460/0x8e0\n install_breakpoint.part.0+0x51/0x80\n register_for_each_vma+0x1d9/0x2b0\n __uprobe_register+0x245/0x300\n bpf_uprobe_multi_link_attach+0x29b/0x4f0\n link_create+0x1e2/0x280\n __sys_bpf+0x75f/0xac0\n __x64_sys_bpf+0x1a/0x30\n do_syscall_64+0x56/0x100\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\n BUG: Bad rss-counter state mm:00000000452453e0 type:MM_FILEPAGES val:-1\n\nThe following syzkaller test case can be used to reproduce:\n\n r2 = creat(&(0x7f0000000000)='./file0\\x00', 0x8)\n write$nbd(r2, &(0x7f0000000580)=ANY=[], 0x10)\n r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\\x00', 0x42, 0x0)\n mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0)\n r5 = userfaultfd(0x80801)\n ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x20})\n r6 = userfaultfd(0x80801)\n ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000140))\n ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x2})\n ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}})\n r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x2, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB=\"1800000000120000000000000000000095\"], &(0x7f0000000000)='GPL\\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)\n bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r7, 0x0, 0x30, 0x1e, @val=@uprobe_multi={&(0x7f0000000080)='./file0\\x00', &(0x7f0000000100)=[0x2], 0x0, 0x0, 0x1}}, 0x40)\n\nThe cause is that zero pfn is set to the PTE without increasing the RSS\ncount in mfill_atomic_pte_zeropage() and the refcount of zero folio does\nnot increase accordingly. Then, the operation on the same pfn is performed\nin uprobe_write_opcode()->__replace_page() to unconditional decrease the\nRSS count and old_folio's refcount.\n\nTherefore, two bugs are introduced:\n\n 1. The RSS count is incorrect, when process exit, the check_mm() report\n error \"Bad rss-count\".\n\n 2. The reserved folio (zero folio) is freed when folio->refcount is zero,\n then free_pages_prepare->free_page_is_bad() report error\n \"Bad page state\".\n\nThere is more, the following warning could also theoretically be triggered:\n\n __replace_page()\n -> ...\n -> folio_remove_rmap_pte()\n -> VM_WARN_ON_FOLIO(is_zero_folio(folio), folio)\n\nConsidering that uprobe hit on the zero folio is a very rare case, just\nreject zero old folio immediately after get_user_page_vma_remote().\n\n[ mingo: Cleaned up the changelog ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uprobes: Rechazar la p\u00e1gina cero compartida en uprobe_write_opcode() Activamos el siguiente fallo en las pruebas de syzkaller: ERROR: Estado de p\u00e1gina incorrecto en el proceso syz.7.38 pfn:1eff3 page: refcount:0 mapcount:0 mapping:000000000000000 index:0x0 pfn:0x1eff3 flags: 0x3fffff00004004(referenced|reserved|node=0|zone=1|lastcpupid=0x1fffff) raw: 003fffff00004004 ffffe6c6c07bfcc8 ffffe6c6c07bfcc8 000000000000000 raw: 000000000000000 0000000000000000 00000000ffffffffe 0000000000000000 p\u00e1gina volcada porque: PAGE_FLAGS_CHECK_AT_FREE indicador(es) establecido(s) Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 01/04/2014 Seguimiento de llamadas: dump_stack_lvl+0x32/0x50 bad_page+0x69/0xf0 free_unref_page_prepare+0x401/0x500 free_unref_page+0x6d/0x1b0 uprobe_write_opcode+0x460/0x8e0 install_breakpoint.part.0+0x51/0x80 register_for_each_vma+0x1d9/0x2b0 __uprobe_register+0x245/0x300 bpf_uprobe_multi_link_attach+0x29b/0x4f0 link_create+0x1e2/0x280 __sys_bpf+0x75f/0xac0 __x64_sys_bpf+0x1a/0x30 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2 BUG: Bad rss-counter state mm:00000000452453e0 type:MM_FILEPAGES val:-1 The following syzkaller test case can be used to reproduce: r2 = creat(&(0x7f0000000000)='./file0\\x00', 0x8) write$nbd(r2, &(0x7f0000000580)=ANY=[], 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = userfaultfd(0x80801) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x20}) r6 = userfaultfd(0x80801) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x2}) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x2, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB=\"1800000000120000000000000000000095\"], &(0x7f0000000000)='GPL\\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r7, 0x0, 0x30, 0x1e, @val=@uprobe_multi={&(0x7f0000000080)='./file0\\x00', &(0x7f0000000100)=[0x2], 0x0, 0x0, 0x1}}, 0x40) La causa es que cero El pfn se establece en el PTE sin aumentar el recuento RSS en mfill_atomic_pte_zeropage() y el recuento de referencias del folio cero no aumenta en consecuencia. Luego, se realiza la misma operaci\u00f3n en el pfn en uprobe_write_opcode()->__replace_page() para disminuir incondicionalmente el recuento RSS y el recuento de referencias de old_folio. Por lo tanto, se introducen dos errores: 1. El recuento RSS es incorrecto; al finalizar el proceso, check_mm() informa el error \"Bad RSS-count\" (recuento RSS incorrecto). 2. El folio reservado (folio cero) se libera cuando folio->refcount es cero; entonces, free_pages_prepare->free_page_is_bad() informa el error \"Bad page state\" (estado de p\u00e1gina incorrecto). Hay m\u00e1s, la siguiente advertencia tambi\u00e9n podr\u00eda activarse te\u00f3ricamente: __replace_page() -> ... -> folio_remove_rmap_pte() -> VM_WARN_ON_FOLIO(is_zero_folio(folio), folio) Teniendo en cuenta que el impacto de uprobe en el folio cero es un caso muy raro, simplemente rechace el folio antiguo cero inmediatamente despu\u00e9s de get_user_page_vma_remote(). [ mingo: Se limpi\u00f3 el registro de cambios ]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21882.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21882.json index 4fb595e7948..302dea39529 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21882.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix vport QoS cleanup on error\n\nWhen enabling vport QoS fails, the scheduling node was never freed,\ncausing a leak.\n\nAdd the missing free and reset the vport scheduling node pointer to\nNULL." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Se corrige la limpieza de QoS de vport en caso de error. Al fallar la habilitaci\u00f3n de QoS de vport, el nodo de programaci\u00f3n nunca se liberaba, lo que causaba una fuga. Agregue la liberaci\u00f3n faltante y restablezca el puntero del nodo de programaci\u00f3n de vport a NULL." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21883.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21883.json index 2e1e6eb3e09..9995c1d55e4 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21883.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21883.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix deinitializing VF in error path\n\nIf ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees\nall VFs without removing them from snapshot PF-VF mailbox list, leading\nto list corruption.\n\nReproducer:\n devlink dev eswitch set $PF1_PCI mode switchdev\n ip l s $PF1 up\n ip l s $PF1 promisc on\n sleep 1\n echo 1 > /sys/class/net/$PF1/device/sriov_numvfs\n sleep 1\n echo 1 > /sys/class/net/$PF1/device/sriov_numvfs\n\nTrace (minimized):\n list_add corruption. next->prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330).\n kernel BUG at lib/list_debug.c:29!\n RIP: 0010:__list_add_valid_or_report+0xa6/0x100\n ice_mbx_init_vf_info+0xa7/0x180 [ice]\n ice_initialize_vf_entry+0x1fa/0x250 [ice]\n ice_sriov_configure+0x8d7/0x1520 [ice]\n ? __percpu_ref_switch_mode+0x1b1/0x5d0\n ? __pfx_ice_sriov_configure+0x10/0x10 [ice]\n\nSometimes a KASAN report can be seen instead with a similar stack trace:\n BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100\n\nVFs are added to this list in ice_mbx_init_vf_info(), but only removed\nin ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is\nalso being called in other places where VFs are being removed (including\nice_free_vfs() itself)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: Se corrige la desinicializaci\u00f3n de VF en la ruta de error. Si ice_ena_vfs() falla tras llamar a ice_create_vf_entries(), libera todas las VF sin eliminarlas de la lista de buzones PF-VF de la instant\u00e1nea, lo que provoca la corrupci\u00f3n de la lista. Reproductor: devlink dev eswitch set $PF1_PCI mode switchdev ip ls $PF1 up ip ls $PF1 promisc on sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs sleep 1 echo 1 > /sys/class/net/$PF1/device/sriov_numvfs Rastreo (minimizado): corrupci\u00f3n de list_add. siguiente->anterior deber\u00eda ser anterior (ffff8882e241c6f0), pero era 0000000000000000. (siguiente=ffff888455da1330). \u00a1ERROR del n\u00facleo en lib/list_debug.c:29! RIP: 0010:__list_add_valid_or_report+0xa6/0x100 ice_mbx_init_vf_info+0xa7/0x180 [ice] ice_initialize_vf_entry+0x1fa/0x250 [ice] ice_sriov_configure+0x8d7/0x1520 [ice] ? __percpu_ref_switch_mode+0x1b1/0x5d0 ? __pfx_ice_sriov_configure+0x10/0x10 [ice] A veces, un informe de KASAN se puede ver con un seguimiento de pila similar: ERROR: KASAN: use-after-free en __list_add_valid_or_report+0xf1/0x100. Los VF se a\u00f1aden a esta lista en ice_mbx_init_vf_info(), pero solo se eliminan en ice_free_vfs(). Traslada la eliminaci\u00f3n a ice_free_vf_entries(), que tambi\u00e9n se invoca en otros lugares donde se eliminan VF (incluido el propio ice_free_vfs())." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21884.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21884.json index c9abbeeb062..26a087c5fef 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21884.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21884.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: better track kernel sockets lifetime\n\nWhile kernel sockets are dismantled during pernet_operations->exit(),\ntheir freeing can be delayed by any tx packets still held in qdisc\nor device queues, due to skb_set_owner_w() prior calls.\n\nThis then trigger the following warning from ref_tracker_dir_exit() [1]\n\nTo fix this, make sure that kernel sockets own a reference on net->passive.\n\nAdd sk_net_refcnt_upgrade() helper, used whenever a kernel socket\nis converted to a refcounted one.\n\n[1]\n\n[ 136.263918][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at\n[ 136.263918][ T35] sk_alloc+0x2b3/0x370\n[ 136.263918][ T35] inet6_create+0x6ce/0x10f0\n[ 136.263918][ T35] __sock_create+0x4c0/0xa30\n[ 136.263918][ T35] inet_ctl_sock_create+0xc2/0x250\n[ 136.263918][ T35] igmp6_net_init+0x39/0x390\n[ 136.263918][ T35] ops_init+0x31e/0x590\n[ 136.263918][ T35] setup_net+0x287/0x9e0\n[ 136.263918][ T35] copy_net_ns+0x33f/0x570\n[ 136.263918][ T35] create_new_namespaces+0x425/0x7b0\n[ 136.263918][ T35] unshare_nsproxy_namespaces+0x124/0x180\n[ 136.263918][ T35] ksys_unshare+0x57d/0xa70\n[ 136.263918][ T35] __x64_sys_unshare+0x38/0x40\n[ 136.263918][ T35] do_syscall_64+0xf3/0x230\n[ 136.263918][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 136.263918][ T35]\n[ 136.343488][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at\n[ 136.343488][ T35] sk_alloc+0x2b3/0x370\n[ 136.343488][ T35] inet6_create+0x6ce/0x10f0\n[ 136.343488][ T35] __sock_create+0x4c0/0xa30\n[ 136.343488][ T35] inet_ctl_sock_create+0xc2/0x250\n[ 136.343488][ T35] ndisc_net_init+0xa7/0x2b0\n[ 136.343488][ T35] ops_init+0x31e/0x590\n[ 136.343488][ T35] setup_net+0x287/0x9e0\n[ 136.343488][ T35] copy_net_ns+0x33f/0x570\n[ 136.343488][ T35] create_new_namespaces+0x425/0x7b0\n[ 136.343488][ T35] unshare_nsproxy_namespaces+0x124/0x180\n[ 136.343488][ T35] ksys_unshare+0x57d/0xa70\n[ 136.343488][ T35] __x64_sys_unshare+0x38/0x40\n[ 136.343488][ T35] do_syscall_64+0xf3/0x230\n[ 136.343488][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mejorar el seguimiento del ciclo de vida de los sockets del kernel. Mientras los sockets del kernel se desmantelan durante pernet_operations->exit(), su liberaci\u00f3n puede verse retrasada por cualquier paquete de transmisi\u00f3n que a\u00fan se encuentre en la qdisc o en las colas de dispositivos, debido a llamadas previas a skb_set_owner_w(). Esto genera la siguiente advertencia de ref_tracker_dir_exit() [1]. Para solucionar esto, aseg\u00farese de que los sockets del kernel posean una referencia en net->passive. Agregue el asistente sk_net_refcnt_upgrade(), que se utiliza siempre que un socket del kernel se convierte a uno con recuento de referencia. [1] [ 136.263918][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at [ 136.263918][ T35] sk_alloc+0x2b3/0x370 [ 136.263918][ T35] inet6_create+0x6ce/0x10f0 [ 136.263918][ T35] __sock_create+0x4c0/0xa30 [ 136.263918][ T35] inet_ctl_sock_create+0xc2/0x250 [ 136.263918][ T35] igmp6_net_init+0x39/0x390 [ 136.263918][ T35] ops_init+0x31e/0x590 [ 136.263918][ T35] setup_net+0x287/0x9e0 [ 136.263918][ T35] copy_net_ns+0x33f/0x570 [ 136.263918][ T35] create_new_namespaces+0x425/0x7b0 [ 136.263918][ T35] unshare_nsproxy_namespaces+0x124/0x180 [ 136.263918][ T35] ksys_unshare+0x57d/0xa70 [ 136.263918][ T35] __x64_sys_unshare+0x38/0x40 [ 136.263918][ T35] do_syscall_64+0xf3/0x230 [ 136.263918][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.263918][ T35] [ 136.343488][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at [ 136.343488][ T35] sk_alloc+0x2b3/0x370 [ 136.343488][ T35] inet6_create+0x6ce/0x10f0 [ 136.343488][ T35] __sock_create+0x4c0/0xa30 [ 136.343488][ T35] inet_ctl_sock_create+0xc2/0x250 [ 136.343488][ T35] ndisc_net_init+0xa7/0x2b0 [ 136.343488][ T35] ops_init+0x31e/0x590 [ 136.343488][ T35] setup_net+0x287/0x9e0 [ 136.343488][ T35] copy_net_ns+0x33f/0x570 [ 136.343488][ T35] create_new_namespaces+0x425/0x7b0 [ 136.343488][ T35] unshare_nsproxy_namespaces+0x124/0x180 [ 136.343488][ T35] ksys_unshare+0x57d/0xa70 [ 136.343488][ T35] __x64_sys_unshare+0x38/0x40 [ 136.343488][ T35] do_syscall_64+0xf3/0x230 [ 136.343488][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21885.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21885.json index 6b1f3047ac7..37e198fb1d3 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21885.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21885.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix the page details for the srq created by kernel consumers\n\nWhile using nvme target with use_srq on, below kernel panic is noticed.\n\n[ 549.698111] bnxt_en 0000:41:00.0 enp65s0np0: FEC autoneg off encoding: Clause 91 RS(544,514)\n[ 566.393619] Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI\n..\n[ 566.393799] \n[ 566.393807] ? __die_body+0x1a/0x60\n[ 566.393823] ? die+0x38/0x60\n[ 566.393835] ? do_trap+0xe4/0x110\n[ 566.393847] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re]\n[ 566.393867] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re]\n[ 566.393881] ? do_error_trap+0x7c/0x120\n[ 566.393890] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re]\n[ 566.393911] ? exc_divide_error+0x34/0x50\n[ 566.393923] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re]\n[ 566.393939] ? asm_exc_divide_error+0x16/0x20\n[ 566.393966] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re]\n[ 566.393997] bnxt_qplib_create_srq+0xc9/0x340 [bnxt_re]\n[ 566.394040] bnxt_re_create_srq+0x335/0x3b0 [bnxt_re]\n[ 566.394057] ? srso_return_thunk+0x5/0x5f\n[ 566.394068] ? __init_swait_queue_head+0x4a/0x60\n[ 566.394090] ib_create_srq_user+0xa7/0x150 [ib_core]\n[ 566.394147] nvmet_rdma_queue_connect+0x7d0/0xbe0 [nvmet_rdma]\n[ 566.394174] ? lock_release+0x22c/0x3f0\n[ 566.394187] ? srso_return_thunk+0x5/0x5f\n\nPage size and shift info is set only for the user space SRQs.\nSet page size and page shift for kernel space SRQs also." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: corrige los detalles de la p\u00e1gina para el srq creado por los consumidores del kernel. Al usar el objetivo nvme con use_srq activado, se detecta el siguiente p\u00e1nico del kernel. [ 549.698111] bnxt_en 0000:41:00.0 enp65s0np0: FEC autoneg desactivado codificaci\u00f3n: cl\u00e1usula 91 RS(544,514) [ 566.393619] Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI .. [ 566.393799] [ 566.393807] ? __die_body+0x1a/0x60 [ 566.393823] ? die+0x38/0x60 [ 566.393835] ? do_trap+0xe4/0x110 [ 566.393847] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re] [ 566.393867] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re] [ 566.393881] ? do_error_trap+0x7c/0x120 [ 566.393890] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re] [ 566.393911] ? exc_divide_error+0x34/0x50 [ 566.393923] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re] [ 566.393939] ? asm_exc_divide_error+0x16/0x20 [ 566.393966] ? bnxt_qplib_alloc_init_hwq+0x1d4/0x580 [bnxt_re] [ 566.393997] bnxt_qplib_create_srq+0xc9/0x340 [bnxt_re] [ 566.394040] bnxt_re_create_srq+0x335/0x3b0 [bnxt_re] [ 566.394057] ? srso_return_thunk+0x5/0x5f [ 566.394068] ? __init_swait_queue_head+0x4a/0x60 [ 566.394090] ib_create_srq_user+0xa7/0x150 [ib_core] [ 566.394147] nvmet_rdma_queue_connect+0x7d0/0xbe0 [nvmet_rdma] [ 566.394174] ? lock_release+0x22c/0x3f0 [ 566.394187] ? srso_return_thunk+0x5/0x5f La informaci\u00f3n de tama\u00f1o y desplazamiento de p\u00e1gina se configura solo para las SRQ de espacio de usuario. Tambi\u00e9n se configura para las SRQ de espacio de kernel." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21886.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21886.json index 8f4112d76a0..55953f71a95 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21886.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21886.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix implicit ODP hang on parent deregistration\n\nFix the destroy_unused_implicit_child_mr() to prevent hanging during\nparent deregistration as of below [1].\n\nUpon entering destroy_unused_implicit_child_mr(), the reference count\nfor the implicit MR parent is incremented using:\nrefcount_inc_not_zero().\n\nA corresponding decrement must be performed if\nfree_implicit_child_mr_work() is not called.\n\nThe code has been updated to properly manage the reference count that\nwas incremented.\n\n[1]\nINFO: task python3:2157 blocked for more than 120 seconds.\nNot tainted 6.12.0-rc7+ #1633\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:python3 state:D stack:0 pid:2157 tgid:2157 ppid:1685 flags:0x00000000\nCall Trace:\n\n__schedule+0x420/0xd30\nschedule+0x47/0x130\n__mlx5_ib_dereg_mr+0x379/0x5d0 [mlx5_ib]\n? __pfx_autoremove_wake_function+0x10/0x10\nib_dereg_mr_user+0x5f/0x120 [ib_core]\n? lock_release+0xc6/0x280\ndestroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs]\nuverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs]\nuobj_destroy+0x3f/0x70 [ib_uverbs]\nib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs]\n? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs]\n? lock_acquire+0xc1/0x2f0\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs]\n? lock_release+0xc6/0x280\nib_uverbs_ioctl+0xe7/0x170 [ib_uverbs]\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n __x64_sys_ioctl+0x1b0/0xa70\n? kmem_cache_free+0x221/0x400\ndo_syscall_64+0x6b/0x140\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7f20f21f017b\nRSP: 002b:00007ffcfc4a77c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007ffcfc4a78d8 RCX: 00007f20f21f017b\nRDX: 00007ffcfc4a78c0 RSI: 00000000c0181b01 RDI: 0000000000000003\nRBP: 00007ffcfc4a78a0 R08: 000056147d125190 R09: 00007f20f1f14c60\nR10: 0000000000000001 R11: 0000000000000246 R12: 00007ffcfc4a7890\nR13: 000000000000001c R14: 000056147d100fc0 R15: 00007f20e365c9d0\n" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/mlx5: Se ha corregido el bloqueo impl\u00edcito de ODP al cancelar el registro del padre. Se ha corregido la funci\u00f3n destroy_unused_implicit_child_mr() para evitar que se bloquee durante la cancelaci\u00f3n del registro del padre, como se indica a continuaci\u00f3n [1]. Al ejecutar destroy_unused_implicit_child_mr(), el contador de referencias del padre MR impl\u00edcito se incrementa mediante refcount_inc_not_zero(). Se debe realizar la decrementaci\u00f3n correspondiente si no se llama a free_implicit_child_mr_work(). El c\u00f3digo se ha actualizado para gestionar correctamente el contador de referencias que se increment\u00f3. [1] INFORMACI\u00d3N: La tarea python3:2157 se bloque\u00f3 durante m\u00e1s de 120 segundos. No contaminada. 6.12.0-rc7+ #1633 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. task:python3 state:D stack:0 pid:2157 tgid:2157 ppid:1685 flags:0x00000000 Call Trace: __schedule+0x420/0xd30 schedule+0x47/0x130 __mlx5_ib_dereg_mr+0x379/0x5d0 [mlx5_ib] ? __pfx_autoremove_wake_function+0x10/0x10 ib_dereg_mr_user+0x5f/0x120 [ib_core] ? lock_release+0xc6/0x280 destroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs] uverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs] uobj_destroy+0x3f/0x70 [ib_uverbs] ib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs] ? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs] ? lock_acquire+0xc1/0x2f0 ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs] ? lock_release+0xc6/0x280 ib_uverbs_ioctl+0xe7/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] __x64_sys_ioctl+0x1b0/0xa70 ? kmem_cache_free+0x221/0x400 do_syscall_64+0x6b/0x140 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f20f21f017b RSP: 002b:00007ffcfc4a77c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffcfc4a78d8 RCX: 00007f20f21f017b RDX: 00007ffcfc4a78c0 RSI: 00000000c0181b01 RDI: 0000000000000003 RBP: 00007ffcfc4a78a0 R08: 000056147d125190 R09: 00007f20f1f14c60 R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffcfc4a7890 R13: 000000000000001c R14: 000056147d100fc0 R15: 00007f20e365c9d0 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21888.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21888.json index da63741f71e..90d3ee14902 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21888.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix a WARN during dereg_mr for DM type\n\nMemory regions (MR) of type DM (device memory) do not have an associated\numem.\n\nIn the __mlx5_ib_dereg_mr() -> mlx5_free_priv_descs() flow, the code\nincorrectly takes the wrong branch, attempting to call\ndma_unmap_single() on a DMA address that is not mapped.\n\nThis results in a WARN [1], as shown below.\n\nThe issue is resolved by properly accounting for the DM type and\nensuring the correct branch is selected in mlx5_free_priv_descs().\n\n[1]\nWARNING: CPU: 12 PID: 1346 at drivers/iommu/dma-iommu.c:1230 iommu_dma_unmap_page+0x79/0x90\nModules linked in: ip6table_mangle ip6table_nat ip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry ovelay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core\nCPU: 12 UID: 0 PID: 1346 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1631\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:iommu_dma_unmap_page+0x79/0x90\nCode: 2b 49 3b 29 72 26 49 3b 69 08 73 20 4d 89 f0 44 89 e9 4c 89 e2 48 89 ee 48 89 df 5b 5d 41 5c 41 5d 41 5e 41 5f e9 07 b8 88 ff <0f> 0b 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 66 0f 1f 44 00\nRSP: 0018:ffffc90001913a10 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff88810194b0a8 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001\nRBP: ffff88810194b0a8 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000\nFS: 00007f537abdd740(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f537aeb8000 CR3: 000000010c248001 CR4: 0000000000372eb0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n? __warn+0x84/0x190\n? iommu_dma_unmap_page+0x79/0x90\n? report_bug+0xf8/0x1c0\n? handle_bug+0x55/0x90\n? exc_invalid_op+0x13/0x60\n? asm_exc_invalid_op+0x16/0x20\n? iommu_dma_unmap_page+0x79/0x90\ndma_unmap_page_attrs+0xe6/0x290\nmlx5_free_priv_descs+0xb0/0xe0 [mlx5_ib]\n__mlx5_ib_dereg_mr+0x37e/0x520 [mlx5_ib]\n? _raw_spin_unlock_irq+0x24/0x40\n? wait_for_completion+0xfe/0x130\n? rdma_restrack_put+0x63/0xe0 [ib_core]\nib_dereg_mr_user+0x5f/0x120 [ib_core]\n? lock_release+0xc6/0x280\ndestroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs]\nuverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs]\nuobj_destroy+0x3f/0x70 [ib_uverbs]\nib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs]\n? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs]\n? lock_acquire+0xc1/0x2f0\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs]\n? lock_release+0xc6/0x280\nib_uverbs_ioctl+0xe7/0x170 [ib_uverbs]\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n__x64_sys_ioctl+0x1b0/0xa70\ndo_syscall_64+0x6b/0x140\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7f537adaf17b\nCode: 0f 1e fa 48 8b 05 1d ad 0c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ed ac 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007ffff218f0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007ffff218f1d8 RCX: 00007f537adaf17b\nRDX: 00007ffff218f1c0 RSI: 00000000c0181b01 RDI: 0000000000000003\nRBP: 00007ffff218f1a0 R08: 00007f537aa8d010 R09: 0000561ee2e4f270\nR10: 00007f537aace3a8 R11: 0000000000000246 R12: 00007ffff218f190\nR13: 000000000000001c R14: 0000561ee2e4d7c0 R15: 00007ffff218f450\n" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/mlx5: Se corrige un WARN durante dereg_mr para el tipo DM. Las regiones de memoria (MR) de tipo DM (memoria del dispositivo) no tienen un umem asociado. En el flujo __mlx5_ib_dereg_mr() -> mlx5_free_priv_descs(), el c\u00f3digo toma incorrectamente la rama equivocada al intentar llamar a dma_unmap_single() en una direcci\u00f3n DMA no asignada. Esto genera un WARN [1], como se muestra a continuaci\u00f3n. El problema se resuelve considerando correctamente el tipo DM y asegurando que se seleccione la rama correcta en mlx5_free_priv_descs(). [1] ADVERTENCIA: CPU: 12 PID: 1346 at drivers/iommu/dma-iommu.c:1230 iommu_dma_unmap_page+0x79/0x90 Modules linked in: ip6table_mangle ip6table_nat ip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry ovelay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core CPU: 12 UID: 0 PID: 1346 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1631 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:iommu_dma_unmap_page+0x79/0x90 Code: 2b 49 3b 29 72 26 49 3b 69 08 73 20 4d 89 f0 44 89 e9 4c 89 e2 48 89 ee 48 89 df 5b 5d 41 5c 41 5d 41 5e 41 5f e9 07 b8 88 ff <0f> 0b 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 66 0f 1f 44 00 RSP: 0018:ffffc90001913a10 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff88810194b0a8 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffff88810194b0a8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f537abdd740(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f537aeb8000 CR3: 000000010c248001 CR4: 0000000000372eb0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? __warn+0x84/0x190 ? iommu_dma_unmap_page+0x79/0x90 ? report_bug+0xf8/0x1c0 ? handle_bug+0x55/0x90 ? exc_invalid_op+0x13/0x60 ? asm_exc_invalid_op+0x16/0x20 ? iommu_dma_unmap_page+0x79/0x90 dma_unmap_page_attrs+0xe6/0x290 mlx5_free_priv_descs+0xb0/0xe0 [mlx5_ib] __mlx5_ib_dereg_mr+0x37e/0x520 [mlx5_ib] ? _raw_spin_unlock_irq+0x24/0x40 ? wait_for_completion+0xfe/0x130 ? rdma_restrack_put+0x63/0xe0 [ib_core] ib_dereg_mr_user+0x5f/0x120 [ib_core] ? lock_release+0xc6/0x280 destroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs] uverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs] uobj_destroy+0x3f/0x70 [ib_uverbs] ib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs] ? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs] ? lock_acquire+0xc1/0x2f0 ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs] ? lock_release+0xc6/0x280 ib_uverbs_ioctl+0xe7/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] __x64_sys_ioctl+0x1b0/0xa70 do_syscall_64+0x6b/0x140 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f537adaf17b Code: 0f 1e fa 48 8b 05 1d ad 0c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ed ac 0c 00 f7 d8 64 89 01 48 RSP: 002b:00007ffff218f0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffff218f1d8 RCX: 00007f537adaf17b RDX: 00007ffff218f1c0 RSI: 00000000c0181b01 RDI: 0000000000000003 RBP: 00007ffff218f1a0 R08: 00007f537aa8d010 R09: 0000561ee2e4f270 R10: 00007f537aace3a8 R11: 0000000000000246 R12: 00007ffff218f190 R13: 000000000000001c R14: 0000561ee2e4d7c0 R15: 00007ffff218f450 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21889.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21889.json index e9867b439f8..bfd3df399a4 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21889.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21889.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Add RCU read lock protection to perf_iterate_ctx()\n\nThe perf_iterate_ctx() function performs RCU list traversal but\ncurrently lacks RCU read lock protection. This causes lockdep warnings\nwhen running perf probe with unshare(1) under CONFIG_PROVE_RCU_LIST=y:\n\n\tWARNING: suspicious RCU usage\n\tkernel/events/core.c:8168 RCU-list traversed in non-reader section!!\n\n\t Call Trace:\n\t lockdep_rcu_suspicious\n\t ? perf_event_addr_filters_apply\n\t perf_iterate_ctx\n\t perf_event_exec\n\t begin_new_exec\n\t ? load_elf_phdrs\n\t load_elf_binary\n\t ? lock_acquire\n\t ? find_held_lock\n\t ? bprm_execve\n\t bprm_execve\n\t do_execveat_common.isra.0\n\t __x64_sys_execve\n\t do_syscall_64\n\t entry_SYSCALL_64_after_hwframe\n\nThis protection was previously present but was removed in commit\nbd2756811766 (\"perf: Rewrite core context handling\"). Add back the\nnecessary rcu_read_lock()/rcu_read_unlock() pair around\nperf_iterate_ctx() call in perf_event_exec().\n\n[ mingo: Use scoped_guard() as suggested by Peter ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/core: A\u00f1adir protecci\u00f3n de bloqueo de lectura de RCU a perf_iterate_ctx(). La funci\u00f3n perf_iterate_ctx() recorre la lista de RCU, pero actualmente carece de protecci\u00f3n de bloqueo de lectura de RCU. Esto genera advertencias de lockdep al ejecutar perf probe con unshare(1) en CONFIG_PROVE_RCU_LIST=y: ADVERTENCIA: uso sospechoso de RCU kernel/events/core.c:8168 \u00a1Lista de RCU recorrida en la secci\u00f3n de no lectura! Rastreo de llamadas: lockdep_rcu_suspicious ? perf_event_addr_filters_apply perf_iterate_ctx perf_event_exec begin_new_exec ? load_elf_phdrs load_elf_binary ? lock_acquire ? find_held_lock ? bprm_execve bprm_execve do_execveat_common.isra.0 __x64_sys_execve do_syscall_64 entry_SYSCALL_64_after_hwframe Esta protecci\u00f3n ya exist\u00eda, pero se elimin\u00f3 en la confirmaci\u00f3n bd2756811766 (\"perf: Reescribir la gesti\u00f3n del contexto principal\"). Se ha a\u00f1adido de nuevo el par necesario rcu_read_lock()/rcu_read_unlock() en la llamada a perf_iterate_ctx() en perf_event_exec(). [mingo: Usar scoped_guard() como sugiri\u00f3 Peter]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21890.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21890.json index 796facfd62d..64f74c73d07 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21890.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21890.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix checksums set in idpf_rx_rsc()\n\nidpf_rx_rsc() uses skb_transport_offset(skb) while the transport header\nis not set yet.\n\nThis triggers the following warning for CONFIG_DEBUG_NET=y builds.\n\nDEBUG_NET_WARN_ON_ONCE(!skb_transport_header_was_set(skb))\n\n[ 69.261620] WARNING: CPU: 7 PID: 0 at ./include/linux/skbuff.h:3020 idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf\n[ 69.261629] Modules linked in: vfat fat dummy bridge intel_uncore_frequency_tpmi intel_uncore_frequency_common intel_vsec_tpmi idpf intel_vsec cdc_ncm cdc_eem cdc_ether usbnet mii xhci_pci xhci_hcd ehci_pci ehci_hcd libeth\n[ 69.261644] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Tainted: G S W 6.14.0-smp-DEV #1697\n[ 69.261648] Tainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN\n[ 69.261650] RIP: 0010:idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf\n[ 69.261677] ? __warn (kernel/panic.c:242 kernel/panic.c:748)\n[ 69.261682] ? idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf\n[ 69.261687] ? report_bug (lib/bug.c:?)\n[ 69.261690] ? handle_bug (arch/x86/kernel/traps.c:285)\n[ 69.261694] ? exc_invalid_op (arch/x86/kernel/traps.c:309)\n[ 69.261697] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)\n[ 69.261700] ? __pfx_idpf_vport_splitq_napi_poll (drivers/net/ethernet/intel/idpf/idpf_txrx.c:4011) idpf\n[ 69.261704] ? idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf\n[ 69.261708] ? idpf_vport_splitq_napi_poll (drivers/net/ethernet/intel/idpf/idpf_txrx.c:3072) idpf\n[ 69.261712] __napi_poll (net/core/dev.c:7194)\n[ 69.261716] net_rx_action (net/core/dev.c:7265)\n[ 69.261718] ? __qdisc_run (net/sched/sch_generic.c:293)\n[ 69.261721] ? sched_clock (arch/x86/include/asm/preempt.h:84 arch/x86/kernel/tsc.c:288)\n[ 69.261726] handle_softirqs (kernel/softirq.c:561)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: idpf: correcci\u00f3n de las sumas de comprobaci\u00f3n establecidas en idpf_rx_rsc(). idpf_rx_rsc() utiliza skb_transport_offset(skb) cuando el encabezado de transporte a\u00fan no est\u00e1 establecido. Esto genera la siguiente advertencia para las compilaciones CONFIG_DEBUG_NET=y. DEBUG_NET_WARN_ON_ONCE(!skb_transport_header_was_set(skb)) [ 69.261620] ADVERTENCIA: CPU: 7 PID: 0 at ./include/linux/skbuff.h:3020 idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf [ 69.261629] Modules linked in: vfat fat dummy bridge intel_uncore_frequency_tpmi intel_uncore_frequency_common intel_vsec_tpmi idpf intel_vsec cdc_ncm cdc_eem cdc_ether usbnet mii xhci_pci xhci_hcd ehci_pci ehci_hcd libeth [ 69.261644] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Tainted: G S W 6.14.0-smp-DEV #1697 [ 69.261648] Tainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN [ 69.261650] RIP: 0010:idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf [ 69.261677] ? __warn (kernel/panic.c:242 kernel/panic.c:748) [ 69.261682] ? idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf [ 69.261687] ? report_bug (lib/bug.c:?) [ 69.261690] ? handle_bug (arch/x86/kernel/traps.c:285) [ 69.261694] ? exc_invalid_op (arch/x86/kernel/traps.c:309) [ 69.261697] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) [ 69.261700] ? __pfx_idpf_vport_splitq_napi_poll (drivers/net/ethernet/intel/idpf/idpf_txrx.c:4011) idpf [ 69.261704] ? idpf_vport_splitq_napi_poll (include/linux/skbuff.h:3020) idpf [ 69.261708] ? idpf_vport_splitq_napi_poll (drivers/net/ethernet/intel/idpf/idpf_txrx.c:3072) idpf [ 69.261712] __napi_poll (net/core/dev.c:7194) [ 69.261716] net_rx_action (net/core/dev.c:7265) [ 69.261718] ? __qdisc_run (net/sched/sch_generic.c:293) [ 69.261721] ? sched_clock (arch/x86/include/asm/preempt.h:84 arch/x86/kernel/tsc.c:288) [ 69.261726] handle_softirqs (kernel/softirq.c:561) " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21891.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21891.json index 150ee195419..baf4fe9693d 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21891.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21891.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: ensure network headers are in skb linear part\n\nsyzbot found that ipvlan_process_v6_outbound() was assuming\nthe IPv6 network header isis present in skb->head [1]\n\nAdd the needed pskb_network_may_pull() calls for both\nIPv4 and IPv6 handlers.\n\n[1]\nBUG: KMSAN: uninit-value in __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47\n __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47\n ipv6_addr_type include/net/ipv6.h:555 [inline]\n ip6_route_output_flags_noref net/ipv6/route.c:2616 [inline]\n ip6_route_output_flags+0x51/0x720 net/ipv6/route.c:2651\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ipvlan_route_v6_outbound+0x24e/0x520 drivers/net/ipvlan/ipvlan_core.c:476\n ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:491 [inline]\n ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:541 [inline]\n ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:605 [inline]\n ipvlan_queue_xmit+0xd72/0x1780 drivers/net/ipvlan/ipvlan_core.c:671\n ipvlan_start_xmit+0x5b/0x210 drivers/net/ipvlan/ipvlan_main.c:223\n __netdev_start_xmit include/linux/netdevice.h:5150 [inline]\n netdev_start_xmit include/linux/netdevice.h:5159 [inline]\n xmit_one net/core/dev.c:3735 [inline]\n dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3751\n sch_direct_xmit+0x399/0xd40 net/sched/sch_generic.c:343\n qdisc_restart net/sched/sch_generic.c:408 [inline]\n __qdisc_run+0x14da/0x35d0 net/sched/sch_generic.c:416\n qdisc_run+0x141/0x4d0 include/net/pkt_sched.h:127\n net_tx_action+0x78b/0x940 net/core/dev.c:5484\n handle_softirqs+0x1a0/0x7c0 kernel/softirq.c:561\n __do_softirq+0x14/0x1a kernel/softirq.c:595\n do_softirq+0x9a/0x100 kernel/softirq.c:462\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:389\n local_bh_enable include/linux/bottom_half.h:33 [inline]\n rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]\n __dev_queue_xmit+0x2758/0x57d0 net/core/dev.c:4611\n dev_queue_xmit include/linux/netdevice.h:3311 [inline]\n packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3132 [inline]\n packet_sendmsg+0x93e0/0xa7e0 net/packet/af_packet.c:3164\n sock_sendmsg_nosec net/socket.c:718 [inline]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvlan: garantizar que los encabezados de red est\u00e9n en la parte lineal de skb syzbot encontr\u00f3 que ipvlan_process_v6_outbound() asum\u00eda que el encabezado de red IPv6 est\u00e1 presente en skb->head [1] Agregue las llamadas pskb_network_may_pull() necesarias para los controladores IPv4 e IPv6. [1] ERROR: KMSAN: uninit-value in __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47 __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47 ipv6_addr_type include/net/ipv6.h:555 [inline] ip6_route_output_flags_noref net/ipv6/route.c:2616 [inline] ip6_route_output_flags+0x51/0x720 net/ipv6/route.c:2651 ip6_route_output include/net/ip6_route.h:93 [inline] ipvlan_route_v6_outbound+0x24e/0x520 drivers/net/ipvlan/ipvlan_core.c:476 ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:491 [inline] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:541 [inline] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:605 [inline] ipvlan_queue_xmit+0xd72/0x1780 drivers/net/ipvlan/ipvlan_core.c:671 ipvlan_start_xmit+0x5b/0x210 drivers/net/ipvlan/ipvlan_main.c:223 __netdev_start_xmit include/linux/netdevice.h:5150 [inline] netdev_start_xmit include/linux/netdevice.h:5159 [inline] xmit_one net/core/dev.c:3735 [inline] dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3751 sch_direct_xmit+0x399/0xd40 net/sched/sch_generic.c:343 qdisc_restart net/sched/sch_generic.c:408 [inline] __qdisc_run+0x14da/0x35d0 net/sched/sch_generic.c:416 qdisc_run+0x141/0x4d0 include/net/pkt_sched.h:127 net_tx_action+0x78b/0x940 net/core/dev.c:5484 handle_softirqs+0x1a0/0x7c0 kernel/softirq.c:561 __do_softirq+0x14/0x1a kernel/softirq.c:595 do_softirq+0x9a/0x100 kernel/softirq.c:462 __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0x2758/0x57d0 net/core/dev.c:4611 dev_queue_xmit include/linux/netdevice.h:3311 [inline] packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3132 [inline] packet_sendmsg+0x93e0/0xa7e0 net/packet/af_packet.c:3164 sock_sendmsg_nosec net/socket.c:718 [inline] " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21892.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21892.json index 6d05edfc5a5..f52ae3b4ef7 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21892.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21892.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix the recovery flow of the UMR QP\n\nThis patch addresses an issue in the recovery flow of the UMR QP,\nensuring tasks do not get stuck, as highlighted by the call trace [1].\n\nDuring recovery, before transitioning the QP to the RESET state, the\nsoftware must wait for all outstanding WRs to complete.\n\nFailing to do so can cause the firmware to skip sending some flushed\nCQEs with errors and simply discard them upon the RESET, as per the IB\nspecification.\n\nThis race condition can result in lost CQEs and tasks becoming stuck.\n\nTo resolve this, the patch sends a final WR which serves only as a\nbarrier before moving the QP state to RESET.\n\nOnce a CQE is received for that final WR, it guarantees that no\noutstanding WRs remain, making it safe to transition the QP to RESET and\nsubsequently back to RTS, restoring proper functionality.\n\nNote:\nFor the barrier WR, we simply reuse the failed and ready WR.\nSince the QP is in an error state, it will only receive\nIB_WC_WR_FLUSH_ERR. However, as it serves only as a barrier we don't\ncare about its status.\n\n[1]\nINFO: task rdma_resource_l:1922 blocked for more than 120 seconds.\nTainted: G W 6.12.0-rc7+ #1626\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:rdma_resource_l state:D stack:0 pid:1922 tgid:1922 ppid:1369\n flags:0x00004004\nCall Trace:\n\n__schedule+0x420/0xd30\nschedule+0x47/0x130\nschedule_timeout+0x280/0x300\n? mark_held_locks+0x48/0x80\n? lockdep_hardirqs_on_prepare+0xe5/0x1a0\nwait_for_completion+0x75/0x130\nmlx5r_umr_post_send_wait+0x3c2/0x5b0 [mlx5_ib]\n? __pfx_mlx5r_umr_done+0x10/0x10 [mlx5_ib]\nmlx5r_umr_revoke_mr+0x93/0xc0 [mlx5_ib]\n__mlx5_ib_dereg_mr+0x299/0x520 [mlx5_ib]\n? _raw_spin_unlock_irq+0x24/0x40\n? wait_for_completion+0xfe/0x130\n? rdma_restrack_put+0x63/0xe0 [ib_core]\nib_dereg_mr_user+0x5f/0x120 [ib_core]\n? lock_release+0xc6/0x280\ndestroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs]\nuverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs]\nuobj_destroy+0x3f/0x70 [ib_uverbs]\nib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs]\n? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs]\n? __lock_acquire+0x64e/0x2080\n? mark_held_locks+0x48/0x80\n? find_held_lock+0x2d/0xa0\n? lock_acquire+0xc1/0x2f0\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n? __fget_files+0xc3/0x1b0\nib_uverbs_ioctl+0xe7/0x170 [ib_uverbs]\n? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]\n__x64_sys_ioctl+0x1b0/0xa70\ndo_syscall_64+0x6b/0x140\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7f99c918b17b\nRSP: 002b:00007ffc766d0468 EFLAGS: 00000246 ORIG_RAX:\n 0000000000000010\nRAX: ffffffffffffffda RBX: 00007ffc766d0578 RCX:\n 00007f99c918b17b\nRDX: 00007ffc766d0560 RSI: 00000000c0181b01 RDI:\n 0000000000000003\nRBP: 00007ffc766d0540 R08: 00007f99c8f99010 R09:\n 000000000000bd7e\nR10: 00007f99c94c1c70 R11: 0000000000000246 R12:\n 00007ffc766d0530\nR13: 000000000000001c R14: 0000000040246a80 R15:\n 0000000000000000\n" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/mlx5: Arregla el flujo de recuperaci\u00f3n del QP UMR. Este parche soluciona un problema en el flujo de recuperaci\u00f3n del QP UMR, asegurando que las tareas no se atasquen, como se destaca en el seguimiento de llamadas [1]. Durante la recuperaci\u00f3n, antes de la transici\u00f3n del QP al estado RESET, el software debe esperar a que se completen todos los WR pendientes. De lo contrario, el firmware puede omitir el env\u00edo de algunos CQE vaciados con errores y simplemente descartarlos al RESET, seg\u00fan la especificaci\u00f3n IB. Esta condici\u00f3n de ejecuci\u00f3n puede resultar en la p\u00e9rdida de CQE y el atasque de las tareas. Para resolver esto, el parche env\u00eda un WR final que sirve solo como barrera antes de mover el estado del QP a RESET. Una vez que se recibe un CQE para ese WR final, se garantiza que no queden WR pendientes, lo que hace que sea seguro transicionar el QP a RESET y, posteriormente, volver a RTS, restaurando la funcionalidad adecuada. Nota: Para el WR de barrera, simplemente reutilizamos el WR fallido y listo. Dado que el QP se encuentra en estado de error, solo recibir\u00e1 IB_WC_WR_FLUSH_ERR. Sin embargo, dado que solo funciona como barrera, su estado no nos importa. [1] INFORMACI\u00d3N: La tarea rdma_resource_l:1922 se bloque\u00f3 durante m\u00e1s de 120 segundos. Contaminado: GW 6.12.0-rc7+ #1626 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" deshabilita este mensaje. tarea:rdma_resource_l estado:D pila:0 pid:1922 tgid:1922 ppid:1369 indicadores:0x00004004 Rastreo de llamadas: __schedule+0x420/0xd30 schedule+0x47/0x130 schedule_timeout+0x280/0x300 ? mark_held_locks+0x48/0x80 ? lockdep_hardirqs_on_prepare+0xe5/0x1a0 wait_for_completion+0x75/0x130 mlx5r_umr_post_send_wait+0x3c2/0x5b0 [mlx5_ib] ? __pfx_mlx5r_umr_done+0x10/0x10 [mlx5_ib] mlx5r_umr_revoke_mr+0x93/0xc0 [mlx5_ib] __mlx5_ib_dereg_mr+0x299/0x520 [mlx5_ib] ? _raw_spin_unlock_irq+0x24/0x40 ? wait_for_completion+0xfe/0x130 ? rdma_restrack_put+0x63/0xe0 [ib_core] ib_dereg_mr_user+0x5f/0x120 [ib_core] ? lock_release+0xc6/0x280 destroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs] uverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs] uobj_destroy+0x3f/0x70 [ib_uverbs] ib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs] ? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs] ? __lock_acquire+0x64e/0x2080 ? mark_held_locks+0x48/0x80 ? find_held_lock+0x2d/0xa0 ? lock_acquire+0xc1/0x2f0 ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] ? __fget_files+0xc3/0x1b0 ib_uverbs_ioctl+0xe7/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] __x64_sys_ioctl+0x1b0/0xa70 do_syscall_64+0x6b/0x140 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f99c918b17b RSP: 002b:00007ffc766d0468 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffc766d0578 RCX: 00007f99c918b17b RDX: 00007ffc766d0560 RSI: 00000000c0181b01 RDI: 0000000000000003 RBP: 00007ffc766d0540 R08: 00007f99c8f99010 R09: 000000000000bd7e R10: 00007f99c94c1c70 R11: 0000000000000246 R12: 00007ffc766d0530 R13: 000000000000001c R14: 0000000040246a80 R15: 0000000000000000 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21894.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21894.json index a2e7a048dee..8dc06fc68b0 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21894.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21894.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC\n\nActually ENETC VFs do not support HWTSTAMP_TX_ONESTEP_SYNC because only\nENETC PF can access PMa_SINGLE_STEP registers. And there will be a crash\nif VFs are used to test one-step timestamp, the crash log as follows.\n\n[ 129.110909] Unable to handle kernel paging request at virtual address 00000000000080c0\n[ 129.287769] Call trace:\n[ 129.290219] enetc_port_mac_wr+0x30/0xec (P)\n[ 129.294504] enetc_start_xmit+0xda4/0xe74\n[ 129.298525] enetc_xmit+0x70/0xec\n[ 129.301848] dev_hard_start_xmit+0x98/0x118" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: enetc: Las funciones virtuales no admiten HWTSTAMP_TX_ONESTEP_SYNC. En realidad, las funciones virtuales de ENETC no admiten HWTSTAMP_TX_ONESTEP_SYNC porque solo la funci\u00f3n de protecci\u00f3n de ENETC puede acceder a los registros PMa_SINGLE_STEP. Se producir\u00e1 un fallo si se utilizan funciones virtuales para probar la marca de tiempo de un paso. El registro de fallos es el siguiente. [ 129.110909] No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 00000000000080c0 [ 129.287769] Rastreo de llamadas: [ 129.290219] enetc_port_mac_wr+0x30/0xec (P) [ 129.294504] enetc_start_xmit+0xda4/0xe74 [ 129.298525] enetc_xmit+0x70/0xec [ 129.301848] dev_hard_start_xmit+0x98/0x118" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21895.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21895.json index 80a36c115a0..b4bc85639eb 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21895.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21895.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Order the PMU list to fix warning about unordered pmu_ctx_list\n\nSyskaller triggers a warning due to prev_epc->pmu != next_epc->pmu in\nperf_event_swap_task_ctx_data(). vmcore shows that two lists have the same\nperf_event_pmu_context, but not in the same order.\n\nThe problem is that the order of pmu_ctx_list for the parent is impacted by\nthe time when an event/PMU is added. While the order for a child is\nimpacted by the event order in the pinned_groups and flexible_groups. So\nthe order of pmu_ctx_list in the parent and child may be different.\n\nTo fix this problem, insert the perf_event_pmu_context to its proper place\nafter iteration of the pmu_ctx_list.\n\nThe follow testcase can trigger above warning:\n\n # perf record -e cycles --call-graph lbr -- taskset -c 3 ./a.out &\n # perf stat -e cpu-clock,cs -p xxx // xxx is the pid of a.out\n\n test.c\n\n void main() {\n int count = 0;\n pid_t pid;\n\n printf(\"%d running\\n\", getpid());\n sleep(30);\n printf(\"running\\n\");\n\n pid = fork();\n if (pid == -1) {\n printf(\"fork error\\n\");\n return;\n }\n if (pid == 0) {\n while (1) {\n count++;\n }\n } else {\n while (1) {\n count++;\n }\n }\n }\n\nThe testcase first opens an LBR event, so it will allocate task_ctx_data,\nand then open tracepoint and software events, so the parent context will\nhave 3 different perf_event_pmu_contexts. On inheritance, child ctx will\ninsert the perf_event_pmu_context in another order and the warning will\ntrigger.\n\n[ mingo: Tidied up the changelog. ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/core: Ordenar la lista de PMU para corregir la advertencia sobre pmu_ctx_list desordenada Syskaller activa una advertencia debido a prev_epc->pmu != next_epc->pmu en perf_event_swap_task_ctx_data(). vmcore muestra que dos listas tienen el mismo perf_event_pmu_context, pero no en el mismo orden. El problema es que el orden de pmu_ctx_list para el padre se ve afectado por el momento en que se agrega un evento/PMU. Mientras que el orden para un hijo se ve afectado por el orden de los eventos en pinned_groups y flexible_groups. Por lo tanto, el orden de pmu_ctx_list en el padre y el hijo puede ser diferente. Para corregir este problema, inserte perf_event_pmu_context en su lugar correcto despu\u00e9s de la iteraci\u00f3n de pmu_ctx_list. El siguiente caso de prueba puede activar la advertencia anterior: # perf record -e cycles --call-graph lbr -- tasket -c 3 ./a.out & # perf stat -e cpu-clock,cs -p xxx // xxx es el pid de a.out test.c void main() { int count = 0; pid_t pid; printf(\"%d en ejecuci\u00f3n\\n\", getpid()); sleep(30); printf(\"en ejecuci\u00f3n\\n\"); pid = fork(); if (pid == -1) { printf(\"fork error\\n\"); return; } if (pid == 0) { while (1) { count++; } } else { while (1) { count++; } } } El caso de prueba primero abre un evento LBR, por lo que asignar\u00e1 task_ctx_data y luego abrir\u00e1 los eventos de tracepoint y software, por lo que el contexto principal tendr\u00e1 3 perf_event_pmu_contexts diferentes. En caso de herencia, el ctx secundario insertar\u00e1 perf_event_pmu_context en otro orden y se activar\u00e1 la advertencia. [mingo: Se orden\u00f3 el registro de cambios.]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21896.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21896.json index 5ffa3b05d4c..b7e2b618aac 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21896.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21896.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: revert back to __readahead_folio() for readahead\n\nIn commit 3eab9d7bc2f4 (\"fuse: convert readahead to use folios\"), the\nlogic was converted to using the new folio readahead code, which drops\nthe reference on the folio once it is locked, using an inferred\nreference on the folio. Previously we held a reference on the folio for\nthe entire duration of the readpages call.\n\nThis is fine, however for the case for splice pipe responses where we\nwill remove the old folio and splice in the new folio (see\nfuse_try_move_page()), we assume that there is a reference held on the\nfolio for ap->folios, which is no longer the case.\n\nTo fix this, revert back to __readahead_folio() which allows us to hold\nthe reference on the folio for the duration of readpages until either we\ndrop the reference ourselves in fuse_readpages_end() or the reference is\ndropped after it's replaced in the page cache in the splice case.\nThis will fix the UAF bug that was reported." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fuse: volver a __readahead_folio() para readahead. En el commit 3eab9d7bc2f4 (\"fuse: convertir readahead para usar folios\"), la l\u00f3gica se convirti\u00f3 para usar el nuevo c\u00f3digo de readahead de folio, que elimina la referencia en el folio una vez bloqueado, usando una referencia inferida en el folio. Anteriormente, manten\u00edamos una referencia en el folio durante toda la duraci\u00f3n de la llamada a readpages. Esto es correcto, sin embargo, para el caso de las respuestas de la tuber\u00eda de empalme donde eliminaremos el folio antiguo y empalmaremos en el nuevo folio (ver fuse_try_move_page()), asumimos que hay una referencia mantenida en el folio para ap->folios, lo cual ya no es el caso. Para solucionar esto, vuelva a __readahead_folio(), que nos permite mantener la referencia en el folio durante la lectura de p\u00e1ginas hasta que la eliminemos nosotros mismos en fuse_readpages_end() o hasta que se elimine tras ser reemplazada en la cach\u00e9 de p\u00e1ginas en el caso de empalme. Esto solucionar\u00e1 el error de UAF reportado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21897.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21897.json index 956fb78d20d..ad7836d6b5a 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21897.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21897.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched_ext: Fix pick_task_scx() picking non-queued tasks when it's called without balance()\n\na6250aa251ea (\"sched_ext: Handle cases where pick_task_scx() is called\nwithout preceding balance_scx()\") added a workaround to handle the cases\nwhere pick_task_scx() is called without prececing balance_scx() which is due\nto a fair class bug where pick_taks_fair() may return NULL after a true\nreturn from balance_fair().\n\nThe workaround detects when pick_task_scx() is called without preceding\nbalance_scx() and emulates SCX_RQ_BAL_KEEP and triggers kicking to avoid\nstalling. Unfortunately, the workaround code was testing whether @prev was\non SCX to decide whether to keep the task running. This is incorrect as the\ntask may be on SCX but no longer runnable.\n\nThis could lead to a non-runnable task to be returned from pick_task_scx()\nwhich cause interesting confusions and failures. e.g. A common failure mode\nis the task ending up with (!on_rq && on_cpu) state which can cause\npotential wakers to busy loop, which can easily lead to deadlocks.\n\nFix it by testing whether @prev has SCX_TASK_QUEUED set. This makes\n@prev_on_scx only used in one place. Open code the usage and improve the\ncomment while at it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched_ext: Fix pick_task_scx() picking nonqueued task when it is called without balance() a6250aa251ea (\"sched_ext: Handle cases where pick_task_scx() is called without previous balance_scx()\") a\u00f1adi\u00f3 un workaround para gestionar los casos donde pick_task_scx() se llama sin preceder a balance_scx(), lo cual se debe a un error de clase fair donde pick_taks_fair() puede devolver NULL despu\u00e9s de un retorno verdadero de balance_fair(). El workaround detecta cu\u00e1ndo se llama a pick_task_scx() sin preceder a balance_scx() y emula SCX_RQ_BAL_KEEP y activa el kicking para evitar el estancamiento. Desafortunadamente, el c\u00f3digo del workaround estaba probando si @prev estaba en SCX para decidir si mantener la tarea en ejecuci\u00f3n. Esto es incorrecto ya que la tarea puede estar en SCX pero ya no se puede ejecutar. Esto podr\u00eda provocar que pick_task_scx() devuelva una tarea no ejecutable, lo que causa confusiones y fallos interesantes. Por ejemplo, un modo de fallo com\u00fan es que la tarea termine en el estado (!on_rq && on_cpu), lo que puede provocar que los posibles reactivadores entren en bucles de ocupaci\u00f3n, lo que puede f\u00e1cilmente provocar interbloqueos. Solucione esto comprobando si @prev tiene SCX_TASK_QUEUED definido. Esto hace que @prev_on_scx solo se use en un lugar. Abra el c\u00f3digo para su uso y mejore el comentario." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21898.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21898.json index e536a6ffcb7..68368827745 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21898.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21898.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:20.190", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Avoid potential division by zero in function_stat_show()\n\nCheck whether denominator expression x * (x - 1) * 1000 mod {2^32, 2^64}\nproduce zero and skip stddev computation in that case.\n\nFor now don't care about rec->counter * rec->counter overflow because\nrec->time * rec->time overflow will likely happen earlier." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ftrace: Evitar la posible divisi\u00f3n por cero en function_stat_show(). Comprueba si la expresi\u00f3n del denominador x * (x - 1) * 1000 mod {2^32, 2^64} produce cero y omite el c\u00e1lculo de la desviaci\u00f3n est\u00e1ndar en ese caso. Por ahora, no se debe preocupar el desbordamiento de rec->counter * rec->counter, ya que es probable que el desbordamiento de rec->time * rec->time ocurra antes." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21899.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21899.json index 087758075cb..62b7d64d495 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21899.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21899.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix bad hist from corrupting named_triggers list\n\nThe following commands causes a crash:\n\n ~# cd /sys/kernel/tracing/events/rcu/rcu_callback\n ~# echo 'hist:name=bad:keys=common_pid:onmax(bogus).save(common_pid)' > trigger\n bash: echo: write error: Invalid argument\n ~# echo 'hist:name=bad:keys=common_pid' > trigger\n\nBecause the following occurs:\n\nevent_trigger_write() {\n trigger_process_regex() {\n event_hist_trigger_parse() {\n\n data = event_trigger_alloc(..);\n\n event_trigger_register(.., data) {\n cmd_ops->reg(.., data, ..) [hist_register_trigger()] {\n data->ops->init() [event_hist_trigger_init()] {\n save_named_trigger(name, data) {\n list_add(&data->named_list, &named_triggers);\n }\n }\n }\n }\n\n ret = create_actions(); (return -EINVAL)\n if (ret)\n goto out_unreg;\n[..]\n ret = hist_trigger_enable(data, ...) {\n list_add_tail_rcu(&data->list, &file->triggers); <<<---- SKIPPED!!! (this is important!)\n[..]\n out_unreg:\n event_hist_unregister(.., data) {\n cmd_ops->unreg(.., data, ..) [hist_unregister_trigger()] {\n list_for_each_entry(iter, &file->triggers, list) {\n if (!hist_trigger_match(data, iter, named_data, false)) <- never matches\n continue;\n [..]\n test = iter;\n }\n if (test && test->ops->free) <<<-- test is NULL\n\n test->ops->free(test) [event_hist_trigger_free()] {\n [..]\n if (data->name)\n del_named_trigger(data) {\n list_del(&data->named_list); <<<<-- NEVER gets removed!\n }\n }\n }\n }\n\n [..]\n kfree(data); <<<-- frees item but it is still on list\n\nThe next time a hist with name is registered, it causes an u-a-f bug and\nthe kernel can crash.\n\nMove the code around such that if event_trigger_register() succeeds, the\nnext thing called is hist_trigger_enable() which adds it to the list.\n\nA bunch of actions is called if get_named_trigger_data() returns false.\nBut that doesn't need to be called after event_trigger_register(), so it\ncan be moved up, allowing event_trigger_register() to be called just\nbefore hist_trigger_enable() keeping them together and allowing the\nfile->triggers to be properly populated." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing: Fix bad hist from corrupting named_triggers list Los siguientes comandos provocan un bloqueo: ~# cd /sys/kernel/tracing/events/rcu/rcu_callback ~# echo 'hist:name=bad:keys=common_pid:onmax(bogus).save(common_pid)' > trigger bash: echo: error de escritura: argumento no v\u00e1lido ~# echo 'hist:name=bad:keys=common_pid' > trigger Porque ocurre lo siguiente: event_trigger_write() { trigger_process_regex() { event_hist_trigger_parse() { data = event_trigger_alloc(..); event_trigger_register(.., data) { cmd_ops->reg(.., data, ..) [hist_register_trigger()] { data->ops->init() [event_hist_trigger_init()] { save_named_trigger(name, data) { list_add(&data->named_list, &named_triggers); } } } } ret = create_actions(); (return -EINVAL) if (ret) goto out_unreg; [..] ret = hist_trigger_enable(data, ...) { list_add_tail_rcu(&data->list, &file->triggers); <<<---- \u00a1\u00a1\u00a1SALTAR!!! (\u00a1esto es importante!) [..] out_unreg: event_hist_unregister(.., data) { cmd_ops->unreg(.., data, ..) [hist_unregister_trigger()] { list_for_each_entry(iter, &file->triggers, list) { if (!hist_trigger_match(data, iter, named_data, false)) <- never matches continue; [..] test = iter; } if (test && test->ops->free) <<<-- test is NULL test->ops->free(test) [event_hist_trigger_free()] { [..] if (data->name) del_named_trigger(data) { list_del(&data->named_list); <<<<-- \u00a1NUNCA se elimina! } } } } [..] kfree(datos); <<<-- libera el elemento, pero sigue en la lista. La pr\u00f3xima vez que se registre un hist con nombre, se producir\u00e1 un error de uaf y el kernel podr\u00eda bloquearse. Desplace el c\u00f3digo de forma que, si event_trigger_register() tiene \u00e9xito, se llame a hist_trigger_enable(), lo que lo a\u00f1ade a la lista. Se invocan varias acciones si get_named_trigger_data() devuelve falso. Sin embargo, no es necesario llamarlo despu\u00e9s de event_trigger_register(), por lo que se puede adelantar, lo que permite llamar a event_trigger_register() justo antes de hist_trigger_enable(), manteni\u00e9ndolos juntos y permitiendo que los disparadores de archivo se rellenen correctamente." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21900.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21900.json index ebddea1c2b9..f8064e073de 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21900.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21900.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:20.440", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix a deadlock when recovering state on a sillyrenamed file\n\nIf the file is sillyrenamed, and slated for delete on close, it is\npossible for a server reboot to triggeer an open reclaim, with can again\nrace with the application call to close(). When that happens, the call\nto put_nfs_open_context() can trigger a synchronous delegreturn call\nwhich deadlocks because it is not marked as privileged.\n\nInstead, ensure that the call to nfs4_inode_return_delegation_on_close()\ncatches the delegreturn, and schedules it asynchronously." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSv4: Se corrige un bloqueo al recuperar el estado de un archivo con un nombre sillyrenombrado. Si el archivo tiene un nombre sillyrenombrado y se programa para eliminarse al cerrarse, es posible que un reinicio del servidor active una recuperaci\u00f3n abierta, que puede competir con la llamada de la aplicaci\u00f3n a close(). En este caso, la llamada a put_nfs_open_context() puede activar una llamada delegreturn s\u00edncrona que se bloquea al no estar marcada como privilegiada. En su lugar, aseg\u00farese de que la llamada a nfs4_inode_return_delegation_on_close() capture la devoluci\u00f3n delegreturn y la programe de forma as\u00edncrona." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21901.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21901.json index dfb9bb22355..37615cee5d2 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21901.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21901.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:20.547", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Add sanity checks on rdev validity\n\nThere is a possibility that ulp_irq_stop and ulp_irq_start\ncallbacks will be called when the device is in detached state.\nThis can cause a crash due to NULL pointer dereference as\nthe rdev is already freed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Se han a\u00f1adido comprobaciones de seguridad sobre la validez de rdev. Existe la posibilidad de que se invoquen las devoluciones de llamada ulp_irq_stop y ulp_irq_start cuando el dispositivo est\u00e9 en estado desconectado. Esto puede provocar un bloqueo debido a la desreferencia de punteros nulos, ya que rdev ya est\u00e1 liberado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21902.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21902.json index 91d0ad2f882..ba77add4ae0 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21902.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nacpi: typec: ucsi: Introduce a ->poll_cci method\n\nFor the ACPI backend of UCSI the UCSI \"registers\" are just a memory copy\nof the register values in an opregion. The ACPI implementation in the\nBIOS ensures that the opregion contents are synced to the embedded\ncontroller and it ensures that the registers (in particular CCI) are\nsynced back to the opregion on notifications. While there is an ACPI call\nthat syncs the actual registers to the opregion there is rarely a need to\ndo this and on some ACPI implementations it actually breaks in various\ninteresting ways.\n\nThe only reason to force a sync from the embedded controller is to poll\nCCI while notifications are disabled. Only the ucsi core knows if this\nis the case and guessing based on the current command is suboptimal, i.e.\nleading to the following spurious assertion splat:\n\nWARNING: CPU: 3 PID: 76 at drivers/usb/typec/ucsi/ucsi.c:1388 ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi]\nCPU: 3 UID: 0 PID: 76 Comm: kworker/3:0 Not tainted 6.12.11-200.fc41.x86_64 #1\nHardware name: LENOVO 21D0/LNVNB161216, BIOS J6CN45WW 03/17/2023\nWorkqueue: events_long ucsi_init_work [typec_ucsi]\nRIP: 0010:ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi]\nCall Trace:\n \n ucsi_init_work+0x3c/0xac0 [typec_ucsi]\n process_one_work+0x179/0x330\n worker_thread+0x252/0x390\n kthread+0xd2/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n \n\nThus introduce a ->poll_cci() method that works like ->read_cci() with an\nadditional forced sync and document that this should be used when polling\nwith notifications disabled. For all other backends that presumably don't\nhave this issue use the same implementation for both methods." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: acpi: typec: ucsi: Introducir un m\u00e9todo ->poll_cci. Para el backend ACPI de UCSI, los \"registros\" UCSI son simplemente una copia en memoria de los valores de registro en una regi\u00f3n operativa. La implementaci\u00f3n de ACPI en la BIOS garantiza que el contenido de la regi\u00f3n operativa se sincronice con el controlador integrado y que los registros (en particular, CCI) se sincronicen con la regi\u00f3n operativa en las notificaciones. Si bien existe una llamada ACPI que sincroniza los registros con la regi\u00f3n operativa, rara vez es necesario hacerlo y, en algunas implementaciones de ACPI, falla de diversas maneras interesantes. La \u00fanica raz\u00f3n para forzar una sincronizaci\u00f3n desde el controlador integrado es sondear CCI mientras las notificaciones est\u00e1n deshabilitadas. Solo el n\u00facleo ucsi sabe si este es el caso y las suposiciones basadas en el comando actual no son \u00f3ptimas, es decir, conducen al siguiente mensaje de afirmaci\u00f3n falsa: ADVERTENCIA: CPU: 3 PID: 76 en drivers/usb/typec/ucsi/ucsi.c:1388 ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi] CPU: 3 UID: 0 PID: 76 Comm: kworker/3:0 No contaminado 6.12.11-200.fc41.x86_64 #1 Nombre del hardware: LENOVO 21D0/LNVNB161216, BIOS J6CN45WW 17/03/2023 Cola de trabajo: events_long ucsi_init_work [typec_ucsi] RIP: 0010:ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi] Seguimiento de llamadas: ucsi_init_work+0x3c/0xac0 [typec_ucsi] process_one_work+0x179/0x330 workers_thread+0x252/0x390 kthread+0xd2/0x100 ret_from_fork+0x34/0x50 ret_from_fork_asm+0x1a/0x30 Por lo tanto, introduzca un m\u00e9todo ->poll_cci() que funcione como ->read_cci() con una sincronizaci\u00f3n forzada adicional y documente que debe usarse al sondear con las notificaciones deshabilitadas. Para todos los dem\u00e1s backends que presumiblemente no presenten este problema, utilice la misma implementaci\u00f3n para ambos m\u00e9todos." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21903.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21903.json index f50ea51aac8..57ade9d841e 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21903.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21903.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmctp i3c: handle NULL header address\n\ndaddr can be NULL if there is no neighbour table entry present,\nin that case the tx packet should be dropped.\n\nsaddr will usually be set by MCTP core, but check for NULL in case a\npacket is transmitted by a different protocol." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mctp i3c: gestiona direcci\u00f3n de encabezado NULL. daddr puede ser NULL si no hay ninguna entrada presente en la tabla de vecinos, en ese caso el paquete tx debe descartarse. saddr generalmente ser\u00e1 configurado por el n\u00facleo MCTP, pero verifica si es NULL en caso de que un paquete sea transmitido por un protocolo diferente." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21904.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21904.json index 7442da94608..29be47736ff 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21904.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21904.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:20.857", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncaif_virtio: fix wrong pointer check in cfv_probe()\n\ndel_vqs() frees virtqueues, therefore cfv->vq_tx pointer should be checked\nfor NULL before calling it, not cfv->vdev. Also the current implementation\nis redundant because the pointer cfv->vdev is dereferenced before it is\nchecked for NULL.\n\nFix this by checking cfv->vq_tx for NULL instead of cfv->vdev before\ncalling del_vqs()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: caif_virtio: se corrige una comprobaci\u00f3n incorrecta del puntero en cfv_probe() del_vqs() libera colas virtuales. Por lo tanto, se debe comprobar si el puntero cfv->vq_tx es nulo antes de llamarlo, no cfv->vdev. Adem\u00e1s, la implementaci\u00f3n actual es redundante porque se desreferencia el puntero cfv->vdev antes de comprobar si es nulo. Para solucionar esto, compruebe si el puntero cfv->vq_tx es nulo en lugar de cfv->vdev antes de llamar a del_vqs()." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21905.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21905.json index bcb85440824..36b4d558d96 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21905.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21905.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:20.980", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: limit printed string from FW file\n\nThere's no guarantee here that the file is always with a\nNUL-termination, so reading the string may read beyond the\nend of the TLV. If that's the last TLV in the file, it can\nperhaps even read beyond the end of the file buffer.\n\nFix that by limiting the print format to the size of the\nbuffer we have." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: limitar la cadena impresa del archivo FW. No se garantiza que el archivo siempre tenga una terminaci\u00f3n NUL, por lo que al leer la cadena, se podr\u00eda leer m\u00e1s all\u00e1 del final del TLV. Si ese es el \u00faltimo TLV del archivo, es posible que incluso pueda leer m\u00e1s all\u00e1 del final del b\u00fafer del archivo. Para solucionar esto, limite el formato de impresi\u00f3n al tama\u00f1o del b\u00fafer disponible." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21906.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21906.json index 3fa228133ee..68d195d5c99 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21906.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21906.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: clean up ROC on failure\n\nIf the firmware fails to start the session protection, then we\ndo call iwl_mvm_roc_finished() here, but that won't do anything\nat all because IWL_MVM_STATUS_ROC_P2P_RUNNING was never set.\nSet IWL_MVM_STATUS_ROC_P2P_RUNNING in the failure/stop path.\nIf it started successfully before, it's already set, so that\ndoesn't matter, and if it didn't start it needs to be set to\nclean up.\n\nNot doing so will lead to a WARN_ON() later on a fresh remain-\non-channel, since the link is already active when activated as\nit was never deactivated." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: clean up ROC on fault () Si el firmware no inicia la protecci\u00f3n de sesi\u00f3n, entonces llamamos a iwl_mvm_roc_finished() aqu\u00ed, pero eso no har\u00e1 nada en absoluto porque IWL_MVM_STATUS_ROC_P2P_RUNNING nunca se configur\u00f3. Establezca IWL_MVM_STATUS_ROC_P2P_RUNNING en la ruta de error/detenci\u00f3n. Si se inici\u00f3 correctamente antes, ya est\u00e1 configurado, por lo que no importa, y si no se inici\u00f3, debe configurarse para limpiar. No hacerlo conducir\u00e1 a un WARN_ON() m\u00e1s tarde en un nuevo canal restante, ya que el enlace ya est\u00e1 activo cuando se activ\u00f3, ya que nunca se desactiv\u00f3." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21907.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21907.json index c741858812e..a52b8a35d04 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21907.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21907.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio. However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*(). For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n Modules linked in:\n CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42\n Tainted: [W]=WARN\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : try_to_unmap_one+0x8fc/0xd3c\n lr : try_to_unmap_one+0x3dc/0xd3c\n Call trace:\n try_to_unmap_one+0x8fc/0xd3c (P)\n try_to_unmap_one+0x3dc/0xd3c (L)\n rmap_walk_anon+0xdc/0x1f8\n rmap_walk+0x3c/0x58\n try_to_unmap+0x88/0x90\n unmap_poisoned_folio+0x30/0xa8\n do_migrate_range+0x4a0/0x568\n offline_pages+0x5a4/0x670\n memory_block_action+0x17c/0x374\n memory_subsys_offline+0x3c/0x78\n device_offline+0xa4/0xd0\n state_store+0x8c/0xf0\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x44/0x54\n kernfs_fop_write_iter+0x118/0x1a8\n vfs_write+0x3a8/0x4bc\n ksys_write+0x6c/0xf8\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0xc8/0xcc\n el0t_64_sync+0x198/0x19c\n ---[ end trace 0000000000000000 ]---\n\n[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping', per Miaohe]\n Link: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: fallo de memoria: actualizaci\u00f3n del indicador ttu dentro de unmap_poisoned_folio. Serie de parches \"mm: fallo de memoria: desasignar correctamente un folio envenenado durante la migraci\u00f3n\", v3. Se corrigen dos errores durante la migraci\u00f3n de folios si este est\u00e1 envenenado. Este parche (de 3): El commit 6da6b1d4a7df (\"mm/hwpoison: convertir TTU_IGNORE_HWPOISON en TTU_HWPOISON\") introduce TTU_HWPOISON en lugar de TTU_IGNORE_HWPOISON para detener el env\u00edo de la se\u00f1al SIGBUS al acceder a una p\u00e1gina con error tras un error de memoria en un folio limpio. Sin embargo, durante la migraci\u00f3n de p\u00e1ginas, anon folio debe configurarse con TTU_HWPOISON durante unmap_*(). Para la cach\u00e9 de p\u00e1ginas, necesitamos una pol\u00edtica similar a la de hwpoison_user_mappings para configurar este indicador. Por lo tanto, mueva esta pol\u00edtica de hwpoison_user_mappings a unmap_poisoned_folio para gestionar esta advertencia correctamente. Se producir\u00e1 una advertencia durante el envenenamiento de folio de unamp con el siguiente registro: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 1 PID: 365 en mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c M\u00f3dulos vinculados: CPU: 1 UID: 0 PID: 365 Comm: bash Contaminado: GW 6.13.0-rc1-00018-gacdb4bbda7ab #42 Contaminado: [W]=WARN Nombre del hardware: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : try_to_unmap_one+0x8fc/0xd3c lr : try_to_unmap_one+0x3dc/0xd3c Rastreo de llamadas: try_to_unmap_one+0x8fc/0xd3c (P) try_to_unmap_one+0x3dc/0xd3c (L) rmap_walk_anon+0xdc/0x1f8 rmap_walk+0x3c/0x58 try_to_unmap+0x88/0x90 unmap_poisoned_folio+0x30/0xa8 do_migrate_range+0x4a0/0x568 offline_pages+0x5a4/0x670 memory_block_action+0x17c/0x374 memory_subsys_offline+0x3c/0x78 device_offline+0xa4/0xd0 state_store+0x8c/0xf0 dev_attr_store+0x18/0x2c sysfs_kf_write+0x44/0x54 kernfs_fop_write_iter+0x118/0x1a8 vfs_write+0x3a8/0x4bc ksys_write+0x6c/0xf8 __arm64_sys_write+0x1c/0x28 invoke_syscall+0x44/0x100 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x30/0xd0 el0t_64_sync_handler+0xc8/0xcc el0t_64_sync+0x198/0x19c ---[fin de seguimiento 0000000000000000 ]--- [mawupeng1@huawei.com: unmap_poisoned_folio(): eliminar el 'mapeo' local sombreado, seg\u00fan Miaohe] Enlace: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21908.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21908.json index b494407e892..2d2f6e02639 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21908.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21908.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:21.323", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: fix nfs_release_folio() to not deadlock via kcompactd writeback\n\nAdd PF_KCOMPACTD flag and current_is_kcompactd() helper to check for it so\nnfs_release_folio() can skip calling nfs_wb_folio() from kcompactd.\n\nOtherwise NFS can deadlock waiting for kcompactd enduced writeback which\nrecurses back to NFS (which triggers writeback to NFSD via NFS loopback\nmount on the same host, NFSD blocks waiting for XFS's call to\n__filemap_get_folio):\n\n6070.550357] INFO: task kcompactd0:58 blocked for more than 4435 seconds.\n\n{---\n[58] \"kcompactd0\"\n[<0>] folio_wait_bit+0xe8/0x200\n[<0>] folio_wait_writeback+0x2b/0x80\n[<0>] nfs_wb_folio+0x80/0x1b0 [nfs]\n[<0>] nfs_release_folio+0x68/0x130 [nfs]\n[<0>] split_huge_page_to_list_to_order+0x362/0x840\n[<0>] migrate_pages_batch+0x43d/0xb90\n[<0>] migrate_pages_sync+0x9a/0x240\n[<0>] migrate_pages+0x93c/0x9f0\n[<0>] compact_zone+0x8e2/0x1030\n[<0>] compact_node+0xdb/0x120\n[<0>] kcompactd+0x121/0x2e0\n[<0>] kthread+0xcf/0x100\n[<0>] ret_from_fork+0x31/0x40\n[<0>] ret_from_fork_asm+0x1a/0x30\n---}\n\n[akpm@linux-foundation.org: fix build]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFS: se corrige que nfs_release_folio() no se bloquee mediante la reescritura de kcompactd. Se a\u00f1ade el indicador PF_KCOMPACTD y el asistente current_is_kcompactd() para comprobarlo, de modo que nfs_release_folio() pueda omitir la llamada a nfs_wb_folio() desde kcompactd. De lo contrario, NFS puede bloquearse a la espera de la reescritura inducida por kcompactd, que recurre a NFS (lo que activa la reescritura en NFSD mediante el montaje de bucle invertido de NFS en el mismo host; NFSD se bloquea a la espera de la llamada de XFS a __filemap_get_folio): 6070.550357] INFORMACI\u00d3N: la tarea kcompactd0:58 ha estado bloqueada durante m\u00e1s de 4435 segundos. {--- [58] \"kcompactd0\" [<0>] folio_wait_bit+0xe8/0x200 [<0>] folio_wait_writeback+0x2b/0x80 [<0>] nfs_wb_folio+0x80/0x1b0 [nfs] [<0>] nfs_release_folio+0x68/0x130 [nfs] [<0>] split_huge_page_to_list_to_order+0x362/0x840 [<0>] migrate_pages_batch+0x43d/0xb90 [<0>] migrate_pages_sync+0x9a/0x240 [<0>] migrate_pages+0x93c/0x9f0 [<0>] compact_zone+0x8e2/0x1030 [<0>] compact_node+0xdb/0x120 [<0>] kcompactd+0x121/0x2e0 [<0>] kthread+0xcf/0x100 [<0>] ret_from_fork+0x31/0x40 [<0>] ret_from_fork_asm+0x1a/0x30 ---} [akpm@linux-foundation.org: correcci\u00f3n de compilaci\u00f3n]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21909.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21909.json index aa3ba694e7f..ccde54244e6 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21909.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21909.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject cooked mode if it is set along with other flags\n\nIt is possible to set both MONITOR_FLAG_COOK_FRAMES and MONITOR_FLAG_ACTIVE\nflags simultaneously on the same monitor interface from the userspace. This\ncauses a sub-interface to be created with no IEEE80211_SDATA_IN_DRIVER bit\nset because the monitor interface is in the cooked state and it takes\nprecedence over all other states. When the interface is then being deleted\nthe kernel calls WARN_ONCE() from check_sdata_in_driver() because of missing\nthat bit.\n\nFix this by rejecting MONITOR_FLAG_COOK_FRAMES if it is set along with\nother flags.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: nl80211: rechaza el modo cocinado si se configura junto con otras banderas. Es posible configurar simult\u00e1neamente las banderas MONITOR_FLAG_COOK_FRAMES y MONITOR_FLAG_ACTIVE en la misma interfaz de monitor desde el espacio de usuario. Esto provoca que se cree una subinterfaz sin el bit IEEE80211_SDATA_IN_DRIVER configurado, ya que la interfaz de monitor est\u00e1 en estado cocinado y tiene prioridad sobre todos los dem\u00e1s estados. Al eliminar la interfaz, el kernel llama a WARN_ONCE() desde check_sdata_in_driver() debido a la falta de ese bit. Solucione esto rechazando MONITOR_FLAG_COOK_FRAMES si se configura junto con otras banderas. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21910.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21910.json index f26bfa2a5b5..94a3c086013 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21910.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: regulatory: improve invalid hints checking\n\nSyzbot keeps reporting an issue [1] that occurs when erroneous symbols\nsent from userspace get through into user_alpha2[] via\nregulatory_hint_user() call. Such invalid regulatory hints should be\nrejected.\n\nWhile a sanity check from commit 47caf685a685 (\"cfg80211: regulatory:\nreject invalid hints\") looks to be enough to deter these very cases,\nthere is a way to get around it due to 2 reasons.\n\n1) The way isalpha() works, symbols other than latin lower and\nupper letters may be used to determine a country/domain.\nFor instance, greek letters will also be considered upper/lower\nletters and for such characters isalpha() will return true as well.\nHowever, ISO-3166-1 alpha2 codes should only hold latin\ncharacters.\n\n2) While processing a user regulatory request, between\nreg_process_hint_user() and regulatory_hint_user() there happens to\nbe a call to queue_regulatory_request() which modifies letters in\nrequest->alpha2[] with toupper(). This works fine for latin symbols,\nless so for weird letter characters from the second part of _ctype[].\n\nSyzbot triggers a warning in is_user_regdom_saved() by first sending\nover an unexpected non-latin letter that gets malformed by toupper()\ninto a character that ends up failing isalpha() check.\n\nPrevent this by enhancing is_an_alpha2() to ensure that incoming\nsymbols are latin letters and nothing else.\n\n[1] Syzbot report:\n------------[ cut here ]------------\nUnexpected user alpha2: A\ufffd\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 is_user_regdom_saved net/wireless/reg.c:440 [inline]\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 restore_alpha2 net/wireless/reg.c:3424 [inline]\nWARNING: CPU: 1 PID: 964 at net/wireless/reg.c:442 restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516\nModules linked in:\nCPU: 1 UID: 0 PID: 964 Comm: kworker/1:2 Not tainted 6.12.0-rc5-syzkaller-00044-gc1e939a21eb1 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: events_power_efficient crda_timeout_work\nRIP: 0010:is_user_regdom_saved net/wireless/reg.c:440 [inline]\nRIP: 0010:restore_alpha2 net/wireless/reg.c:3424 [inline]\nRIP: 0010:restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516\n...\nCall Trace:\n \n crda_timeout_work+0x27/0x50 net/wireless/reg.c:542\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f2/0x390 kernel/kthread.c:389\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: regulatory: improve invalid hints checking Syzbot sigue reportando un problema [1] que ocurre cuando s\u00edmbolos err\u00f3neos enviados desde el espacio de usuario se introducen en user_alpha2[] mediante la llamada regulatory_hint_user(). Estas sugerencias regulatorias inv\u00e1lidas deben rechazarse. Si bien una comprobaci\u00f3n de seguridad del commit 47caf685a685 (\"cfg80211: regulatory: reject invalid hints\") parece ser suficiente para evitar estos casos, existe una forma de evitarla por dos razones: 1) El funcionamiento de isalpha() permite usar s\u00edmbolos distintos de las letras latinas may\u00fasculas y min\u00fasculas para determinar un pa\u00eds o dominio. Por ejemplo, las letras griegas tambi\u00e9n se considerar\u00e1n may\u00fasculas y min\u00fasculas, y para estos caracteres isalpha() tambi\u00e9n devolver\u00e1 verdadero. Sin embargo, los c\u00f3digos ISO-3166-1 alpha2 solo deben contener caracteres latinos. 2) Al procesar una solicitud regulatoria de usuario, entre reg_process_hint_user() y regulatory_hint_user() se produce una llamada a queue_regulatory_request() que modifica las letras en request->alpha2[] con toupper(). Esto funciona correctamente con s\u00edmbolos latinos, pero no tanto con caracteres de letras extra\u00f1as de la segunda parte de _ctype[]. Syzbot genera una advertencia en is_user_regdom_saved() al enviar primero una letra no latina inesperada que toupper() malforma en un car\u00e1cter que falla la comprobaci\u00f3n de isalpha(). Para evitar esto, mejore is_an_alpha2() para garantizar que los s\u00edmbolos entrantes sean \u00fanicamente letras latinas. [1] Informe de Syzbot: ------------[ cortar aqu\u00ed ]------------ Usuario inesperado alpha2: A? ADVERTENCIA: CPU: 1 PID: 964 en net/wireless/reg.c:442 is_user_regdom_saved net/wireless/reg.c:440 [en l\u00ednea] ADVERTENCIA: CPU: 1 PID: 964 en net/wireless/reg.c:442 restore_alpha2 net/wireless/reg.c:3424 [en l\u00ednea] ADVERTENCIA: CPU: 1 PID: 964 en net/wireless/reg.c:442 restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516 M\u00f3dulos vinculados: CPU: 1 UID: 0 PID: 964 Comm: kworker/1:2 No contaminado 6.12.0-rc5-syzkaller-00044-gc1e939a21eb1 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: events_power_efficient crda_timeout_work RIP: 0010:is_user_regdom_saved net/wireless/reg.c:440 [en l\u00ednea] RIP: 0010:restore_alpha2 net/wireless/reg.c:3424 [en l\u00ednea] RIP: 0010:restore_regulatory_settings+0x3c0/0x1e50 net/wireless/reg.c:3516 ... Rastreo de llamadas: crda_timeout_work+0x27/0x50 net/wireless/reg.c:542 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21911.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21911.json index e15d62feb38..bbf78dd18fc 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21911.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21911.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:21.677", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imagination: avoid deadlock on fence release\n\nDo scheduler queue fence release processing on a workqueue, rather\nthan in the release function itself.\n\nFixes deadlock issues such as the following:\n\n[ 607.400437] ============================================\n[ 607.405755] WARNING: possible recursive locking detected\n[ 607.415500] --------------------------------------------\n[ 607.420817] weston:zfq0/24149 is trying to acquire lock:\n[ 607.426131] ffff000017d041a0 (reservation_ww_class_mutex){+.+.}-{3:3}, at: pvr_gem_object_vunmap+0x40/0xc0 [powervr]\n[ 607.436728]\n but task is already holding lock:\n[ 607.442554] ffff000017d105a0 (reservation_ww_class_mutex){+.+.}-{3:3}, at: dma_buf_ioctl+0x250/0x554\n[ 607.451727]\n other info that might help us debug this:\n[ 607.458245] Possible unsafe locking scenario:\n\n[ 607.464155] CPU0\n[ 607.466601] ----\n[ 607.469044] lock(reservation_ww_class_mutex);\n[ 607.473584] lock(reservation_ww_class_mutex);\n[ 607.478114]\n *** DEADLOCK ***" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/imagination: evitar el bloqueo en la liberaci\u00f3n de cercas El programador pone en cola el procesamiento de liberaci\u00f3n de cercas en una cola de trabajo, en lugar de en la funci\u00f3n de liberaci\u00f3n en s\u00ed. Corrige problemas de bloqueo como los siguientes: [ 607.400437] =============================================== [ 607.405755] ADVERTENCIA: posible bloqueo recursivo detectado [ 607.415500] -------------------------------------------- [ 607.420817] weston:zfq0/24149 est\u00e1 intentando adquirir el bloqueo: [ 607.426131] ffff000017d041a0 (reservation_ww_class_mutex){+.+.}-{3:3}, en: pvr_gem_object_vunmap+0x40/0xc0 [powervr] [ 607.436728] pero la tarea ya mantiene el bloqueo: [ 607.442554] ffff000017d105a0 (reservation_ww_class_mutex){+.+.}-{3:3}, en: dma_buf_ioctl+0x250/0x554 [ 607.451727] otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: [ 607.458245] Posible escenario de bloqueo inseguro: [ 607.464155] CPU0 [ 607.466601] ---- [ 607.469044] lock(reservation_ww_class_mutex); [ 607.473584] lock(reservation_ww_class_mutex); [ 607.478114] *** BLOQUEO INTERMEDIO ***" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21912.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21912.json index f6e0eb8f7b0..28294157f2a 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21912.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21912.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:21.780", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: rcar: Use raw_spinlock to protect register access\n\nUse raw_spinlock in order to fix spurious messages about invalid context\nwhen spinlock debugging is enabled. The lock is only used to serialize\nregister access.\n\n [ 4.239592] =============================\n [ 4.239595] [ BUG: Invalid wait context ]\n [ 4.239599] 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 Not tainted\n [ 4.239603] -----------------------------\n [ 4.239606] kworker/u8:5/76 is trying to lock:\n [ 4.239609] ffff0000091898a0 (&p->lock){....}-{3:3}, at: gpio_rcar_config_interrupt_input_mode+0x34/0x164\n [ 4.239641] other info that might help us debug this:\n [ 4.239643] context-{5:5}\n [ 4.239646] 5 locks held by kworker/u8:5/76:\n [ 4.239651] #0: ffff0000080fb148 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x190/0x62c\n [ 4.250180] OF: /soc/sound@ec500000/ports/port@0/endpoint: Read of boolean property 'frame-master' with a value.\n [ 4.254094] #1: ffff80008299bd80 ((work_completion)(&entry->work)){+.+.}-{0:0}, at: process_one_work+0x1b8/0x62c\n [ 4.254109] #2: ffff00000920c8f8\n [ 4.258345] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'bitclock-master' with a value.\n [ 4.264803] (&dev->mutex){....}-{4:4}, at: __device_attach_async_helper+0x3c/0xdc\n [ 4.264820] #3: ffff00000a50ca40 (request_class#2){+.+.}-{4:4}, at: __setup_irq+0xa0/0x690\n [ 4.264840] #4:\n [ 4.268872] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'frame-master' with a value.\n [ 4.273275] ffff00000a50c8c8 (lock_class){....}-{2:2}, at: __setup_irq+0xc4/0x690\n [ 4.296130] renesas_sdhi_internal_dmac ee100000.mmc: mmc1 base at 0x00000000ee100000, max clock rate 200 MHz\n [ 4.304082] stack backtrace:\n [ 4.304086] CPU: 1 UID: 0 PID: 76 Comm: kworker/u8:5 Not tainted 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35\n [ 4.304092] Hardware name: Renesas Salvator-X 2nd version board based on r8a77965 (DT)\n [ 4.304097] Workqueue: async async_run_entry_fn\n [ 4.304106] Call trace:\n [ 4.304110] show_stack+0x14/0x20 (C)\n [ 4.304122] dump_stack_lvl+0x6c/0x90\n [ 4.304131] dump_stack+0x14/0x1c\n [ 4.304138] __lock_acquire+0xdfc/0x1584\n [ 4.426274] lock_acquire+0x1c4/0x33c\n [ 4.429942] _raw_spin_lock_irqsave+0x5c/0x80\n [ 4.434307] gpio_rcar_config_interrupt_input_mode+0x34/0x164\n [ 4.440061] gpio_rcar_irq_set_type+0xd4/0xd8\n [ 4.444422] __irq_set_trigger+0x5c/0x178\n [ 4.448435] __setup_irq+0x2e4/0x690\n [ 4.452012] request_threaded_irq+0xc4/0x190\n [ 4.456285] devm_request_threaded_irq+0x7c/0xf4\n [ 4.459398] ata1: link resume succeeded after 1 retries\n [ 4.460902] mmc_gpiod_request_cd_irq+0x68/0xe0\n [ 4.470660] mmc_start_host+0x50/0xac\n [ 4.474327] mmc_add_host+0x80/0xe4\n [ 4.477817] tmio_mmc_host_probe+0x2b0/0x440\n [ 4.482094] renesas_sdhi_probe+0x488/0x6f4\n [ 4.486281] renesas_sdhi_internal_dmac_probe+0x60/0x78\n [ 4.491509] platform_probe+0x64/0xd8\n [ 4.495178] really_probe+0xb8/0x2a8\n [ 4.498756] __driver_probe_device+0x74/0x118\n [ 4.503116] driver_probe_device+0x3c/0x154\n [ 4.507303] __device_attach_driver+0xd4/0x160\n [ 4.511750] bus_for_each_drv+0x84/0xe0\n [ 4.515588] __device_attach_async_helper+0xb0/0xdc\n [ 4.520470] async_run_entry_fn+0x30/0xd8\n [ 4.524481] process_one_work+0x210/0x62c\n [ 4.528494] worker_thread+0x1ac/0x340\n [ 4.532245] kthread+0x10c/0x110\n [ 4.535476] ret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: rcar: Usar raw_spinlock para proteger el acceso a los registros. Usar raw_spinlock para corregir mensajes falsos sobre contexto no v\u00e1lido cuando la depuraci\u00f3n de spinlock est\u00e1 habilitada. El bloqueo solo se usa para serializar el acceso a los registros. [ 4.239592] =============================== [ 4.239595] [ ERROR: Contexto de espera no v\u00e1lido ] [ 4.239599] 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 No contaminado [ 4.239603] ----------------------------- [ 4.239606] kworker/u8:5/76 est\u00e1 intentando bloquear: [ 4.239609] ffff0000091898a0 (&p->lock){....}-{3:3}, en: gpio_rcar_config_interrupt_input_mode+0x34/0x164 [ 4.239641] otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: [ 4.239643] context-{5:5} [ 4.239646] 5 bloqueos mantenidos por kworker/u8:5/76: [ 4.239651] #0: ffff0000080fb148 ((wq_completion)async){+.+.}-{0:0}, en: process_one_work+0x190/0x62c [ 4.250180] OF: /soc/sound@ec500000/ports/port@0/endpoint: Lectura de la propiedad booleana 'frame-master' con un valor. [ 4.254094] #1: ffff80008299bd80 ((work_completion)(&entry->work)){+.+.}-{0:0}, en: process_one_work+0x1b8/0x62c [ 4.254109] #2: ffff00000920c8f8 [ 4.258345] DE: /soc/sound@ec500000/ports/port@1/endpoint: Lectura de la propiedad booleana 'bitclock-master' con un valor. [ 4.264803] (&dev->mutex){....}-{4:4}, en: __device_attach_async_helper+0x3c/0xdc [ 4.264820] #3: ffff00000a50ca40 (request_class#2){+.+.}-{4:4}, en: __setup_irq+0xa0/0x690 [ 4.264840] #4: [ 4.268872] DE: /soc/sound@ec500000/ports/port@1/endpoint: Lectura de la propiedad booleana 'frame-master' con un valor. [ 4.273275] ffff00000a50c8c8 (lock_class){....}-{2:2}, en: __setup_irq+0xc4/0x690 [ 4.296130] renesas_sdhi_internal_dmac ee100000.mmc: base mmc1 en 0x00000000ee100000, velocidad de reloj m\u00e1xima 200 MHz [ 4.304082] seguimiento de pila: [ 4.304086] CPU: 1 UID: 0 PID: 76 Comm: kworker/u8:5 No contaminado 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 [ 4.304092] Nombre del hardware: Renesas Placa Salvator-X (2.\u00aa versi\u00f3n) basada en r8a77965 (DT) [4.304097] Cola de trabajo: async async_run_entry_fn [4.304106] Rastreo de llamadas: [4.304110] show_stack+0x14/0x20 (C) [4.304122] dump_stack_lvl+0x6c/0x90 [4.304131] dump_stack+0x14/0x1c [4.304138] __lock_acquire+0xdfc/0x1584 [4.426274] lock_acquire+0x1c4/0x33c [4.429942] _raw_spin_lock_irqsave+0x5c/0x80 [4.434307] gpio_rcar_config_interrupt_input_mode+0x34/0x164 [ 4.440061] gpio_rcar_irq_set_type+0xd4/0xd8 [ 4.444422] __irq_set_trigger+0x5c/0x178 [ 4.448435] __setup_irq+0x2e4/0x690 [ 4.452012] request_threaded_irq+0xc4/0x190 [ 4.456285] devm_request_threaded_irq+0x7c/0xf4 [ 4.459398] ata1: reanudaci\u00f3n del enlace exitosa despu\u00e9s de 1 reintento [ 4.460902] mmc_gpiod_request_cd_irq+0x68/0xe0 [ 4.470660] mmc_start_host+0x50/0xac [ 4.474327] mmc_add_host+0x80/0xe4 [ 4.477817] tmio_mmc_host_probe+0x2b0/0x440 [ 4.482094] renesas_sdhi_probe+0x488/0x6f4 [ 4.486281] renesas_sdhi_internal_dmac_probe+0x60/0x78 [ 4.491509] platform_probe+0x64/0xd8 [ 4.495178] really_probe+0xb8/0x2a8 [ 4.498756] __driver_probe_device+0x74/0x118 [ 4.503116] driver_probe_device+0x3c/0x154 [ 4.507303] __device_attach_driver+0xd4/0x160 [ 4.511750] bus_para_cada_unidad+0x84/0xe0 [ 4.515588] __device_attach_async_helper+0xb0/0xdc [ 4.520470] async_run_entry_fn+0x30/0xd8 [ 4.524481] process_one_work+0x210/0x62c [ 4.528494] work_thread+0x1ac/0x340 [ 4.532245] kthread+0x10c/0x110 [ 4.535476] ret_de_la_bifurcaci\u00f3n+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21913.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21913.json index 4b35a59deaa..849389b4a2b 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21913.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21913.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()\n\nXen doesn't offer MSR_FAM10H_MMIO_CONF_BASE to all guests. This results\nin the following warning:\n\n unchecked MSR access error: RDMSR from 0xc0010058 at rIP: 0xffffffff8101d19f (xen_do_read_msr+0x7f/0xa0)\n Call Trace:\n xen_read_msr+0x1e/0x30\n amd_get_mmconfig_range+0x2b/0x80\n quirk_amd_mmconfig_area+0x28/0x100\n pnp_fixup_device+0x39/0x50\n __pnp_add_device+0xf/0x150\n pnp_add_device+0x3d/0x100\n pnpacpi_add_device_handler+0x1f9/0x280\n acpi_ns_get_device_callback+0x104/0x1c0\n acpi_ns_walk_namespace+0x1d0/0x260\n acpi_get_devices+0x8a/0xb0\n pnpacpi_init+0x50/0x80\n do_one_initcall+0x46/0x2e0\n kernel_init_freeable+0x1da/0x2f0\n kernel_init+0x16/0x1b0\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1b/0x30\n\nbased on quirks for a \"PNP0c01\" device. Treating MMCFG as disabled is the\nright course of action, so no change is needed there.\n\nThis was most likely exposed by fixing the Xen MSR accessors to not be\nsilently-safe." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/amd_nb: Utilice rdmsr_safe() en amd_get_mmconfig_range() Xen no ofrece MSR_FAM10H_MMIO_CONF_BASE a todos los invitados. Esto genera la siguiente advertencia: error de acceso a MSR sin marcar: RDMSR desde 0xc0010058 en rIP: 0xffffffff8101d19f (xen_do_read_msr+0x7f/0xa0) Seguimiento de llamadas: xen_read_msr+0x1e/0x30 amd_get_mmconfig_range+0x2b/0x80 quirk_amd_mmconfig_area+0x28/0x100 pnp_fixup_device+0x39/0x50 __pnp_add_device+0xf/0x150 pnp_add_device+0x3d/0x100 pnpacpi_add_device_handler+0x1f9/0x280 acpi_ns_get_device_callback+0x104/0x1c0 acpi_ns_walk_namespace+0x1d0/0x260 acpi_get_devices+0x8a/0xb0 pnpacpi_init+0x50/0x80 do_one_initcall+0x46/0x2e0 kernel_init_freeable+0x1da/0x2f0 kernel_init+0x16/0x1b0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 basado en peculiaridades de un dispositivo \"PNP0c01\". Considerar MMCFG como deshabilitado es la acci\u00f3n correcta, por lo que no es necesario realizar ning\u00fan cambio. Esto probablemente se expuso al corregir los accesores MSR de Xen para que no fueran silenciosamente seguros." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21914.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21914.json index a3d02edac02..c4d73d5c1e5 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21914.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21914.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: messaging: Free transaction ID in delayed interrupt scenario\n\nIn case of interrupt delay for any reason, slim_do_transfer()\nreturns timeout error but the transaction ID (TID) is not freed.\nThis results into invalid memory access inside\nqcom_slim_ngd_rx_msgq_cb() due to invalid TID.\n\nFix the issue by freeing the TID in slim_do_transfer() before\nreturning timeout error to avoid invalid memory access.\n\nCall trace:\n__memcpy_fromio+0x20/0x190\nqcom_slim_ngd_rx_msgq_cb+0x130/0x290 [slim_qcom_ngd_ctrl]\nvchan_complete+0x2a0/0x4a0\ntasklet_action_common+0x274/0x700\ntasklet_action+0x28/0x3c\n_stext+0x188/0x620\nrun_ksoftirqd+0x34/0x74\nsmpboot_thread_fn+0x1d8/0x464\nkthread+0x178/0x238\nret_from_fork+0x10/0x20\nCode: aa0003e8 91000429 f100044a 3940002b (3800150b)\n---[ end trace 0fe00bec2b975c99 ]---\nKernel panic - not syncing: Oops: Fatal exception in interrupt." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: slimbus: mensajer\u00eda: ID de transacci\u00f3n libre en un escenario de interrupci\u00f3n retrasada. En caso de retraso en la interrupci\u00f3n por cualquier motivo, slim_do_transfer() devuelve un error de tiempo de espera, pero el ID de transacci\u00f3n (TID) no se libera. Esto provoca un acceso no v\u00e1lido a memoria dentro de qcom_slim_ngd_rx_msgq_cb() debido a un TID no v\u00e1lido. Para solucionar el problema, libere el TID en slim_do_transfer() antes de devolver el error de tiempo de espera para evitar accesos no v\u00e1lidos a memoria. Rastreo de llamadas: __memcpy_fromio+0x20/0x190 qcom_slim_ngd_rx_msgq_cb+0x130/0x290 [slim_qcom_ngd_ctrl] vchan_complete+0x2a0/0x4a0 tasklet_action_common+0x274/0x700 tasklet_action+0x28/0x3c _stext+0x188/0x620 run_ksoftirqd+0x34/0x74 smpboot_thread_fn+0x1d8/0x464 kthread+0x178/0x238 ret_from_fork+0x10/0x20 C\u00f3digo: aa0003e8 91000429 f100044a 3940002b (3800150b) ---[ fin de seguimiento 0fe00bec2b975c99 ]--- P\u00e1nico del kernel - no sincroniza: Ups: Excepci\u00f3n fatal en la interrupci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21915.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21915.json index 4f59b562ded..2246784861f 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21915.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21915.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:22.117", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncdx: Fix possible UAF error in driver_override_show()\n\nFixed a possible UAF problem in driver_override_show() in drivers/cdx/cdx.c\n\nThis function driver_override_show() is part of DEVICE_ATTR_RW, which\nincludes both driver_override_show() and driver_override_store().\nThese functions can be executed concurrently in sysfs.\n\nThe driver_override_store() function uses driver_set_override() to\nupdate the driver_override value, and driver_set_override() internally\nlocks the device (device_lock(dev)). If driver_override_show() reads\ncdx_dev->driver_override without locking, it could potentially access\na freed pointer if driver_override_store() frees the string\nconcurrently. This could lead to printing a kernel address, which is a\nsecurity risk since DEVICE_ATTR can be read by all users.\n\nAdditionally, a similar pattern is used in drivers/amba/bus.c, as well\nas many other bus drivers, where device_lock() is taken in the show\nfunction, and it has been working without issues.\n\nThis potential bug was detected by our experimental static analysis\ntool, which analyzes locking APIs and paired functions to identify\ndata races and atomicity violations." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cdx: Se corrige un posible error de UAF en driver_override_show() Se corrigi\u00f3 un posible problema de UAF en driver_override_show() en drivers/cdx/cdx.c Esta funci\u00f3n driver_override_show() es parte de DEVICE_ATTR_RW, que incluye tanto driver_override_show() como driver_override_store(). Estas funciones se pueden ejecutar simult\u00e1neamente en sysfs. La funci\u00f3n driver_override_store() usa driver_set_override() para actualizar el valor de driver_override, y driver_set_override() bloquea internamente el dispositivo (device_lock(dev)). Si driver_override_show() lee cdx_dev->driver_override sin bloquear, podr\u00eda acceder potencialmente a un puntero liberado si driver_override_store() libera la cadena simult\u00e1neamente. Esto podr\u00eda llevar a imprimir una direcci\u00f3n del kernel, lo cual es un riesgo de seguridad ya que DEVICE_ATTR puede ser le\u00eddo por todos los usuarios. Adem\u00e1s, se utiliza un patr\u00f3n similar en drivers/amba/bus.c, as\u00ed como en muchos otros controladores de bus, donde device_lock() se utiliza en la funci\u00f3n show y ha funcionado sin problemas. Este posible error fue detectado por nuestra herramienta experimental de an\u00e1lisis est\u00e1tico, que analiza las API de bloqueo y las funciones emparejadas para identificar carreras de datos y violaciones de atomicidad." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21916.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21916.json index 02ba8de7773..64b607030ba 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21916.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21916.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix a flaw in existing endpoint checks\n\nSyzbot once again identified a flaw in usb endpoint checking, see [1].\nThis time the issue stems from a commit authored by me (2eabb655a968\n(\"usb: atm: cxacru: fix endpoint checking in cxacru_bind()\")).\n\nWhile using usb_find_common_endpoints() may usually be enough to\ndiscard devices with wrong endpoints, in this case one needs more\nthan just finding and identifying the sufficient number of endpoints\nof correct types - one needs to check the endpoint's address as well.\n\nSince cxacru_bind() fills URBs with CXACRU_EP_CMD address in mind,\nswitch the endpoint verification approach to usb_check_XXX_endpoints()\ninstead to fix incomplete ep testing.\n\n[1] Syzbot report:\nusb 5-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 1378 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nRIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \n cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649\n cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline]\n cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223\n usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058\n cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377\n usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396\n really_probe+0x2b9/0xad0 drivers/base/dd.c:658\n __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800\n driver_probe_device+0x50/0x430 drivers/base/dd.c:830\n..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: atm: cxacru: corrige un fallo en las comprobaciones de endpoints existentes Syzbot volvi\u00f3 a identificar un fallo en la comprobaci\u00f3n de endpoints USB, consulte [1]. Esta vez, el problema se debe a una confirmaci\u00f3n de mi autor\u00eda (2eabb655a968 (\"usb: atm: cxacru: fix endpoint checking in cxacru_bind()\")). Si bien usar usb_find_common_endpoints() suele ser suficiente para descartar dispositivos con endpoints err\u00f3neos, en este caso se necesita m\u00e1s que simplemente encontrar e identificar la cantidad suficiente de endpoints de los tipos correctos: tambi\u00e9n se necesita comprobar la direcci\u00f3n del endpoint. Dado que cxacru_bind() rellena las URB teniendo en cuenta la direcci\u00f3n CXACRU_EP_CMD, cambie el enfoque de verificaci\u00f3n de endpoints a usb_check_XXX_endpoints() para corregir las pruebas de EP incompletas. [1] Informe de Syzbot: usb 5-1: transferencia de urb FALSA, canal 3 != tipo 1 ADVERTENCIA: CPU: 0 PID: 1378 en drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503 ... RIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503 ... Seguimiento de llamadas cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649 cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline] cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223 usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058 cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377 usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396 really_probe+0x2b9/0xad0 drivers/base/dd.c:658 __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800 driver_probe_device+0x50/0x430 drivers/base/dd.c:830 ... " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21921.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21921.json index eee9ec75a30..91a3a5cf78e 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21921.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21921.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethtool: netlink: Allow NULL nlattrs when getting a phy_device\n\nethnl_req_get_phydev() is used to lookup a phy_device, in the case an\nethtool netlink command targets a specific phydev within a netdev's\ntopology.\n\nIt takes as a parameter a const struct nlattr *header that's used for\nerror handling :\n\n if (!phydev) {\n NL_SET_ERR_MSG_ATTR(extack, header,\n \"no phy matching phyindex\");\n return ERR_PTR(-ENODEV);\n }\n\nIn the notify path after a ->set operation however, there's no request\nattributes available.\n\nThe typical callsite for the above function looks like:\n\n\tphydev = ethnl_req_get_phydev(req_base, tb[ETHTOOL_A_XXX_HEADER],\n\t\t\t\t info->extack);\n\nSo, when tb is NULL (such as in the ethnl notify path), we have a nice\ncrash.\n\nIt turns out that there's only the PLCA command that is in that case, as\nthe other phydev-specific commands don't have a notification.\n\nThis commit fixes the crash by passing the cmd index and the nlattr\narray separately, allowing NULL-checking it directly inside the helper." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethtool: netlink: Permite nlattrs nulos al obtener un phy_device. ethnl_req_get_phydev() se usa para buscar un phy_device si el comando netlink de ethtool apunta a un phydev espec\u00edfico dentro de la topolog\u00eda de un netdev. Toma como par\u00e1metro una constante struct nlattr *header que se usa para la gesti\u00f3n de errores: if (!phydev) { NL_SET_ERR_MSG_ATTR(extack, header, \"no phy matches phyindex\"); return ERR_PTR(-ENODEV); } Sin embargo, en la ruta de notificaci\u00f3n despu\u00e9s de una operaci\u00f3n ->set, no hay atributos de solicitud disponibles. El sitio de llamada t\u00edpico para la funci\u00f3n anterior se ve as\u00ed: phydev = ethnl_req_get_phydev(req_base, tb[ETHTOOL_A_XXX_HEADER], info->extack); Por lo tanto, cuando tb es nulo (como en la ruta de notificaci\u00f3n de ethnl), se produce un fallo. Resulta que solo el comando PLCA se encuentra en ese caso, ya que los dem\u00e1s comandos espec\u00edficos de phydev no tienen notificaci\u00f3n. Esta confirmaci\u00f3n corrige el fallo pasando el \u00edndice cmd y la matriz nlattr por separado, lo que permite comprobar su estado nulo directamente dentro del asistente." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21924.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21924.json index 8da134db2cb..aed0cb2d0f4 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21924.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21924.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error\n\nDuring the initialization of ptp, hclge_ptp_get_cycle might return an error\nand returned directly without unregister clock and free it. To avoid that,\ncall hclge_ptp_destroy_clock to unregist and free clock if\nhclge_ptp_get_cycle failed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: Aseg\u00farese de que el reloj ptp se anule y libere si hclge_ptp_get_cycle devuelve un error. Durante la inicializaci\u00f3n de ptp, hclge_ptp_get_cycle podr\u00eda devolver un error y regresar directamente sin anular el registro ni liberarlo. Para evitarlo, llame a hclge_ptp_destroy_clock para anular el registro y liberar el reloj si hclge_ptp_get_cycle falla." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21925.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21925.json index 5318e0b678f..6ca7d7b6c7a 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21925.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21925.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: do not use skb_get() before dev_queue_xmit()\n\nsyzbot is able to crash hosts [1], using llc and devices\nnot supporting IFF_TX_SKB_SHARING.\n\nIn this case, e1000 driver calls eth_skb_pad(), while\nthe skb is shared.\n\nSimply replace skb_get() by skb_clone() in net/llc/llc_s_ac.c\n\nNote that e1000 driver might have an issue with pktgen,\nbecause it does not clear IFF_TX_SKB_SHARING, this is an\northogonal change.\n\nWe need to audit other skb_get() uses in net/llc.\n\n[1]\n\nkernel BUG at net/core/skbuff.c:2178 !\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 16371 Comm: syz.2.2764 Not tainted 6.14.0-rc4-syzkaller-00052-gac9c34d1e45a #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n RIP: 0010:pskb_expand_head+0x6ce/0x1240 net/core/skbuff.c:2178\nCall Trace:\n \n __skb_pad+0x18a/0x610 net/core/skbuff.c:2466\n __skb_put_padto include/linux/skbuff.h:3843 [inline]\n skb_put_padto include/linux/skbuff.h:3862 [inline]\n eth_skb_pad include/linux/etherdevice.h:656 [inline]\n e1000_xmit_frame+0x2d99/0x5800 drivers/net/ethernet/intel/e1000/e1000_main.c:3128\n __netdev_start_xmit include/linux/netdevice.h:5151 [inline]\n netdev_start_xmit include/linux/netdevice.h:5160 [inline]\n xmit_one net/core/dev.c:3806 [inline]\n dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3822\n sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343\n __dev_xmit_skb net/core/dev.c:4045 [inline]\n __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4621\n dev_queue_xmit include/linux/netdevice.h:3313 [inline]\n llc_sap_action_send_test_c+0x268/0x320 net/llc/llc_s_ac.c:144\n llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]\n llc_sap_next_state net/llc/llc_sap.c:182 [inline]\n llc_sap_state_process+0x239/0x510 net/llc/llc_sap.c:209\n llc_ui_sendmsg+0xd0d/0x14e0 net/llc/af_llc.c:993\n sock_sendmsg_nosec net/socket.c:718 [inline]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: llc: no usar skb_get() antes de dev_queue_xmit(). syzbot puede bloquear hosts [1], usando llc y dispositivos que no admiten IFF_TX_SKB_SHARING. En este caso, el controlador e1000 llama a eth_skb_pad() mientras el skb est\u00e1 compartido. Simplemente reemplace skb_get() por skb_clone() en net/llc/llc_s_ac.c. Tenga en cuenta que el controlador e1000 podr\u00eda tener un problema con pktgen, ya que no borra IFF_TX_SKB_SHARING; este es un cambio ortogonal. Necesitamos auditar otros usos de skb_get() en net/llc. [1] \u00a1ERROR del kernel en net/core/skbuff.c:2178! Oops: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 16371 Comm: syz.2.2764 No contaminado 6.14.0-rc4-syzkaller-00052-gac9c34d1e45a #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 01/04/2014 RIP: 0010:pskb_expand_head+0x6ce/0x1240 net/core/skbuff.c:2178 Rastreo de llamadas: __skb_pad+0x18a/0x610 net/core/skbuff.c:2466 __skb_put_padto include/linux/skbuff.h:3843 [en l\u00ednea] skb_put_padto include/linux/skbuff.h:3862 [en l\u00ednea] eth_skb_pad include/linux/etherdevice.h:656 [en l\u00ednea] e1000_xmit_frame+0x2d99/0x5800 drivers/net/ethernet/intel/e1000/e1000_main.c:3128 __netdev_start_xmit include/linux/netdevice.h:5151 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:5160 [en l\u00ednea] xmit_one net/core/dev.c:3806 [en l\u00ednea] dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3822 sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:4045 [en l\u00ednea] __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4621 dev_queue_xmit include/linux/netdevice.h:3313 [en l\u00ednea] llc_sap_action_send_test_c+0x268/0x320 net/llc/llc_s_ac.c:144 llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [en l\u00ednea] llc_sap_next_state net/llc/llc_sap.c:182 [en l\u00ednea] llc_sap_state_process+0x239/0x510 net/llc/llc_sap.c:209 llc_ui_sendmsg+0xd0d/0x14e0 net/llc/af_llc.c:993 sock_sendmsg_nosec net/socket.c:718 [en l\u00ednea]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21926.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21926.json index f0af544ca9a..0ccf31a84c4 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21926.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21926.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gso: fix ownership in __udp_gso_segment\n\nIn __udp_gso_segment the skb destructor is removed before segmenting the\nskb but the socket reference is kept as-is. This is an issue if the\noriginal skb is later orphaned as we can hit the following bug:\n\n kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan)\n RIP: 0010:ip_rcv_core+0x8b2/0xca0\n Call Trace:\n ip_rcv+0xab/0x6e0\n __netif_receive_skb_one_core+0x168/0x1b0\n process_backlog+0x384/0x1100\n __napi_poll.constprop.0+0xa1/0x370\n net_rx_action+0x925/0xe50\n\nThe above can happen following a sequence of events when using\nOpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an\nOVS_ACTION_ATTR_OUTPUT action:\n\n1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb\n goes through queue_gso_packets and then __udp_gso_segment, where its\n destructor is removed.\n2. The segments' data are copied and sent to userspace.\n3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the\n same original skb is sent to its path.\n4. If it later hits skb_orphan, we hit the bug.\n\nFix this by also removing the reference to the socket in\n__udp_gso_segment." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: gso: correcci\u00f3n de propiedad en __udp_gso_segment. En __udp_gso_segment, el destructor de skb se elimina antes de segmentar el skb, pero la referencia del socket se mantiene intacta. Esto supone un problema si el skb original queda hu\u00e9rfano posteriormente, ya que podemos encontrarnos con el siguiente error: \u00a1ERROR del kernel en ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Rastreo de llamadas: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 Lo anterior puede suceder despu\u00e9s de una secuencia de eventos al usar OpenVSwitch, cuando una acci\u00f3n OVS_ACTION_ATTR_USERSPACE precede a una acci\u00f3n OVS_ACTION_ATTR_OUTPUT: 1. Se maneja OVS_ACTION_ATTR_USERSPACE (en do_execute_actions): el skb pasa por queue_gso_packets y luego __udp_gso_segment, donde se elimina su destructor. 2. Los datos de los segmentos se copian y se env\u00edan al espacio de usuario. 3. Se gestiona OVS_ACTION_ATTR_OUTPUT (en do_execute_actions) y se env\u00eda el mismo skb original a su ruta. 4. Si posteriormente se encuentra con skb_orphan, se detecta el error. Para solucionarlo, elimine tambi\u00e9n la referencia al socket en __udp_gso_segment." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21931.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21931.json index 8bcf6957b9b..498bb3ae2c5 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21931.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21931.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio\n\nCommit b15c87263a69 (\"hwpoison, memory_hotplug: allow hwpoisoned pages to\nbe offlined) add page poison checks in do_migrate_range in order to make\noffline hwpoisoned page possible by introducing isolate_lru_page and\ntry_to_unmap for hwpoisoned page. However folio lock must be held before\ncalling try_to_unmap. Add it to fix this problem.\n\nWarning will be produced if folio is not locked during unmap:\n\n ------------[ cut here ]------------\n kernel BUG at ./include/linux/swapops.h:400!\n Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n Modules linked in:\n CPU: 4 UID: 0 PID: 411 Comm: bash Tainted: G W 6.13.0-rc1-00016-g3c434c7ee82a-dirty #41\n Tainted: [W]=WARN\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : try_to_unmap_one+0xb08/0xd3c\n lr : try_to_unmap_one+0x3dc/0xd3c\n Call trace:\n try_to_unmap_one+0xb08/0xd3c (P)\n try_to_unmap_one+0x3dc/0xd3c (L)\n rmap_walk_anon+0xdc/0x1f8\n rmap_walk+0x3c/0x58\n try_to_unmap+0x88/0x90\n unmap_poisoned_folio+0x30/0xa8\n do_migrate_range+0x4a0/0x568\n offline_pages+0x5a4/0x670\n memory_block_action+0x17c/0x374\n memory_subsys_offline+0x3c/0x78\n device_offline+0xa4/0xd0\n state_store+0x8c/0xf0\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x44/0x54\n kernfs_fop_write_iter+0x118/0x1a8\n vfs_write+0x3a8/0x4bc\n ksys_write+0x6c/0xf8\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0xc8/0xcc\n el0t_64_sync+0x198/0x19c\n Code: f9407be0 b5fff320 d4210000 17ffff97 (d4210000)\n ---[ end trace 0000000000000000 ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwpoison, memory_hotplug: bloquear folio antes de desasignar folio hwpoisoned Commit b15c87263a69 (\"hwpoison, memory_hotplug: permitir que las p\u00e1ginas hwpoisoned se desconecten\") a\u00f1adir comprobaciones de envenenamiento de p\u00e1gina en do_migrate_range para posibilitar la desconexi\u00f3n de la p\u00e1gina hwpoisoned mediante la introducci\u00f3n de insulation_lru_page y try_to_unmap para la p\u00e1gina hwpoisoned. Sin embargo, el bloqueo de folio debe mantenerse antes de llamar a try_to_unmap. A\u00f1adir esto para solucionar este problema. Se producir\u00e1 una advertencia si el folio no se bloquea durante la desasignaci\u00f3n: ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en ./include/linux/swapops.h:400! Error interno: Oops - ERROR: 00000000f2000800 [#1] PREEMPT M\u00f3dulos SMP vinculados en: CPU: 4 UID: 0 PID: 411 Comm: bash Contaminado: GW 6.13.0-rc1-00016-g3c434c7ee82a-dirty #41 Contaminado: [W]=WARN Nombre del hardware: QEMU M\u00e1quina virtual QEMU, BIOS 0.0.0 02/06/2015 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : try_to_unmap_one+0xb08/0xd3c lr : try_to_unmap_one+0x3dc/0xd3c Rastreo de llamadas: try_to_unmap_one+0xb08/0xd3c (P) try_to_unmap_one+0x3dc/0xd3c (L) rmap_walk_anon+0xdc/0x1f8 rmap_walk+0x3c/0x58 try_to_unmap+0x88/0x90 unmap_poisoned_folio+0x30/0xa8 do_migrate_range+0x4a0/0x568 offline_pages+0x5a4/0x670 memory_block_action+0x17c/0x374 memory_subsys_offline+0x3c/0x78 device_offline+0xa4/0xd0 state_store+0x8c/0xf0 dev_attr_store+0x18/0x2c sysfs_kf_write+0x44/0x54 kernfs_fop_write_iter+0x118/0x1a8 vfs_write+0x3a8/0x4bc ksys_write+0x6c/0xf8 __arm64_sys_write+0x1c/0x28 invocar_llamada_al_sistema+0x44/0x100 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x30/0xd0 el0t_64_sync_handler+0xc8/0xcc el0t_64_sync+0x198/0x19c C\u00f3digo: f9407be0 b5fff320 d4210000 17ffff97 (d4210000) ---[ fin de seguimiento 0000000000000000 ]---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21932.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21932.json index ccd32aa3357..cd3c05ca8dd 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21932.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21932.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: abort vma_modify() on merge out of memory failure\n\nThe remainder of vma_modify() relies upon the vmg state remaining pristine\nafter a merge attempt.\n\nUsually this is the case, however in the one edge case scenario of a merge\nattempt failing not due to the specified range being unmergeable, but\nrather due to an out of memory error arising when attempting to commit the\nmerge, this assumption becomes untrue.\n\nThis results in vmg->start, end being modified, and thus the proceeding\nattempts to split the VMA will be done with invalid start/end values.\n\nThankfully, it is likely practically impossible for us to hit this in\nreality, as it would require a maple tree node pre-allocation failure that\nwould likely never happen due to it being 'too small to fail', i.e. the\nkernel would simply keep retrying reclaim until it succeeded.\n\nHowever, this scenario remains theoretically possible, and what we are\ndoing here is wrong so we must correct it.\n\nThe safest option is, when this scenario occurs, to simply give up the\noperation. If we cannot allocate memory to merge, then we cannot allocate\nmemory to split either (perhaps moreso!).\n\nAny scenario where this would be happening would be under very extreme\n(likely fatal) memory pressure, so it's best we give up early.\n\nSo there is no doubt it is appropriate to simply bail out in this\nscenario.\n\nHowever, in general we must if at all possible never assume VMG state is\nstable after a merge attempt, since merge operations update VMG fields. \nAs a result, additionally also make this clear by storing start, end in\nlocal variables.\n\nThe issue was reported originally by syzkaller, and by Brad Spengler (via\nan off-list discussion), and in both instances it manifested as a\ntriggering of the assert:\n\n\tVM_WARN_ON_VMG(start >= end, vmg);\n\nIn vma_merge_existing_range().\n\nIt seems at least one scenario in which this is occurring is one in which\nthe merge being attempted is due to an madvise() across multiple VMAs\nwhich looks like this:\n\n start end\n |<------>|\n |----------|------|\n | vma | next |\n |----------|------|\n\nWhen madvise_walk_vmas() is invoked, we first find vma in the above\n(determining prev to be equal to vma as we are offset into vma), and then\nenter the loop.\n\nWe determine the end of vma that forms part of the range we are\nmadvise()'ing by setting 'tmp' to this value:\n\n\t\t/* Here vma->vm_start <= start < (end|vma->vm_end) */\n\t\ttmp = vma->vm_end;\n\nWe then invoke the madvise() operation via visit(), letting prev get\nupdated to point to vma as part of the operation:\n\n\t\t/* Here vma->vm_start <= start < tmp <= (end|vma->vm_end). */\n\t\terror = visit(vma, &prev, start, tmp, arg);\n\nWhere the visit() function pointer in this instance is\nmadvise_vma_behavior().\n\nAs observed in syzkaller reports, it is ultimately madvise_update_vma()\nthat is invoked, calling vma_modify_flags_name() and vma_modify() in turn.\n\nThen, in vma_modify(), we attempt the merge:\n\n\tmerged = vma_merge_existing_range(vmg);\n\tif (merged)\n\t\treturn merged;\n\nWe invoke this with vmg->start, end set to start, tmp as such:\n\n start tmp\n |<--->|\n |----------|------|\n | vma | next |\n |----------|------|\n\nWe find ourselves in the merge right scenario, but the one in which we\ncannot remove the middle (we are offset into vma).\n\nHere we have a special case where vmg->start, end get set to perhaps\nunintuitive values - we intended to shrink the middle VMA and expand the\nnext.\n\nThis means vmg->start, end are set to... vma->vm_start, start.\n\nNow the commit_merge() fails, and vmg->start, end are left like this. \nThis means we return to the rest of vma_modify() with vmg->start, end\n(here denoted as start', end') set as:\n\n start' end'\n |<-->|\n |----------|------|\n | vma | next |\n |----------|------|\n\nSo we now erroneously try to split accordingly. This is where the\nunfortunate\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: abortar vma_modify() en caso de fallo de memoria insuficiente en la fusi\u00f3n. El resto de vma_modify() depende de que el estado de vmg permanezca intacto tras un intento de fusi\u00f3n. Normalmente, este es el caso; sin embargo, en el caso extremo de que un intento de fusi\u00f3n falle no porque el rango especificado no se pueda fusionar, sino debido a un error de memoria insuficiente al intentar confirmar la fusi\u00f3n, esta suposici\u00f3n se vuelve falsa. Esto da como resultado que vmg->start, end se modifique y, por lo tanto, los intentos posteriores de dividir el VMA se realizar\u00e1n con valores de inicio/fin no v\u00e1lidos. Afortunadamente, es pr\u00e1cticamente imposible que logremos esto en la realidad, ya que requerir\u00eda un fallo de preasignaci\u00f3n de nodos del \u00e1rbol de maple que probablemente nunca ocurrir\u00eda por ser \"demasiado peque\u00f1o para fallar\", es decir, el kernel simplemente seguir\u00eda reintentando la recuperaci\u00f3n hasta que tuviera \u00e9xito. Sin embargo, este escenario sigue siendo te\u00f3ricamente posible, y lo que estamos haciendo aqu\u00ed es incorrecto, por lo que debemos corregirlo. La opci\u00f3n m\u00e1s segura, cuando ocurre este escenario, es simplemente abandonar la operaci\u00f3n. Si no podemos asignar memoria para la fusi\u00f3n, tampoco podemos asignar memoria para la divisi\u00f3n (\u00a1quiz\u00e1s incluso m\u00e1s!). Cualquier escenario donde esto ocurra estar\u00eda bajo una presi\u00f3n de memoria muy extrema (probablemente fatal), por lo que es mejor abandonar pronto. Por lo tanto, no hay duda de que es apropiado simplemente abandonar en este escenario. Sin embargo, en general, si es posible, nunca debemos asumir que el estado de VMG es estable despu\u00e9s de un intento de fusi\u00f3n, ya que las operaciones de fusi\u00f3n actualizan los campos de VMG. Como resultado, tambi\u00e9n debemos aclarar esto almacenando inicio y fin en variables locales. El problema fue reportado originalmente por syzkaller y por Brad Spengler (a trav\u00e9s de una discusi\u00f3n fuera de la lista), y en ambos casos se manifest\u00f3 como una activaci\u00f3n de la aserci\u00f3n: VM_WARN_ON_VMG(start >= end, vmg); In vma_merge_existing_range(). Parece que al menos un escenario en el que esto ocurre es uno en el que la fusi\u00f3n que se intenta se debe a una funci\u00f3n madvise() en m\u00faltiples VMA, con este aspecto: inicio fin |<------>| |----------|------| | vma | siguiente | |----------|------| Cuando se invoca madvise_walk_vmas(), primero encontramos vma en lo anterior (determinando que prev sea igual a vma, ya que estamos desplazados hacia vma) y luego entramos en el bucle. Determinamos el final de vma que forma parte del rango que estamos ejecutando con madvise() estableciendo 'tmp' en este valor: /* Aqu\u00ed vma->vm_start <= start < (end|vma->vm_end) */ tmp = vma->vm_end; Luego invocamos la operaci\u00f3n madvise() a trav\u00e9s de visit(), permitiendo que prev se actualice para apuntar a vma como parte de la operaci\u00f3n: /* Aqu\u00ed vma->vm_start <= start < tmp <= (end|vma->vm_end). */ error = visit(vma, &prev, start, tmp, arg); Donde el puntero de la funci\u00f3n visit() en esta instancia es madvise_vma_behavior(). Como se observa en los informes de syzkaller, en \u00faltima instancia es madvise_update_vma() el que se invoca, llamando a vma_modify_flags_name() y vma_modify() a su vez. Luego, en vma_modify(), intentamos la fusi\u00f3n: merged = vma_merge_existing_range(vmg); if (merged) return merged; Invocamos esto con vmg->start, end establecido en start, tmp como tal: start tmp |<--->| |----------|------| | vma | next | |----------|------| Nos encontramos en el escenario correcto de fusi\u00f3n, pero en el que no podemos eliminar la parte central (estamos desplazados hacia vma). Aqu\u00ed tenemos un caso especial donde vmg->start, end se establecen en valores quiz\u00e1s poco intuitivos: pretend\u00edamos reducir la VMA central y expandir la siguiente. Esto significa que vmg->start, end se establecen en... vma->vm_start, start. Ahora, commit_merge() falla y vmg->start, end se mantienen as\u00ed. Esto significa que volvemos al resto de vma_modify() ---truncated---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21935.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21935.json index 6d86ca7b3fb..4606f5607c7 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21935.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21935.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: add check for rio_add_net() in rio_scan_alloc_net()\n\nThe return value of rio_add_net() should be checked. If it fails,\nput_device() should be called to free the memory and give up the reference\ninitialized in rio_add_net()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rapidio: a\u00f1adir comprobaci\u00f3n de rio_add_net() en rio_scan_alloc_net(). Se debe comprobar el valor de retorno de rio_add_net(). Si falla, se debe ejecutar put_device() para liberar memoria y ceder la referencia inicializada en rio_add_net()." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21938.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21938.json index 1d7be070eff..e29082808ee 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21938.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr\n\nIf multiple connection requests attempt to create an implicit mptcp\nendpoint in parallel, more than one caller may end up in\nmptcp_pm_nl_append_new_local_addr because none found the address in\nlocal_addr_list during their call to mptcp_pm_nl_get_local_id. In this\ncase, the concurrent new_local_addr calls may delete the address entry\ncreated by the previous caller. These deletes use synchronize_rcu, but\nthis is not permitted in some of the contexts where this function may be\ncalled. During packet recv, the caller may be in a rcu read critical\nsection and have preemption disabled.\n\nAn example stack:\n\n BUG: scheduling while atomic: swapper/2/0/0x00000302\n\n Call Trace:\n \n dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\n dump_stack (lib/dump_stack.c:124)\n __schedule_bug (kernel/sched/core.c:5943)\n schedule_debug.constprop.0 (arch/x86/include/asm/preempt.h:33 kernel/sched/core.c:5970)\n __schedule (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:207 kernel/sched/features.h:29 kernel/sched/core.c:6621)\n schedule (arch/x86/include/asm/preempt.h:84 kernel/sched/core.c:6804 kernel/sched/core.c:6818)\n schedule_timeout (kernel/time/timer.c:2160)\n wait_for_completion (kernel/sched/completion.c:96 kernel/sched/completion.c:116 kernel/sched/completion.c:127 kernel/sched/completion.c:148)\n __wait_rcu_gp (include/linux/rcupdate.h:311 kernel/rcu/update.c:444)\n synchronize_rcu (kernel/rcu/tree.c:3609)\n mptcp_pm_nl_append_new_local_addr (net/mptcp/pm_netlink.c:966 net/mptcp/pm_netlink.c:1061)\n mptcp_pm_nl_get_local_id (net/mptcp/pm_netlink.c:1164)\n mptcp_pm_get_local_id (net/mptcp/pm.c:420)\n subflow_check_req (net/mptcp/subflow.c:98 net/mptcp/subflow.c:213)\n subflow_v4_route_req (net/mptcp/subflow.c:305)\n tcp_conn_request (net/ipv4/tcp_input.c:7216)\n subflow_v4_conn_request (net/mptcp/subflow.c:651)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6709)\n tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1934)\n tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2334)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205 (discriminator 1))\n ip_local_deliver_finish (include/linux/rcupdate.h:813 net/ipv4/ip_input.c:234)\n ip_local_deliver (include/linux/netfilter.h:314 include/linux/netfilter.h:308 net/ipv4/ip_input.c:254)\n ip_sublist_rcv_finish (include/net/dst.h:461 net/ipv4/ip_input.c:580)\n ip_sublist_rcv (net/ipv4/ip_input.c:640)\n ip_list_rcv (net/ipv4/ip_input.c:675)\n __netif_receive_skb_list_core (net/core/dev.c:5583 net/core/dev.c:5631)\n netif_receive_skb_list_internal (net/core/dev.c:5685 net/core/dev.c:5774)\n napi_complete_done (include/linux/list.h:37 include/net/gro.h:449 include/net/gro.h:444 net/core/dev.c:6114)\n igb_poll (drivers/net/ethernet/intel/igb/igb_main.c:8244) igb\n __napi_poll (net/core/dev.c:6582)\n net_rx_action (net/core/dev.c:6653 net/core/dev.c:6787)\n handle_softirqs (kernel/softirq.c:553)\n __irq_exit_rcu (kernel/softirq.c:588 kernel/softirq.c:427 kernel/softirq.c:636)\n irq_exit_rcu (kernel/softirq.c:651)\n common_interrupt (arch/x86/kernel/irq.c:247 (discriminator 14))\n \n\nThis problem seems particularly prevalent if the user advertises an\nendpoint that has a different external vs internal address. In the case\nwhere the external address is advertised and multiple connections\nalready exist, multiple subflow SYNs arrive in parallel which tends to\ntrigger the race during creation of the first local_addr_list entries\nwhich have the internal address instead.\n\nFix by skipping the replacement of an existing implicit local address if\ncalled via mptcp_pm_nl_get_local_id." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: correcci\u00f3n de 'programaci\u00f3n mientras es at\u00f3mica' en mptcp_pm_nl_append_new_local_addr Si varias solicitudes de conexi\u00f3n intentan crear un endpoint mptcp impl\u00edcito en paralelo, m\u00e1s de un llamador puede terminar en mptcp_pm_nl_append_new_local_addr porque ninguno encontr\u00f3 la direcci\u00f3n en local_addr_list durante su llamada a mptcp_pm_nl_get_local_id. En este caso, las llamadas new_local_addr concurrentes pueden eliminar la entrada de direcci\u00f3n creada por el llamador anterior. Estas eliminaciones usan synchronize_rcu, pero esto no est\u00e1 permitido en algunos de los contextos donde se puede llamar a esta funci\u00f3n. Durante la recepci\u00f3n de paquetes, el llamador puede estar en una secci\u00f3n cr\u00edtica de lectura de rcu y tener la preempci\u00f3n deshabilitada. Una pila de ejemplo: ERROR: programaci\u00f3n mientras es at\u00f3mica: swapper/2/0/0x00000302 Seguimiento de llamadas: dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1)) dump_stack (lib/dump_stack.c:124) __schedule_bug (kernel/sched/core.c:5943) schedule_debug.constprop.0 (arch/x86/include/asm/preempt.h:33 kernel/sched/core.c:5970) __schedule (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:207 kernel/sched/features.h:29 kernel/sched/core.c:6621) schedule (arch/x86/include/asm/preempt.h:84 kernel/sched/core.c:6804 kernel/sched/core.c:6818) schedule_timeout (kernel/time/timer.c:2160) wait_for_completion (kernel/sched/completion.c:96 kernel/sched/completion.c:116 kernel/sched/completion.c:127 kernel/sched/completion.c:148) __wait_rcu_gp (include/linux/rcupdate.h:311 kernel/rcu/update.c:444) synchronize_rcu (kernel/rcu/tree.c:3609) mptcp_pm_nl_append_new_local_addr (net/mptcp/pm_netlink.c:966 net/mptcp/pm_netlink.c:1061) mptcp_pm_nl_get_local_id (net/mptcp/pm_netlink.c:1164) mptcp_pm_get_local_id (net/mptcp/pm.c:420) subflow_check_req (net/mptcp/subflow.c:98 net/mptcp/subflow.c:213) subflow_v4_route_req (net/mptcp/subflow.c:305) tcp_conn_request (net/ipv4/tcp_input.c:7216) subflow_v4_conn_request (net/mptcp/subflow.c:651) tcp_rcv_state_process (net/ipv4/tcp_input.c:6709) tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1934) tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2334) ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205 (discriminator 1)) ip_local_deliver_finish (include/linux/rcupdate.h:813 net/ipv4/ip_input.c:234) ip_local_deliver (include/linux/netfilter.h:314 include/linux/netfilter.h:308 net/ipv4/ip_input.c:254) ip_sublist_rcv_finish (include/net/dst.h:461 net/ipv4/ip_input.c:580) ip_sublist_rcv (net/ipv4/ip_input.c:640) ip_list_rcv (net/ipv4/ip_input.c:675) __netif_receive_skb_list_core (net/core/dev.c:5583 net/core/dev.c:5631) netif_receive_skb_list_internal (net/core/dev.c:5685 net/core/dev.c:5774) napi_complete_done (include/linux/list.h:37 include/net/gro.h:449 include/net/gro.h:444 net/core/dev.c:6114) igb_poll (drivers/net/ethernet/intel/igb/igb_main.c:8244) igb __napi_poll (net/core/dev.c:6582) net_rx_action (net/core/dev.c:6653 net/core/dev.c:6787) handle_softirqs (kernel/softirq.c:553) __irq_exit_rcu (kernel/softirq.c:588 kernel/softirq.c:427 kernel/softirq.c:636) irq_exit_rcu (kernel/softirq.c:651) common_interrupt (arch/x86/kernel/irq.c:247 (discriminator 14)) Este problema parece ser particularmente frecuente si el usuario anuncia un endpoint que tiene una direcci\u00f3n interna y externa diferente. Si se anuncia la direcci\u00f3n externa y ya existen varias conexiones, llegan varios SYN de subflujo en paralelo, lo que suele desencadenar la ejecuci\u00f3n durante la creaci\u00f3n de las primeras entradas de local_addr_list que contienen la direcci\u00f3n interna. Se soluciona omitiendo el reemplazo de una direcci\u00f3n local impl\u00edcita existente si se llama mediante mptcp_pm_nl_get_local_id." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21939.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21939.json index 6fd68eb6a39..254e456e5c3 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21939.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21939.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/hmm: Don't dereference struct page pointers without notifier lock\n\nThe pnfs that we obtain from hmm_range_fault() point to pages that\nwe don't have a reference on, and the guarantee that they are still\nin the cpu page-tables is that the notifier lock must be held and the\nnotifier seqno is still valid.\n\nSo while building the sg table and marking the pages accesses / dirty\nwe need to hold this lock with a validated seqno.\n\nHowever, the lock is reclaim tainted which makes\nsg_alloc_table_from_pages_segment() unusable, since it internally\nallocates memory.\n\nInstead build the sg-table manually. For the non-iommu case\nthis might lead to fewer coalesces, but if that's a problem it can\nbe fixed up later in the resource cursor code. For the iommu case,\nthe whole sg-table may still be coalesced to a single contigous\ndevice va region.\n\nThis avoids marking pages that we don't own dirty and accessed, and\nit also avoid dereferencing struct pages that we don't own.\n\nv2:\n- Use assert to check whether hmm pfns are valid (Matthew Auld)\n- Take into account that large pages may cross range boundaries\n (Matthew Auld)\n\nv3:\n- Don't unnecessarily check for a non-freed sg-table. (Matthew Auld)\n- Add a missing up_read() in an error path. (Matthew Auld)\n\n(cherry picked from commit ea3e66d280ce2576664a862693d1da8fd324c317)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/hmm: No desreferenciar punteros de p\u00e1gina de estructura sin bloqueo de notificador Los pnfs que obtenemos de hmm_range_fault() apuntan a p\u00e1ginas en las que no tenemos una referencia, y la garant\u00eda de que a\u00fan est\u00e1n en las tablas de p\u00e1ginas de la CPU es que el bloqueo del notificador debe mantenerse y el seqno del notificador a\u00fan es v\u00e1lido. Entonces, mientras construimos la tabla sg y marcamos las p\u00e1ginas como accedidas/sucias, necesitamos mantener este bloqueo con un seqno validado. Sin embargo, el bloqueo est\u00e1 contaminado por recuperaci\u00f3n, lo que hace que sg_alloc_table_from_pages_segment() sea inutilizable, ya que asigna memoria internamente. En su lugar, construya la tabla sg manualmente. Para el caso que no es iommu, esto podr\u00eda llevar a menos coalescencias, pero si eso es un problema, se puede arreglar m\u00e1s adelante en el c\u00f3digo del cursor de recursos. En el caso de iommu, toda la tabla sg puede fusionarse en una \u00fanica regi\u00f3n va de dispositivo contiguo. Esto evita marcar p\u00e1ginas que no son de nuestra propiedad como sucias y accedidas, y tambi\u00e9n evita desreferenciar p\u00e1ginas de estructura que no son de nuestra propiedad. v2: - Usar assert para comprobar si las funciones de funci\u00f3n de enlace de hmm son v\u00e1lidas (Matthew Auld). - Tener en cuenta que las p\u00e1ginas grandes pueden cruzar los l\u00edmites de rango (Matthew Auld). v3: - No comprobar innecesariamente si hay una tabla sg no liberada (Matthew Auld). - A\u00f1adir una funci\u00f3n up_read() faltante en una ruta de error (Matthew Auld). (Seleccionado de el commit ea3e66d280ce2576664a862693d1da8fd324c317)." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21942.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21942.json index a2a3fbee864..d644db1b9d7 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21942.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21942.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: fix extent range end unlock in cow_file_range()\n\nRunning generic/751 on the for-next branch often results in a hang like\nbelow. They are both stack by locking an extent. This suggests someone\nforget to unlock an extent.\n\n INFO: task kworker/u128:1:12 blocked for more than 323 seconds.\n Not tainted 6.13.0-BTRFS-ZNS+ #503\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/u128:1 state:D stack:0 pid:12 tgid:12 ppid:2 flags:0x00004000\n Workqueue: btrfs-fixup btrfs_work_helper [btrfs]\n Call Trace:\n \n __schedule+0x534/0xdd0\n schedule+0x39/0x140\n __lock_extent+0x31b/0x380 [btrfs]\n ? __pfx_autoremove_wake_function+0x10/0x10\n btrfs_writepage_fixup_worker+0xf1/0x3a0 [btrfs]\n btrfs_work_helper+0xff/0x480 [btrfs]\n ? lock_release+0x178/0x2c0\n process_one_work+0x1ee/0x570\n ? srso_return_thunk+0x5/0x5f\n worker_thread+0x1d1/0x3b0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x10b/0x230\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n INFO: task kworker/u134:0:184 blocked for more than 323 seconds.\n Not tainted 6.13.0-BTRFS-ZNS+ #503\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/u134:0 state:D stack:0 pid:184 tgid:184 ppid:2 flags:0x00004000\n Workqueue: writeback wb_workfn (flush-btrfs-4)\n Call Trace:\n \n __schedule+0x534/0xdd0\n schedule+0x39/0x140\n __lock_extent+0x31b/0x380 [btrfs]\n ? __pfx_autoremove_wake_function+0x10/0x10\n find_lock_delalloc_range+0xdb/0x260 [btrfs]\n writepage_delalloc+0x12f/0x500 [btrfs]\n ? srso_return_thunk+0x5/0x5f\n extent_write_cache_pages+0x232/0x840 [btrfs]\n btrfs_writepages+0x72/0x130 [btrfs]\n do_writepages+0xe7/0x260\n ? srso_return_thunk+0x5/0x5f\n ? lock_acquire+0xd2/0x300\n ? srso_return_thunk+0x5/0x5f\n ? find_held_lock+0x2b/0x80\n ? wbc_attach_and_unlock_inode.part.0+0x102/0x250\n ? wbc_attach_and_unlock_inode.part.0+0x102/0x250\n __writeback_single_inode+0x5c/0x4b0\n writeback_sb_inodes+0x22d/0x550\n __writeback_inodes_wb+0x4c/0xe0\n wb_writeback+0x2f6/0x3f0\n wb_workfn+0x32a/0x510\n process_one_work+0x1ee/0x570\n ? srso_return_thunk+0x5/0x5f\n worker_thread+0x1d1/0x3b0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x10b/0x230\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \n\nThis happens because we have another success path for the zoned mode. When\nthere is no active zone available, btrfs_reserve_extent() returns\n-EAGAIN. In this case, we have two reactions.\n\n(1) If the given range is never allocated, we can only wait for someone\n to finish a zone, so wait on BTRFS_FS_NEED_ZONE_FINISH bit and retry\n afterward.\n\n(2) Or, if some allocations are already done, we must bail out and let\n the caller to send IOs for the allocation. This is because these IOs\n may be necessary to finish a zone.\n\nThe commit 06f364284794 (\"btrfs: do proper folio cleanup when\ncow_file_range() failed\") moved the unlock code from the inside of the\nloop to the outside. So, previously, the allocated extents are unlocked\njust after the allocation and so before returning from the function.\nHowever, they are no longer unlocked on the case (2) above. That caused\nthe hang issue.\n\nFix the issue by modifying the 'end' to the end of the allocated\nrange. Then, we can exit the loop and the same unlock code can properly\nhandle the case." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: zoned: fix extent range end unlock in cow_file_range(). Ejecutar generic/751 en la rama for-next suele provocar un bloqueo como el que se muestra a continuaci\u00f3n. Ambas se acumulan bloqueando una extensi\u00f3n. Esto sugiere que alguien olvid\u00f3 desbloquear una extensi\u00f3n. INFORMACI\u00d3N: La tarea kworker/u128:1:12 se bloque\u00f3 durante m\u00e1s de 323 segundos. No contaminada. 6.13.0-BTRFS-ZNS+ #503 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" desactiva este mensaje. tarea:kworker/u128:1 estado:D pila:0 pid:12 tgid:12 ppid:2 indicadores:0x00004000 Cola de trabajo: btrfs-fixup btrfs_work_helper [btrfs] Rastreo de llamadas: __schedule+0x534/0xdd0 schedule+0x39/0x140 __lock_extent+0x31b/0x380 [btrfs] ? __pfx_autoremove_wake_function+0x10/0x10 btrfs_writepage_fixup_worker+0xf1/0x3a0 [btrfs] btrfs_work_helper+0xff/0x480 [btrfs] ? lock_release+0x178/0x2c0 process_one_work+0x1ee/0x570 ? srso_return_thunk+0x5/0x5f worker_thread+0x1d1/0x3b0 ? __pfx_worker_thread+0x10/0x10 kthread+0x10b/0x230 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x30/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 INFO: task kworker/u134:0:184 blocked for more than 323 seconds. Not tainted 6.13.0-BTRFS-ZNS+ #503 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. task:kworker/u134:0 state:D stack:0 pid:184 tgid:184 ppid:2 flags:0x00004000 Workqueue: writeback wb_workfn (flush-btrfs-4) Call Trace: __schedule+0x534/0xdd0 schedule+0x39/0x140 __lock_extent+0x31b/0x380 [btrfs] ? __pfx_autoremove_wake_function+0x10/0x10 find_lock_delalloc_range+0xdb/0x260 [btrfs] writepage_delalloc+0x12f/0x500 [btrfs] ? srso_return_thunk+0x5/0x5f extent_write_cache_pages+0x232/0x840 [btrfs] btrfs_writepages+0x72/0x130 [btrfs] do_writepages+0xe7/0x260 ? srso_return_thunk+0x5/0x5f ? lock_acquire+0xd2/0x300 ? srso_return_thunk+0x5/0x5f ? find_held_lock+0x2b/0x80 ? wbc_attach_and_unlock_inode.part.0+0x102/0x250 ? wbc_attach_and_unlock_inode.part.0+0x102/0x250 __writeback_single_inode+0x5c/0x4b0 writeback_sb_inodes+0x22d/0x550 __writeback_inodes_wb+0x4c/0xe0 wb_writeback+0x2f6/0x3f0 wb_workfn+0x32a/0x510 process_one_work+0x1ee/0x570 ? srso_return_thunk+0x5/0x5f worker_thread+0x1d1/0x3b0 ? __pfx_worker_thread+0x10/0x10 kthread+0x10b/0x230 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x30/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 Esto sucede porque tenemos otra ruta de \u00e9xito para el modo zonificado. Cuando no hay ninguna zona activa disponible, btrfs_reserve_extent() devuelve -EAGAIN. En este caso, tenemos dos reacciones. (1) Si el rango dado nunca se asigna, solo podemos esperar a que alguien complete una zona, por lo que esperamos el bit BTRFS_FS_NEED_ZONE_FINISH y reintentamos despu\u00e9s. (2) O bien, si ya se han realizado algunas asignaciones, debemos abandonar y dejar que el llamador env\u00ede E/S para la asignaci\u00f3n. Esto se debe a que estas E/S pueden ser necesarias para completar una zona. El commit 06f364284794 (\"btrfs: realizar la limpieza de folio correcta cuando cow_file_range() falla\") movi\u00f3 el c\u00f3digo de desbloqueo del interior del bucle al exterior. Por lo tanto, antes, las extensiones asignadas se desbloqueaban justo despu\u00e9s de la asignaci\u00f3n y, por lo tanto, antes de regresar de la funci\u00f3n. Sin embargo, ya no se desbloquean en el caso (2) mencionado. Esto caus\u00f3 el bloqueo. Para solucionar el problema, modifique \"end\" al final del rango asignado. De esta manera, podemos salir del bucle y el mismo c\u00f3digo de desbloqueo puede gestionar el caso correctamente." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21944.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21944.json index cdeb7cee28a..85f1e98404c 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21944.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21944.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix bug on trap in smb2_lock\n\nIf lock count is greater than 1, flags could be old value.\nIt should be checked with flags of smb_lock, not flags.\nIt will cause bug-on trap from locks_free_lock in error handling\nroutine." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige un error en la trampa de smb2_lock. Si el n\u00famero de bloqueos es mayor que 1, las banderas podr\u00edan tener un valor anterior. Debe comprobarse con las banderas de smb_lock, no con las banderas. Esto provocar\u00e1 un error en la trampa de locks_free_lock en la rutina de gesti\u00f3n de errores." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21946.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21946.json index 408609d45cb..e6b5e0168ae 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21946.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21946.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out-of-bounds in parse_sec_desc()\n\nIf osidoffset, gsidoffset and dacloffset could be greater than smb_ntsd\nstruct size. If it is smaller, It could cause slab-out-of-bounds.\nAnd when validating sid, It need to check it included subauth array size." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige un error fuera de los l\u00edmites en parse_sec_desc(). Si osidoffset, gsidoffset y dacloffset pueden ser mayores que el tama\u00f1o de la estructura smb_ntsd, si es menor, podr\u00eda causar un error fuera de los l\u00edmites de slab. Al validar sid, es necesario comprobar si incluye el tama\u00f1o del array subauth." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21950.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21950.json index 3d298210516..7c9cd9002a9 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21950.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21950.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl\n\nIn the \"pmcmd_ioctl\" function, three memory objects allocated by\nkmalloc are initialized by \"hcall_get_cpu_state\", which are then\ncopied to user space. The initializer is indeed implemented in\n\"acrn_hypercall2\" (arch/x86/include/asm/acrn.h). There is a risk of\ninformation leakage due to uninitialized bytes." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: virt: acrn: hsm: Usar kzalloc para evitar fugas de informaci\u00f3n en pmcmd_ioctl. En la funci\u00f3n \"pmcmd_ioctl\", tres objetos de memoria asignados por kmalloc se inicializan mediante \"hcall_get_cpu_state\", que posteriormente se copian al espacio de usuario. El inicializador est\u00e1 implementado en \"acrn_hypercall2\" (arch/x86/include/asm/acrn.h). Existe riesgo de fuga de informaci\u00f3n debido a bytes no inicializados." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21952.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21952.json index 2c2539c3fa7..043362024e3 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21952.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21952.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: corsair-void: Update power supply values with a unified work handler\n\ncorsair_void_process_receiver can be called from an interrupt context,\nlocking battery_mutex in it was causing a kernel panic.\nFix it by moving the critical section into its own work, sharing this\nwork with battery_add_work and battery_remove_work to remove the need\nfor any locking" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: corsair-void: Actualizar los valores de la fuente de alimentaci\u00f3n con un controlador de trabajo unificado. corsair_void_process_receiver se puede llamar desde un contexto de interrupci\u00f3n, y bloquear battery_mutex en \u00e9l causaba un p\u00e1nico del kernel. Se soluciona moviendo la secci\u00f3n cr\u00edtica a su propio trabajo, comparti\u00e9ndolo con battery_add_work y battery_remove_work para eliminar la necesidad de bloqueo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21954.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21954.json index bbb972cfc68..a448e05d677 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21954.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21954.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetmem: prevent TX of unreadable skbs\n\nCurrently on stable trees we have support for netmem/devmem RX but not\nTX. It is not safe to forward/redirect an RX unreadable netmem packet\ninto the device's TX path, as the device may call dma-mapping APIs on\ndma addrs that should not be passed to it.\n\nFix this by preventing the xmit of unreadable skbs.\n\nTested by configuring tc redirect:\n\nsudo tc qdisc add dev eth1 ingress\nsudo tc filter add dev eth1 ingress protocol ip prio 1 flower ip_proto \\\n\ttcp src_ip 192.168.1.12 action mirred egress redirect dev eth1\n\nBefore, I see unreadable skbs in the driver's TX path passed to dma\nmapping APIs.\n\nAfter, I don't see unreadable skbs in the driver's TX path passed to dma\nmapping APIs." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netmem: evitar TX de skbs ilegibles Actualmente en \u00e1rboles estables tenemos soporte para netmem/devmem RX pero no TX. No es seguro reenviar/redirigir un paquete netmem ilegible RX en la ruta TX del dispositivo, ya que el dispositivo puede llamar a las API de mapeo DMA en direcciones DMA que no se le deben pasar. Arregle esto al evitar la xmit de skbs ilegibles. Probado al configurar tc redirect: sudo tc qdisc add dev eth1 ingress sudo tc filter add dev eth1 ingress protocol ip prio 1 flower ip_proto \\ tcp src_ip 192.168.1.12 action mirred egress redirect dev eth1 Antes, ve\u00eda skbs ilegibles en la ruta TX del controlador pasada a las API de mapeo DMA. Despu\u00e9s, no veo skbs ilegibles en la ruta TX del controlador pasada a las API de mapeo de DMA." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21955.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21955.json index 0f548531de6..efb466a6137 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21955.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21955.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: prevent connection release during oplock break notification\n\nksmbd_work could be freed when after connection release.\nIncrement r_count of ksmbd_conn to indicate that requests\nare not finished yet and to not release the connection." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: impide la liberaci\u00f3n de la conexi\u00f3n durante la notificaci\u00f3n de interrupci\u00f3n del bloqueo de oplock. ksmbd_work podr\u00eda liberarse despu\u00e9s de la liberaci\u00f3n de la conexi\u00f3n. Incremente r_count de ksmbd_conn para indicar que las solicitudes a\u00fan no han finalizado y para no liberar la conexi\u00f3n." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21958.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21958.json index 44bb5ad0b35..e70500375ef 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21958.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21958.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"openvswitch: switch to per-action label counting in conntrack\"\n\nCurrently, ovs_ct_set_labels() is only called for confirmed conntrack\nentries (ct) within ovs_ct_commit(). However, if the conntrack entry\ndoes not have the labels_ext extension, attempting to allocate it in\novs_ct_get_conn_labels() for a confirmed entry triggers a warning in\nnf_ct_ext_add():\n\n WARN_ON(nf_ct_is_confirmed(ct));\n\nThis happens when the conntrack entry is created externally before OVS\nincrements net->ct.labels_used. The issue has become more likely since\ncommit fcb1aa5163b1 (\"openvswitch: switch to per-action label counting\nin conntrack\"), which changed to use per-action label counting and\nincrement net->ct.labels_used when a flow with ct action is added.\n\nSince there\u2019s no straightforward way to fully resolve this issue at the\nmoment, this reverts the commit to avoid breaking existing use cases." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"openvswitch: cambiar al conteo de etiquetas por acci\u00f3n en conntrack\". Actualmente, ovs_ct_set_labels() solo se llama para entradas de conntrack confirmadas (ct) dentro de ovs_ct_commit(). Sin embargo, si la entrada de conntrack no tiene la extensi\u00f3n labels_ext, al intentar asignarla en ovs_ct_get_conn_labels() para una entrada confirmada, se genera una advertencia en nf_ct_ext_add(): WARN_ON(nf_ct_is_confirmed(ct)); Esto ocurre cuando la entrada de conntrack se crea externamente antes de que OVS incremente net->ct.labels_used. El problema se ha vuelto m\u00e1s frecuente desde el commit fcb1aa5163b1 (\"openvswitch: cambio al conteo de etiquetas por acci\u00f3n en conntrack\"), que cambi\u00f3 para usar el conteo de etiquetas por acci\u00f3n e incrementar net->ct.labels_used al agregar un flujo con la acci\u00f3n ct. Dado que actualmente no existe una soluci\u00f3n directa para este problema, esta reversi\u00f3n de el commit evita la interrupci\u00f3n de los casos de uso existentes." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21959.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21959.json index 864fcaef026..839b46ff230 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21959.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21959.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.120", "lastModified": "2025-04-10T13:15:47.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21960.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21960.json index f7b779d8c89..91acfdcda98 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21960.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21960.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: do not update checksum in bnxt_xdp_build_skb()\n\nThe bnxt_rx_pkt() updates ip_summed value at the end if checksum offload\nis enabled.\nWhen the XDP-MB program is attached and it returns XDP_PASS, the\nbnxt_xdp_build_skb() is called to update skb_shared_info.\nThe main purpose of bnxt_xdp_build_skb() is to update skb_shared_info,\nbut it updates ip_summed value too if checksum offload is enabled.\nThis is actually duplicate work.\n\nWhen the bnxt_rx_pkt() updates ip_summed value, it checks if ip_summed\nis CHECKSUM_NONE or not.\nIt means that ip_summed should be CHECKSUM_NONE at this moment.\nBut ip_summed may already be updated to CHECKSUM_UNNECESSARY in the\nXDP-MB-PASS path.\nSo the by skb_checksum_none_assert() WARNS about it.\n\nThis is duplicate work and updating ip_summed in the\nbnxt_xdp_build_skb() is not needed.\n\nSplat looks like:\nWARNING: CPU: 3 PID: 5782 at ./include/linux/skbuff.h:5155 bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]\nModules linked in: bnxt_re bnxt_en rdma_ucm rdma_cm iw_cm ib_cm ib_uverbs veth xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_]\nCPU: 3 UID: 0 PID: 5782 Comm: socat Tainted: G W 6.14.0-rc4+ #27\nTainted: [W]=WARN\nHardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021\nRIP: 0010:bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]\nCode: 54 24 0c 4c 89 f1 4c 89 ff c1 ea 1f ff d3 0f 1f 00 49 89 c6 48 85 c0 0f 84 4c e5 ff ff 48 89 c7 e8 ca 3d a0 c8 e9 8f f4 ff ff <0f> 0b f\nRSP: 0018:ffff88881ba09928 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000c7590303 RCX: 0000000000000000\nRDX: 1ffff1104e7d1610 RSI: 0000000000000001 RDI: ffff8881c91300b8\nRBP: ffff88881ba09b28 R08: ffff888273e8b0d0 R09: ffff888273e8b070\nR10: ffff888273e8b010 R11: ffff888278b0f000 R12: ffff888273e8b080\nR13: ffff8881c9130e00 R14: ffff8881505d3800 R15: ffff888273e8b000\nFS: 00007f5a2e7be080(0000) GS:ffff88881ba00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fff2e708ff8 CR3: 000000013e3b0000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n \n ? __warn+0xcd/0x2f0\n ? bnxt_rx_pkt+0x479b/0x7610\n ? report_bug+0x326/0x3c0\n ? handle_bug+0x53/0xa0\n ? exc_invalid_op+0x14/0x50\n ? asm_exc_invalid_op+0x16/0x20\n ? bnxt_rx_pkt+0x479b/0x7610\n ? bnxt_rx_pkt+0x3e41/0x7610\n ? __pfx_bnxt_rx_pkt+0x10/0x10\n ? napi_complete_done+0x2cf/0x7d0\n __bnxt_poll_work+0x4e8/0x1220\n ? __pfx___bnxt_poll_work+0x10/0x10\n ? __pfx_mark_lock.part.0+0x10/0x10\n bnxt_poll_p5+0x36a/0xfa0\n ? __pfx_bnxt_poll_p5+0x10/0x10\n __napi_poll.constprop.0+0xa0/0x440\n net_rx_action+0x899/0xd00\n...\n\nFollowing ping.py patch adds xdp-mb-pass case. so ping.py is going\nto be able to reproduce this issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: bnxt: no actualice la suma de comprobaci\u00f3n en bnxt_xdp_build_skb() El bnxt_rx_pkt() actualiza el valor de ip_summed al final si la descarga de suma de comprobaci\u00f3n est\u00e1 habilitada. Cuando se adjunta el programa XDP-MB y devuelve XDP_PASS, se llama a bnxt_xdp_build_skb() para actualizar skb_shared_info. El prop\u00f3sito principal de bnxt_xdp_build_skb() es actualizar skb_shared_info, pero tambi\u00e9n actualiza el valor de ip_summed si la descarga de suma de comprobaci\u00f3n est\u00e1 habilitada. En realidad, esto es trabajo duplicado. Cuando bnxt_rx_pkt() actualiza el valor de ip_summed, verifica si ip_summed es CHECKSUM_NONE o no. Significa que ip_summed deber\u00eda ser CHECKSUM_NONE en este momento. Pero es posible que ip_summed ya est\u00e9 actualizado a CHECKSUM_UNNECESSARY en la ruta XDP-MB-PASS. Por lo tanto, skb_checksum_none_assert() advierte al respecto. Esto implica trabajo duplicado y no es necesario actualizar ip_summed en bnxt_xdp_build_skb(). El mensaje aparece as\u00ed: ADVERTENCIA: CPU: 3 PID: 5782 en ./include/linux/skbuff.h:5155 bnxt_rx_pkt+0x479b/0x7610 [bnxt_en] M\u00f3dulos vinculados: bnxt_re bnxt_en rdma_ucm rdma_cm iw_cm ib_cm ib_uverbs veth xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_] CPU: 3 UID: 0 PID: 5782 Comm: socat Contaminado: GW 6.14.0-rc4+ #27 Contaminado: [W]=WARN Nombre del hardware: Nombre del producto del sistema ASUS/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxt_rx_pkt+0x479b/0x7610 [bnxt_es] C\u00f3digo: 54 24 0c 4c 89 f1 4c 89 ff c1 ea 1f ff d3 0f 1f 00 49 89 c6 48 85 c0 0f 84 4c e5 ff ff 48 89 c7 e8 ca 3d a0 c8 e9 8f f4 ff ff <0f> 0b f RSP: 0018:ffff88881ba09928 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 00000000c7590303 RCX: 0000000000000000 RDX: 1ffff1104e7d1610 RSI: 0000000000000001 RDI: ffff8881c91300b8 RBP: ffff88881ba09b28 R08: ffff888273e8b0d0 R09: ffff888273e8b070 R10: ffff888273e8b010 R11: ffff888278b0f000 R12: ffff888273e8b080 R13: ffff8881c9130e00 R14: ffff8881505d3800 R15: ffff888273e8b000 FS: 00007f5a2e7be080(0000) GS:ffff88881ba00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fff2e708ff8 CR3: 000000013e3b0000 CR4: 00000000007506f0 PKRU: 55555554 Rastreo de llamadas: ? __warn+0xcd/0x2f0 ? bnxt_rx_pkt+0x479b/0x7610 ? report_bug+0x326/0x3c0 ? __pfx_bnxt_rx_pkt+0x10/0x10 ? __bnxt_poll_work+0x4e8/0x1220 ? __pfx___bnxt_poll_work+0x10/0x10 ? El siguiente parche de ping.py agrega el caso xdp-mb-pass, por lo que ping.py podr\u00e1 reproducir este problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21961.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21961.json index 7e714e3f9e6..aa7b42755b2 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21961.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21961.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.343", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: fix truesize for mb-xdp-pass case\n\nWhen mb-xdp is set and return is XDP_PASS, packet is converted from\nxdp_buff to sk_buff with xdp_update_skb_shared_info() in\nbnxt_xdp_build_skb().\nbnxt_xdp_build_skb() passes incorrect truesize argument to\nxdp_update_skb_shared_info().\nThe truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo->nr_frags but\nthe skb_shared_info was wiped by napi_build_skb() before.\nSo it stores sinfo->nr_frags before bnxt_xdp_build_skb() and use it\ninstead of getting skb_shared_info from xdp_get_shared_info_from_buff().\n\nSplat looks like:\n ------------[ cut here ]------------\n WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590\n Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms\n CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3\n RIP: 0010:skb_try_coalesce+0x504/0x590\n Code: 4b fd ff ff 49 8b 34 24 40 80 e6 40 0f 84 3d fd ff ff 49 8b 74 24 48 40 f6 c6 01 0f 84 2e fd ff ff 48 8d 4e ff e9 25 fd ff ff <0f> 0b e99\n RSP: 0018:ffffb62c4120caa8 EFLAGS: 00010287\n RAX: 0000000000000003 RBX: ffffb62c4120cb14 RCX: 0000000000000ec0\n RDX: 0000000000001000 RSI: ffffa06e5d7dc000 RDI: 0000000000000003\n RBP: ffffa06e5d7ddec0 R08: ffffa06e6120a800 R09: ffffa06e7a119900\n R10: 0000000000002310 R11: ffffa06e5d7dcec0 R12: ffffe4360575f740\n R13: ffffe43600000000 R14: 0000000000000002 R15: 0000000000000002\n FS: 0000000000000000(0000) GS:ffffa0755f700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f147b76b0f8 CR3: 00000001615d4000 CR4: 00000000007506f0\n PKRU: 55555554\n Call Trace:\n \n ? __warn+0x84/0x130\n ? skb_try_coalesce+0x504/0x590\n ? report_bug+0x18a/0x1a0\n ? handle_bug+0x53/0x90\n ? exc_invalid_op+0x14/0x70\n ? asm_exc_invalid_op+0x16/0x20\n ? skb_try_coalesce+0x504/0x590\n inet_frag_reasm_finish+0x11f/0x2e0\n ip_defrag+0x37a/0x900\n ip_local_deliver+0x51/0x120\n ip_sublist_rcv_finish+0x64/0x70\n ip_sublist_rcv+0x179/0x210\n ip_list_rcv+0xf9/0x130\n\nHow to reproduce:\n\nip link set $interface1 xdp obj xdp_pass.o\nip link set $interface1 mtu 9000 up\nip a a 10.0.0.1/24 dev $interface1\n\nip link set $interfac2 mtu 9000 up\nip a a 10.0.0.2/24 dev $interface2\nping 10.0.0.1 -s 65000\n\nFollowing ping.py patch adds xdp-mb-pass case. so ping.py is going to be\nable to reproduce this issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: bnxt: correcci\u00f3n de truesize para el caso mb-xdp-pass. Cuando mb-xdp est\u00e1 configurado y el valor de retorno es XDP_PASS, el paquete se convierte de xdp_buff a sk_buff con xdp_update_skb_shared_info() en bnxt_xdp_build_skb(). bnxt_xdp_build_skb() pasa un argumento truesize incorrecto a xdp_update_skb_shared_info(). El truesize se calcula como BNXT_RX_PAGE_SIZE * sinfo->nr_frags, pero napi_build_skb() borr\u00f3 previamente skb_shared_info. De este modo, almacena sinfo->nr_frags antes de bnxt_xdp_build_skb() y lo utiliza en lugar de obtener skb_shared_info de xdp_get_shared_info_from_buff(). El splat se ve as\u00ed: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 2 PID: 0 en net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590 M\u00f3dulos enlazados en: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms CPU: 2 UID: 0 PID: 0 Comm: swapper/2 No contaminado 6.14.0-rc2+ #3 RIP: 0010:skb_try_coalesce+0x504/0x590 C\u00f3digo: 4b fd ff ff 49 8b 34 24 40 80 e6 40 0f 84 3d fd ff ff 49 8b 74 24 48 40 f6 c6 01 0f 84 2e fd ff ff 48 8d 4e ff e9 25 fd ff ff <0f> 0b e99 RSP: 0018:ffffb62c4120caa8 EFLAGS: 00010287 RAX: 000000000000003 RBX: ffffb62c4120cb14 RCX: 0000000000000ec0 RDX: 0000000000001000 RSI: ffffa06e5d7dc000 RDI: 000000000000003 RBP: ffffa06e5d7ddec0 R08: ffffa06e6120a800 R09: ffffa06e7a119900 R10: 0000000000002310 R11: ffffa06e5d7dcec0 R12: ffffe4360575f740 R13: ffffe43600000000 R14: 000000000000002 R15: 0000000000000002 FS: 000000000000000(0000) GS:ffffa0755f700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f147b76b0f8 CR3: 00000001615d4000 CR4: 00000000007506f0 PKRU: 55555554 Rastreo de llamadas: ? __warn+0x84/0x130 ? skb_try_coalesce+0x504/0x590 ? report_bug+0x18a/0x1a0 ? handle_bug+0x53/0x90 ? exc_invalid_op+0x14/0x70 ? asm_exc_invalid_op+0x16/0x20 ? skb_try_coalesce+0x504/0x590 inet_frag_reasm_finish+0x11f/0x2e0 ip_defrag+0x37a/0x900 ip_local_deliver+0x51/0x120 ip_sublist_rcv_finish+0x64/0x70 ip_sublist_rcv+0x179/0x210 ip_list_rcv+0xf9/0x130 C\u00f3mo reproducir: enlace ip establecido $interfaz1 xdp obj xdp_pass.o enlace ip establecido $interfaz1 mtu 9000 activo ip aa 10.0.0.1/24 dev $interfaz1 enlace ip establecido $interfaz2 mtu 9000 activo ip aa 10.0.0.2/24 El siguiente parche de ping.py agrega el caso xdp-mb-pass, por lo que ping.py podr\u00e1 reproducir este problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21962.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21962.json index a82064e4112..b49285af726 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21962.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21962.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.447", "lastModified": "2025-04-10T13:15:47.857", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21963.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21963.json index b28ea64d2d6..88e00ebea3d 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21963.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21963.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.550", "lastModified": "2025-04-10T13:15:47.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21964.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21964.json index 389e36e70c8..05897863624 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21964.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21964.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.657", "lastModified": "2025-04-10T13:15:48.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21965.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21965.json index 7543881a8bc..888d857b103 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21965.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21965.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl()\n\nIf a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids\nrange) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel\ncrash.\n\nTo prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and\ntrigger an scx error if an invalid CPU is specified." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched_ext: Validar prev_cpu en scx_bpf_select_cpu_dfl(). Si un programador BPF proporciona una CPU no v\u00e1lida (fuera del rango nr_cpu_ids) como prev_cpu a scx_bpf_select_cpu_dfl(), puede provocar un fallo del kernel. Para evitarlo, valide prev_cpu en scx_bpf_select_cpu_dfl() y genere un error scx si se especifica una CPU no v\u00e1lida." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21966.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21966.json index 5738c4be7b1..0cdb4596b7c 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21966.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21966.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.873", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-flakey: Fix memory corruption in optional corrupt_bio_byte feature\n\nFix memory corruption due to incorrect parameter being passed to bio_init" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm-flakey: corrige la corrupci\u00f3n de memoria en la funci\u00f3n opcional corrupt_bio_byte Corrige la corrupci\u00f3n de memoria debido al par\u00e1metro incorrecto que se pasa a bio_init" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21967.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21967.json index 6414d551a1c..d04b9ede7b5 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21967.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21967.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:27.983", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix use-after-free in ksmbd_free_work_struct\n\n->interim_entry of ksmbd_work could be deleted after oplock is freed.\nWe don't need to manage it with linked list. The interim request could be\nimmediately sent whenever a oplock break wait is needed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige el problema de use-after-free en ksmbd_free_work_struct -> la entrada provisional de ksmbd_work podr\u00eda eliminarse tras la liberaci\u00f3n del bloqueo de oper\u00f3n. No es necesario gestionarlo con una lista enlazada. La solicitud provisional podr\u00eda enviarse inmediatamente cuando se requiera una espera para la interrupci\u00f3n del bloqueo de oper\u00f3n." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21968.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21968.json index b4142260e8a..0321ec4cf1b 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21968.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21968.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:28.090", "lastModified": "2025-04-10T13:15:48.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21969.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21969.json index 4b6bc21354c..292b509cc56 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21969.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21969.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-01T16:15:28.207", "lastModified": "2025-04-01T20:26:01.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n \n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: Se corrige la lectura de slab-use-after-free en l2cap_send_cmd. Despu\u00e9s de que el comando hci sync libere l2cap_conn, la cola de trabajo de datos de recepci\u00f3n de hci hace referencia a la l2cap_conn liberada al enviar a la capa superior. Se a\u00f1ade el bloqueo de desarrollo de hci a la cola de trabajo de datos de recepci\u00f3n de hci para sincronizar ambos. [1] ERROR: KASAN: slab-use-after-free en l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff8880271a4000 por la tarea kworker/u9:2/5837 CPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 No contaminado 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: hci1 hci_rx_work Rastreo de llamadas: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline] l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954 l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline] l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline] l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817 hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline] hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Asignado por la tarea 5837: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860 l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239 hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline] hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726 hci_event_func net/bluetooth/hci_event.c:7473 [inline] hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525 hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Freed by task 54: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4613 [inline] kfree+0x196/0x430 mm/slub.c:4761 l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235 hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline] hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266 hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr ---truncado---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21972.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21972.json index 0bad1973300..af794a2f2ad 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21972.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21972.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: unshare packets when reassembling\n\nEnsure that the frag_list used for reassembly isn't shared with other\npackets. This avoids incorrect reassembly when packets are cloned, and\nprevents a memory leak due to circular references between fragments and\ntheir skb_shared_info.\n\nThe upcoming MCTP-over-USB driver uses skb_clone which can trigger the\nproblem - other MCTP drivers don't share SKBs.\n\nA kunit test is added to reproduce the issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mctp: paquetes no compartidos al reensamblar. Aseg\u00farese de que la lista de fragmentos utilizada para el reensamblado no se comparta con otros paquetes. Esto evita un reensamblado incorrecto al clonar paquetes y previene una fuga de memoria debido a referencias circulares entre fragmentos y su skb_shared_info. El pr\u00f3ximo controlador MCTP sobre USB utiliza skb_clone, lo que puede desencadenar el problema; otros controladores MCTP no comparten los SKB. Se ha a\u00f1adido una prueba kunit para reproducir el problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21973.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21973.json index 9ca80c2d4b0..223ee5c9a9b 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21973.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21973.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx}\n\nWhen qstats-get operation is executed, callbacks of netdev_stats_ops\nare called. The bnxt_get_queue_stats{rx | tx} collect per-queue stats\nfrom sw_stats in the rings.\nBut {rx | tx | cp}_ring are allocated when the interface is up.\nSo, these rings are not allocated when the interface is down.\n\nThe qstats-get is allowed even if the interface is down. However,\nthe bnxt_get_queue_stats{rx | tx}() accesses cp_ring and tx_ring\nwithout null check.\nSo, it needs to avoid accessing rings if the interface is down.\n\nReproducer:\n ip link set $interface down\n ./cli.py --spec netdev.yaml --dump qstats-get\nOR\n ip link set $interface down\n python ./stats.py\n\nSplat looks like:\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 1680fa067 P4D 1680fa067 PUD 16be3b067 PMD 0\n Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 UID: 0 PID: 1495 Comm: python3 Not tainted 6.14.0-rc4+ #32 5cd0f999d5a15c574ac72b3e4b907341\n Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021\n RIP: 0010:bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en]\n Code: c6 87 b5 18 00 00 02 eb a2 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 01\n RSP: 0018:ffffabef43cdb7e0 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffc04c8710 RCX: 0000000000000000\n RDX: ffffabef43cdb858 RSI: 0000000000000000 RDI: ffff8d504e850000\n RBP: ffff8d506c9f9c00 R08: 0000000000000004 R09: ffff8d506bcd901c\n R10: 0000000000000015 R11: ffff8d506bcd9000 R12: 0000000000000000\n R13: ffffabef43cdb8c0 R14: ffff8d504e850000 R15: 0000000000000000\n FS: 00007f2c5462b080(0000) GS:ffff8d575f600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000167fd0000 CR4: 00000000007506f0\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x20/0x70\n ? page_fault_oops+0x15a/0x460\n ? sched_balance_find_src_group+0x58d/0xd10\n ? exc_page_fault+0x6e/0x180\n ? asm_exc_page_fault+0x22/0x30\n ? bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en cdd546fd48563c280cfd30e9647efa420db07bf1]\n netdev_nl_stats_by_netdev+0x2b1/0x4e0\n ? xas_load+0x9/0xb0\n ? xas_find+0x183/0x1d0\n ? xa_find+0x8b/0xe0\n netdev_nl_qstats_get_dumpit+0xbf/0x1e0\n genl_dumpit+0x31/0x90\n netlink_dump+0x1a8/0x360" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: bnxt: corrige el p\u00e1nico del kernel en bnxt_get_queue_stats{rx | tx} Cuando se ejecuta la operaci\u00f3n qstats-get, se llaman las devoluciones de llamada de netdev_stats_ops. bnxt_get_queue_stats{rx | tx} recopila estad\u00edsticas por cola de sw_stats en los anillos. Pero {rx | tx | cp}_ring se asignan cuando la interfaz est\u00e1 activa. Por lo tanto, estos anillos no se asignan cuando la interfaz est\u00e1 inactiva. qstats-get est\u00e1 permitido incluso si la interfaz est\u00e1 inactiva. Sin embargo, bnxt_get_queue_stats{rx | tx}() accede a cp_ring y tx_ring sin comprobaci\u00f3n de valores nulos. Por lo tanto, debe evitar acceder a los anillos si la interfaz est\u00e1 inactiva. Reproductor: ip link set $interface down ./cli.py --spec netdev.yaml --dump qstats-get O ip link set $interface down python ./stats.py El problema se parece a esto: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000000 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 1680fa067 P4D 1680fa067 PUD 16be3b067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 UID: 0 PID: 1495 Comm: python3 No contaminado 6.14.0-rc4+ #32 5cd0f999d5a15c574ac72b3e4b907341 Nombre del hardware: Nombre del producto del sistema ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en] Code: c6 87 b5 18 00 00 02 eb a2 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 01 RSP: 0018:ffffabef43cdb7e0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffffc04c8710 RCX: 0000000000000000 RDX: ffffabef43cdb858 RSI: 0000000000000000 RDI: ffff8d504e850000 RBP: ffff8d506c9f9c00 R08: 0000000000000004 R09: ffff8d506bcd901c R10: 0000000000000015 R11: ffff8d506bcd9000 R12: 0000000000000000 R13: ffffabef43cdb8c0 R14: ffff8d504e850000 R15: 0000000000000000 FS: 00007f2c5462b080(0000) GS:ffff8d575f600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000167fd0000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: ? __die+0x20/0x70 ? page_fault_oops+0x15a/0x460 ? sched_balance_find_src_group+0x58d/0xd10 ? exc_page_fault+0x6e/0x180 ? asm_exc_page_fault+0x22/0x30 ? bnxt_get_queue_stats_rx+0xf/0x70 [bnxt_en cdd546fd48563c280cfd30e9647efa420db07bf1] netdev_nl_stats_by_netdev+0x2b1/0x4e0 ? xas_load+0x9/0xb0 ? xas_find+0x183/0x1d0 ? xa_find+0x8b/0xe0 netdev_nl_qstats_get_dumpit+0xbf/0x1e0 genl_dumpit+0x31/0x90 netlink_dump+0x1a8/0x360 " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21974.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21974.json index 7ec85461017..2cdcb40ee80 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21974.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21974.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc()\n\nThe bnxt_queue_mem_alloc() is called to allocate new queue memory when\na queue is restarted.\nIt internally accesses rx buffer descriptor corresponding to the index.\nThe rx buffer descriptor is allocated and set when the interface is up\nand it's freed when the interface is down.\nSo, if queue is restarted if interface is down, kernel panic occurs.\n\nSplat looks like:\n BUG: unable to handle page fault for address: 000000000000b240\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 3 UID: 0 PID: 1563 Comm: ncdevmem2 Not tainted 6.14.0-rc2+ #9 844ddba6e7c459cafd0bf4db9a3198e\n Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021\n RIP: 0010:bnxt_queue_mem_alloc+0x3f/0x4e0 [bnxt_en]\n Code: 41 54 4d 89 c4 4d 69 c0 c0 05 00 00 55 48 89 f5 53 48 89 fb 4c 8d b5 40 05 00 00 48 83 ec 15\n RSP: 0018:ffff9dcc83fef9e8 EFLAGS: 00010202\n RAX: ffffffffc0457720 RBX: ffff934ed8d40000 RCX: 0000000000000000\n RDX: 000000000000001f RSI: ffff934ea508f800 RDI: ffff934ea508f808\n RBP: ffff934ea508f800 R08: 000000000000b240 R09: ffff934e84f4b000\n R10: ffff9dcc83fefa30 R11: ffff934e84f4b000 R12: 000000000000001f\n R13: ffff934ed8d40ac0 R14: ffff934ea508fd40 R15: ffff934e84f4b000\n FS: 00007fa73888c740(0000) GS:ffff93559f780000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000000b240 CR3: 0000000145a2e000 CR4: 00000000007506f0\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x20/0x70\n ? page_fault_oops+0x15a/0x460\n ? exc_page_fault+0x6e/0x180\n ? asm_exc_page_fault+0x22/0x30\n ? __pfx_bnxt_queue_mem_alloc+0x10/0x10 [bnxt_en 7f85e76f4d724ba07471d7e39d9e773aea6597b7]\n ? bnxt_queue_mem_alloc+0x3f/0x4e0 [bnxt_en 7f85e76f4d724ba07471d7e39d9e773aea6597b7]\n netdev_rx_queue_restart+0xc5/0x240\n net_devmem_bind_dmabuf_to_queue+0xf8/0x200\n netdev_nl_bind_rx_doit+0x3a7/0x450\n genl_family_rcv_msg_doit+0xd9/0x130\n genl_rcv_msg+0x184/0x2b0\n ? __pfx_netdev_nl_bind_rx_doit+0x10/0x10\n ? __pfx_genl_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x54/0x100\n genl_rcv+0x24/0x40\n..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc(). Se llama a bnxt_queue_mem_alloc() para asignar nueva memoria de cola cuando esta se reinicia. Accede internamente al descriptor de b\u00fafer rx correspondiente al \u00edndice. El descriptor de b\u00fafer rx se asigna y se establece cuando la interfaz est\u00e1 activa y se libera cuando esta se cae. Por lo tanto, si la cola se reinicia mientras la interfaz est\u00e1 ca\u00edda, se produce un p\u00e1nico del kernel. El problema se ve as\u00ed: ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: 000000000000b240 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 UID: 0 PID: 1563 Comm: ncdevmem2 No contaminado 6.14.0-rc2+ #9 844ddba6e7c459cafd0bf4db9a3198e Nombre del hardware: Nombre del producto del sistema ASUS/PRIME Z690-P D4, BIOS 0603 11/01/2021 RIP: 0010:bnxt_queue_mem_alloc+0x3f/0x4e0 [bnxt_en] Code: 41 54 4d 89 c4 4d 69 c0 c0 05 00 00 55 48 89 f5 53 48 89 fb 4c 8d b5 40 05 00 00 48 83 ec 15 RSP: 0018:ffff9dcc83fef9e8 EFLAGS: 00010202 RAX: ffffffffc0457720 RBX: ffff934ed8d40000 RCX: 0000000000000000 RDX: 000000000000001f RSI: ffff934ea508f800 RDI: ffff934ea508f808 RBP: ffff934ea508f800 R08: 000000000000b240 R09: ffff934e84f4b000 R10: ffff9dcc83fefa30 R11: ffff934e84f4b000 R12: 000000000000001f R13: ffff934ed8d40ac0 R14: ffff934ea508fd40 R15: ffff934e84f4b000 FS: 00007fa73888c740(0000) GS:ffff93559f780000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000b240 CR3: 0000000145a2e000 CR4: 00000000007506f0 PKRU: 55555554 Call Trace: ? __die+0x20/0x70 ? page_fault_oops+0x15a/0x460 ? exc_page_fault+0x6e/0x180 ? asm_exc_page_fault+0x22/0x30 ? __pfx_bnxt_queue_mem_alloc+0x10/0x10 [bnxt_en 7f85e76f4d724ba07471d7e39d9e773aea6597b7] ? bnxt_queue_mem_alloc+0x3f/0x4e0 [bnxt_en 7f85e76f4d724ba07471d7e39d9e773aea6597b7] netdev_rx_queue_restart+0xc5/0x240 net_devmem_bind_dmabuf_to_queue+0xf8/0x200 netdev_nl_bind_rx_doit+0x3a7/0x450 genl_family_rcv_msg_doit+0xd9/0x130 genl_rcv_msg+0x184/0x2b0 ? __pfx_netdev_nl_bind_rx_doit+0x10/0x10 ? __pfx_genl_rcv_msg+0x10/0x10 netlink_rcv_skb+0x54/0x100 genl_rcv+0x24/0x40 ... " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21976.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21976.json index 8e8b8bd6ad0..e82a3c78ac0 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21976.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21976.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: hyperv_fb: Allow graceful removal of framebuffer\n\nWhen a Hyper-V framebuffer device is unbind, hyperv_fb driver tries to\nrelease the framebuffer forcefully. If this framebuffer is in use it\nproduce the following WARN and hence this framebuffer is never released.\n\n[ 44.111220] WARNING: CPU: 35 PID: 1882 at drivers/video/fbdev/core/fb_info.c:70 framebuffer_release+0x2c/0x40\n< snip >\n[ 44.111289] Call Trace:\n[ 44.111290] \n[ 44.111291] ? show_regs+0x6c/0x80\n[ 44.111295] ? __warn+0x8d/0x150\n[ 44.111298] ? framebuffer_release+0x2c/0x40\n[ 44.111300] ? report_bug+0x182/0x1b0\n[ 44.111303] ? handle_bug+0x6e/0xb0\n[ 44.111306] ? exc_invalid_op+0x18/0x80\n[ 44.111308] ? asm_exc_invalid_op+0x1b/0x20\n[ 44.111311] ? framebuffer_release+0x2c/0x40\n[ 44.111313] ? hvfb_remove+0x86/0xa0 [hyperv_fb]\n[ 44.111315] vmbus_remove+0x24/0x40 [hv_vmbus]\n[ 44.111323] device_remove+0x40/0x80\n[ 44.111325] device_release_driver_internal+0x20b/0x270\n[ 44.111327] ? bus_find_device+0xb3/0xf0\n\nFix this by moving the release of framebuffer and assosiated memory\nto fb_ops.fb_destroy function, so that framebuffer framework handles\nit gracefully.\n\nWhile we fix this, also replace manual registrations/unregistration of\nframebuffer with devm_register_framebuffer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: hyperv_fb: Permite la eliminaci\u00f3n ordenada del framebuffer. Cuando se desvincula un dispositivo framebuffer de Hyper-V, el controlador hyperv_fb intenta liberarlo forzosamente. Si este framebuffer est\u00e1 en uso, genera la siguiente advertencia y, por lo tanto, nunca se libera. [44.111220] ADVERTENCIA: CPU: 35 PID: 1882 en drivers/video/fbdev/core/fb_info.c:70 framebuffer_release+0x2c/0x40 < snip > [44.111289] Rastreo de llamadas: [ 44.111290] [ 44.111291] ? show_regs+0x6c/0x80 [ 44.111295] ? __warn+0x8d/0x150 [ 44.111298] ? framebuffer_release+0x2c/0x40 [ 44.111300] ? report_bug+0x182/0x1b0 [ 44.111303] ? handle_bug+0x6e/0xb0 [ 44.111306] ? exc_invalid_op+0x18/0x80 [ 44.111308] ? asm_exc_invalid_op+0x1b/0x20 [ 44.111311] ? framebuffer_release+0x2c/0x40 [ 44.111313] ? hvfb_remove+0x86/0xa0 [hyperv_fb] [ 44.111315] vmbus_remove+0x24/0x40 [hv_vmbus] [ 44.111323] device_remove+0x40/0x80 [ 44.111325] device_release_driver_internal+0x20b/0x270 [ 44.111327] ? bus_find_device+0xb3/0xf0. Solucione esto trasladando la liberaci\u00f3n del framebuffer y la memoria asociada a la funci\u00f3n fb_ops.fb_destroy, para que el framework del framebuffer lo gestione correctamente. Mientras lo solucionamos, tambi\u00e9n reemplace el registro/desregistro manual del framebuffer con devm_register_framebuffer." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21977.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21977.json index 176bf2fa107..ee0ca50bfed 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21977.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21977.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs\n\nGen 2 Hyper-V VMs boot via EFI and have a standard EFI framebuffer\ndevice. When the kdump kernel runs in such a VM, loading the efifb\ndriver may hang because of accessing the framebuffer at the wrong\nmemory address.\n\nThe scenario occurs when the hyperv_fb driver in the original kernel\nmoves the framebuffer to a different MMIO address because of conflicts\nwith an already-running efifb or simplefb driver. The hyperv_fb driver\nthen informs Hyper-V of the change, which is allowed by the Hyper-V FB\nVMBus device protocol. However, when the kexec command loads the kdump\nkernel into crash memory via the kexec_file_load() system call, the\nsystem call doesn't know the framebuffer has moved, and it sets up the\nkdump screen_info using the original framebuffer address. The transition\nto the kdump kernel does not go through the Hyper-V host, so Hyper-V\ndoes not reset the framebuffer address like it would do on a reboot.\nWhen efifb tries to run, it accesses a non-existent framebuffer\naddress, which traps to the Hyper-V host. After many such accesses,\nthe Hyper-V host thinks the guest is being malicious, and throttles\nthe guest to the point that it runs very slowly or appears to have hung.\n\nWhen the kdump kernel is loaded into crash memory via the kexec_load()\nsystem call, the problem does not occur. In this case, the kexec command\nbuilds the screen_info table itself in user space from data returned\nby the FBIOGET_FSCREENINFO ioctl against /dev/fb0, which gives it the\nnew framebuffer location.\n\nThis problem was originally reported in 2020 [1], resulting in commit\n3cb73bc3fa2a (\"hyperv_fb: Update screen_info after removing old\nframebuffer\"). This commit solved the problem by setting orig_video_isVGA\nto 0, so the kdump kernel was unaware of the EFI framebuffer. The efifb\ndriver did not try to load, and no hang occurred. But in 2024, commit\nc25a19afb81c (\"fbdev/hyperv_fb: Do not clear global screen_info\")\neffectively reverted 3cb73bc3fa2a. Commit c25a19afb81c has no reference\nto 3cb73bc3fa2a, so perhaps it was done without knowing the implications\nthat were reported with 3cb73bc3fa2a. In any case, as of commit\nc25a19afb81c, the original problem came back again.\n\nInterestingly, the hyperv_drm driver does not have this problem because\nit never moves the framebuffer. The difference is that the hyperv_drm\ndriver removes any conflicting framebuffers *before* allocating an MMIO\naddress, while the hyperv_fb drivers removes conflicting framebuffers\n*after* allocating an MMIO address. With the \"after\" ordering, hyperv_fb\nmay encounter a conflict and move the framebuffer to a different MMIO\naddress. But the conflict is essentially bogus because it is removed\na few lines of code later.\n\nRather than fix the problem with the approach from 2020 in commit\n3cb73bc3fa2a, instead slightly reorder the steps in hyperv_fb so\nconflicting framebuffers are removed before allocating an MMIO address.\nThen the default framebuffer MMIO address should always be available, and\nthere's never any confusion about which framebuffer address the kdump\nkernel should use -- it's always the original address provided by\nthe Hyper-V host. This approach is already used by the hyperv_drm\ndriver, and is consistent with the usage guidelines at the head of\nthe module with the function aperture_remove_conflicting_devices().\n\nThis approach also solves a related minor problem when kexec_load()\nis used to load the kdump kernel. With current code, unbinding and\nrebinding the hyperv_fb driver could result in the framebuffer moving\nback to the default framebuffer address, because on the rebind there\nare no conflicts. If such a move is done after the kdump kernel is\nloaded with the new framebuffer address, at kdump time it could again\nhave the wrong address.\n\nThis problem and fix are described in terms of the kdump kernel, but\nit can also occur\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: hyperv_fb: Se corrige el bloqueo del kernel kdump en m\u00e1quinas virtuales Hyper-V Gen 2. Las m\u00e1quinas virtuales Hyper-V Gen 2 arrancan mediante EFI y tienen un dispositivo de b\u00fafer de trama EFI est\u00e1ndar. Cuando el kernel kdump se ejecuta en una m\u00e1quina virtual de este tipo, la carga del controlador efifb puede bloquearse debido al acceso al b\u00fafer de trama en la direcci\u00f3n de memoria incorrecta. Esto ocurre cuando el controlador hyperv_fb del kernel original mueve el b\u00fafer de trama a una direcci\u00f3n MMIO diferente debido a conflictos con un controlador efifb o simplefb ya en ejecuci\u00f3n. El controlador hyperv_fb informa a Hyper-V del cambio, permitido por el protocolo de dispositivo VMBus de Hyper-V FB. Sin embargo, cuando el comando kexec carga el kernel kdump en la memoria de fallos mediante la llamada al sistema kexec_file_load(), esta desconoce el desplazamiento del framebuffer y configura el screen_info de kdump con la direcci\u00f3n original del framebuffer. La transici\u00f3n al kernel kdump no pasa por el host de Hyper-V, por lo que Hyper-V no restablece la direcci\u00f3n del framebuffer como lo har\u00eda al reiniciar. Cuando efifb intenta ejecutarse, accede a una direcci\u00f3n de framebuffer inexistente, lo que redirige al host de Hyper-V. Tras varios accesos de este tipo, el host de Hyper-V considera que el invitado es malicioso y lo limita hasta el punto de que se ejecuta muy lentamente o parece haberse colgado. Cuando el kernel kdump se carga en la memoria de fallos mediante la llamada al sistema kexec_load(), el problema no se produce. En este caso, el comando kexec crea la tabla screen_info en el espacio de usuario a partir de los datos devueltos por el comando ioctl FBIOGET_FSCREENINFO contra /dev/fb0, lo que le asigna la nueva ubicaci\u00f3n del framebuffer. Este problema se report\u00f3 originalmente en 2020 [1], lo que result\u00f3 en el commit 3cb73bc3fa2a (\"hyperv_fb: Actualizar screen_info tras eliminar el framebuffer antiguo\"). Esta confirmaci\u00f3n solucion\u00f3 el problema estableciendo orig_video_isVGA a 0, por lo que el kernel de kdump desconoc\u00eda el framebuffer EFI. El controlador efifb no intent\u00f3 cargarse y no se produjo ning\u00fan bloqueo. Sin embargo, en 2024, el commit c25a19afb81c (\"fbdev/hyperv_fb: No borrar la informaci\u00f3n global del screen_info\") revirti\u00f3 eficazmente el problema 3cb73bc3fa2a. el commit c25a19afb81c no hace referencia a 3cb73bc3fa2a, por lo que quiz\u00e1s se realiz\u00f3 sin conocer las implicaciones reportadas con 3cb73bc3fa2a. En cualquier caso, a partir de el commit c25a19afb81c, el problema original reapareci\u00f3. Curiosamente, el controlador hyperv_drm no presenta este problema porque nunca mueve el framebuffer. La diferencia radica en que el controlador hyperv_drm elimina cualquier framebuffer conflictivo *antes* de asignar una direcci\u00f3n MMIO, mientras que el controlador hyperv_fb lo hace *despu\u00e9s* de asignar una direcci\u00f3n MMIO. Con la ordenaci\u00f3n \"despu\u00e9s\", hyperv_fb puede encontrar un conflicto y mover el framebuffer a una direcci\u00f3n MMIO diferente. Sin embargo, el conflicto es esencialmente falso porque se elimina unas l\u00edneas de c\u00f3digo m\u00e1s adelante. En lugar de corregir el problema con el enfoque de 2020 en el commit 3cb73bc3fa2a, se recomienda reordenar ligeramente los pasos en hyperv_fb para eliminar los framebuffers conflictivos antes de asignar una direcci\u00f3n MMIO. De esta forma, la direcci\u00f3n MMIO predeterminada del framebuffer siempre estar\u00e1 disponible y nunca habr\u00e1 confusi\u00f3n sobre qu\u00e9 direcci\u00f3n debe usar el kernel de kdump: siempre es la direcci\u00f3n original proporcionada por el host de Hyper-V. Este enfoque ya lo utiliza el controlador hyperv_drm y es coherente con las directrices de uso que se indican al principio del m\u00f3dulo con la funci\u00f3n aperture_remove_conflicting_devices(). Este enfoque tambi\u00e9n resuelve un problema menor relacionado cuando se utiliza kexec_load() para cargar el kernel de kdump. Con el c\u00f3digo actual, desvincular y volver a vincular el controlador hyperv_fb podr\u00eda---truncado---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21978.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21978.json index 7a863cd6caa..cfaa92454a3 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21978.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21978.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/hyperv: Fix address space leak when Hyper-V DRM device is removed\n\nWhen a Hyper-V DRM device is probed, the driver allocates MMIO space for\nthe vram, and maps it cacheable. If the device removed, or in the error\npath for device probing, the MMIO space is released but no unmap is done.\nConsequently the kernel address space for the mapping is leaked.\n\nFix this by adding iounmap() calls in the device removal path, and in the\nerror path during device probing." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/hyperv: Se soluciona la fuga de espacio de direcciones al eliminar un dispositivo DRM de Hyper-V. Al sondear un dispositivo DRM de Hyper-V, el controlador asigna espacio MMIO para la VRAM y lo asigna como cach\u00e9. Si se elimina el dispositivo, o si se encuentra en la ruta de error para el sondeo del dispositivo, se libera el espacio MMIO, pero no se desasigna. En consecuencia, se filtra el espacio de direcciones del kernel para la asignaci\u00f3n. Para solucionar esto, agregue llamadas a iounmap() en la ruta de eliminaci\u00f3n del dispositivo y en la ruta de error durante el sondeo del dispositivo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21983.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21983.json index 85acad07dbb..be2acc5342d 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21983.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21983.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq\n\nCurrently kvfree_rcu() APIs use a system workqueue which is\n\"system_unbound_wq\" to driver RCU machinery to reclaim a memory.\n\nRecently, it has been noted that the following kernel warning can\nbe observed:\n\n\nworkqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work\n WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120\n Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...\n CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1\n Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023\n Workqueue: nvme-wq nvme_scan_work\n RIP: 0010:check_flush_dependency+0x112/0x120\n Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...\n RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082\n RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027\n RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88\n RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd\n R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400\n R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000\n CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0\n PKRU: 55555554\n Call Trace:\n \n ? __warn+0xa4/0x140\n ? check_flush_dependency+0x112/0x120\n ? report_bug+0xe1/0x140\n ? check_flush_dependency+0x112/0x120\n ? handle_bug+0x5e/0x90\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? timer_recalc_next_expiry+0x190/0x190\n ? check_flush_dependency+0x112/0x120\n ? check_flush_dependency+0x112/0x120\n __flush_work.llvm.1643880146586177030+0x174/0x2c0\n flush_rcu_work+0x28/0x30\n kvfree_rcu_barrier+0x12f/0x160\n kmem_cache_destroy+0x18/0x120\n bioset_exit+0x10c/0x150\n disk_release.llvm.6740012984264378178+0x61/0xd0\n device_release+0x4f/0x90\n kobject_put+0x95/0x180\n nvme_put_ns+0x23/0xc0\n nvme_remove_invalid_namespaces+0xb3/0xd0\n nvme_scan_work+0x342/0x490\n process_scheduled_works+0x1a2/0x370\n worker_thread+0x2ff/0x390\n ? pwq_release_workfn+0x1e0/0x1e0\n kthread+0xb1/0xe0\n ? __kthread_parkme+0x70/0x70\n ret_from_fork+0x30/0x40\n ? __kthread_parkme+0x70/0x70\n ret_from_fork_asm+0x11/0x20\n \n ---[ end trace 0000000000000000 ]---\n\n\nTo address this switch to use of independent WQ_MEM_RECLAIM\nworkqueue, so the rules are not violated from workqueue framework\npoint of view.\n\nApart of that, since kvfree_rcu() does reclaim memory it is worth\nto go with WQ_MEM_RECLAIM type of wq because it is designed for\nthis purpose." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slab/kvfree_rcu: Cambiar a WQ_MEM_RECLAIM wq Actualmente, las API kvfree_rcu() utilizan una cola de trabajo del sistema que es \"system_unbound_wq\" para controlar la maquinaria RCU para recuperar una memoria. Recientemente, se ha observado la siguiente advertencia del kernel: workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work ADVERTENCIA: CPU: 21 PID: 330 en kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120 M\u00f3dulos vinculados: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ... CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: GE 6.13.2-0_g925d379822da #1 Nombre del hardware: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 01/02/2023 Cola de trabajo: nvme-wq nvme_scan_work RIP: 0010:check_flush_dependency+0x112/0x120 C\u00f3digo: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ... RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082 RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027 RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88 RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400 R13: 0000000000000000 R14: ffff88907f420fb8 R15: 000000000000000 FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000 CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0 PKRU: 55555554 Seguimiento de llamadas: ? __warn+0xa4/0x140 ? check_flush_dependency+0x112/0x120 ? report_bug+0xe1/0x140 ? check_flush_dependency+0x112/0x120 ? handle_bug+0x5e/0x90 ? exc_invalid_op+0x16/0x40 ? asm_exc_invalid_op+0x16/0x20 ? temporizador_recalc_pr\u00f3xima_expiraci\u00f3n+0x190/0x190 ? comprobaci\u00f3n_vaciado_dependencia+0x112/0x120 ? check_flush_dependency+0x112/0x120 __flush_work.llvm.1643880146586177030+0x174/0x2c0 flush_rcu_work+0x28/0x30 kvfree_rcu_barrier+0x12f/0x160 kmem_cache_destroy+0x18/0x120 bioset_exit+0x10c/0x150 disk_release.llvm.6740012984264378178+0x61/0xd0 device_release+0x4f/0x90 kobject_put+0x95/0x180 nvme_put_ns+0x23/0xc0 nvme_remove_invalid_namespaces+0xb3/0xd0 nvme_scan_work+0x342/0x490 process_scheduled_works+0x1a2/0x370 work_thread+0x2ff/0x390 ? pwq_release_workfn+0x1e0/0x1e0 kthread+0xb1/0xe0 ? __kthread_parkme+0x70/0x70 ret_from_fork+0x30/0x40 ? __kthread_parkme+0x70/0x70 ret_from_fork_asm+0x11/0x20 ---[ end trace 0000000000000000 ]--- Para solucionar esto, se cambia al uso de la cola de trabajo independiente WQ_MEM_RECLAIM, de modo que no se violen las reglas desde la perspectiva del marco de trabajo de la cola de trabajo. Adem\u00e1s, dado que kvfree_rcu() recupera memoria, conviene usar el tipo de cola de trabajo WQ_MEM_RECLAIM, ya que est\u00e1 dise\u00f1ado para este prop\u00f3sito." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21985.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21985.json index 1ef10cf9441..62a4160f72e 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21985.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix out-of-bound accesses\n\n[WHAT & HOW]\nhpo_stream_to_link_encoder_mapping has size MAX_HPO_DP2_ENCODERS(=4),\nbut location can have size up to 6. As a result, it is necessary to\ncheck location against MAX_HPO_DP2_ENCODERS.\n\nSimiliarly, disp_cfg_stream_location can be used as an array index which\nshould be 0..5, so the ASSERT's conditions should be less without equal." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de accesos fuera de los l\u00edmites [QU\u00c9 Y C\u00d3MO] hpo_stream_to_link_encoder_mapping tiene un tama\u00f1o de MAX_HPO_DP2_ENCODERS(=4), pero la ubicaci\u00f3n puede tener un tama\u00f1o de hasta 6. Por lo tanto, es necesario comparar la ubicaci\u00f3n con MAX_HPO_DP2_ENCODERS. De igual forma, disp_cfg_stream_location puede usarse como un \u00edndice de matriz que debe ser de 0 a 5, por lo que las condiciones de ASSERT deben ser menores sin igual." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21986.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21986.json index dd409e4f346..02eea54bb2b 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21986.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: switchdev: Convert blocking notification chain to a raw one\n\nA blocking notification chain uses a read-write semaphore to protect the\nintegrity of the chain. The semaphore is acquired for writing when\nadding / removing notifiers to / from the chain and acquired for reading\nwhen traversing the chain and informing notifiers about an event.\n\nIn case of the blocking switchdev notification chain, recursive\nnotifications are possible which leads to the semaphore being acquired\ntwice for reading and to lockdep warnings being generated [1].\n\nSpecifically, this can happen when the bridge driver processes a\nSWITCHDEV_BRPORT_UNOFFLOADED event which causes it to emit notifications\nabout deferred events when calling switchdev_deferred_process().\n\nFix this by converting the notification chain to a raw notification\nchain in a similar fashion to the netdev notification chain. Protect\nthe chain using the RTNL mutex by acquiring it when modifying the chain.\nEvents are always informed under the RTNL mutex, but add an assertion in\ncall_switchdev_blocking_notifiers() to make sure this is not violated in\nthe future.\n\nMaintain the \"blocking\" prefix as events are always emitted from process\ncontext and listeners are allowed to block.\n\n[1]:\nWARNING: possible recursive locking detected\n6.14.0-rc4-custom-g079270089484 #1 Not tainted\n--------------------------------------------\nip/52731 is trying to acquire lock:\nffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0\n\nbut task is already holding lock:\nffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0\n\nother info that might help us debug this:\nPossible unsafe locking scenario:\nCPU0\n----\nlock((switchdev_blocking_notif_chain).rwsem);\nlock((switchdev_blocking_notif_chain).rwsem);\n\n*** DEADLOCK ***\nMay be due to missing lock nesting notation\n3 locks held by ip/52731:\n #0: ffffffff84f795b0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x727/0x1dc0\n #1: ffffffff8731f628 (&net->rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x790/0x1dc0\n #2: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0\n\nstack backtrace:\n...\n? __pfx_down_read+0x10/0x10\n? __pfx_mark_lock+0x10/0x10\n? __pfx_switchdev_port_attr_set_deferred+0x10/0x10\nblocking_notifier_call_chain+0x58/0xa0\nswitchdev_port_attr_notify.constprop.0+0xb3/0x1b0\n? __pfx_switchdev_port_attr_notify.constprop.0+0x10/0x10\n? mark_held_locks+0x94/0xe0\n? switchdev_deferred_process+0x11a/0x340\nswitchdev_port_attr_set_deferred+0x27/0xd0\nswitchdev_deferred_process+0x164/0x340\nbr_switchdev_port_unoffload+0xc8/0x100 [bridge]\nbr_switchdev_blocking_event+0x29f/0x580 [bridge]\nnotifier_call_chain+0xa2/0x440\nblocking_notifier_call_chain+0x6e/0xa0\nswitchdev_bridge_port_unoffload+0xde/0x1a0\n..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: switchdev: Convertir cadena de notificaci\u00f3n de bloqueo en una sin procesar Una cadena de notificaci\u00f3n de bloqueo utiliza un sem\u00e1foro de lectura y escritura para proteger la integridad de la cadena. El sem\u00e1foro se adquiere para escritura al agregar o quitar notificadores a o de la cadena y se adquiere para lectura al recorrer la cadena e informar a los notificadores sobre un evento. En el caso de la cadena de notificaci\u00f3n de bloqueo switchdev, son posibles las notificaciones recursivas, lo que lleva a que el sem\u00e1foro se adquiera dos veces para lectura y a que se generen advertencias de lockdep [1]. Espec\u00edficamente, esto puede suceder cuando el controlador del puente procesa un evento SWITCHDEV_BRPORT_UNOFFLOADED que hace que emita notificaciones sobre eventos diferidos al llamar a switchdev_deferred_process(). Corrija esto convirtiendo la cadena de notificaci\u00f3n en una cadena de notificaci\u00f3n sin procesar de manera similar a la cadena de notificaci\u00f3n netdev. Proteja la cadena usando el mutex RTNL adquiri\u00e9ndolo al modificar la cadena. Los eventos siempre se informan bajo el mutex RTNL, pero se debe a\u00f1adir una aserci\u00f3n en call_switchdev_blocking_notifiers() para garantizar que no se viole en el futuro. Mantenga el prefijo \"blocking\", ya que los eventos siempre se emiten desde el contexto del proceso y los oyentes pueden bloquearlos. [1]: ADVERTENCIA: posible bloqueo recursivo detectado 6.14.0-rc4-custom-g079270089484 #1 No contaminado -------------------------------------------- ip/52731 est\u00e1 intentando adquirir el bloqueo: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, en: blocking_notifier_call_chain+0x58/0xa0 pero la tarea ya tiene el bloqueo: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, en: blocking_notifier_call_chain+0x58/0xa0 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock((switchdev_blocking_notif_chain).rwsem); bloquear((switchdev_bloqueo_notificaci\u00f3n_cadena).rwsem); *** BLOQUEO INTERMEDIO *** Puede deberse a la falta de notaci\u00f3n de anidamiento de bloqueos. 3 bloqueos mantenidos por ip/52731: #0: ffffffff84f795b0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x727/0x1dc0 #1: ffffffff8731f628 (&net->rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x790/0x1dc0 #2: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0 stack backtrace: ... ? __pfx_down_read+0x10/0x10 ? __pfx_mark_lock+0x10/0x10 ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10 blocking_notifier_call_chain+0x58/0xa0 switchdev_port_attr_notify.constprop.0+0xb3/0x1b0 ? __pfx_switchdev_port_attr_notify.constprop.0+0x10/0x10 ? mark_held_locks+0x94/0xe0 ? switchdev_deferred_process+0x11a/0x340 switchdev_port_attr_set_deferred+0x27/0xd0 switchdev_deferred_process+0x164/0x340 br_switchdev_port_unoffload+0xc8/0x100 [bridge] br_switchdev_blocking_event+0x29f/0x580 [bridge] notifier_call_chain+0xa2/0x440 blocking_notifier_call_chain+0x6e/0xa0 switchdev_bridge_port_unoffload+0xde/0x1a0 ... " } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21987.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21987.json index d92aec559f5..9c49c4c78be 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21987.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21987.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: init return value in amdgpu_ttm_clear_buffer\n\nOtherwise an uninitialized value can be returned if\namdgpu_res_cleared returns true for all regions.\n\nPossibly closes: https://gitlab.freedesktop.org/drm/amd/-/issues/3812\n\n(cherry picked from commit 7c62aacc3b452f73a1284198c81551035fac6d71)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: valor de retorno inicial en amdgpu_ttm_clear_buffer. De lo contrario, se puede devolver un valor no inicializado si amdgpu_res_cleared devuelve verdadero para todas las regiones. Posible cierre: https://gitlab.freedesktop.org/drm/amd/-/issues/3812 (seleccionado de la confirmaci\u00f3n 7c62aacc3b452f73a1284198c81551035fac6d71)." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21988.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21988.json index bcfae6ec539..aa2b0fdd5f6 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21988.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21988.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/netfs/read_collect: add to next->prev_donated\n\nIf multiple subrequests donate data to the same \"next\" request\n(depending on the subrequest completion order), each of them would\noverwrite the `prev_donated` field, causing data corruption and a\nBUG() crash (\"Can't donate prior to front\")." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/netfs/read_collect: agregar a next->prev_doned Si varias subsolicitudes donan datos a la misma solicitud \"siguiente\" (dependiendo del orden de finalizaci\u00f3n de las subsolicitudes), cada una de ellas sobrescribir\u00eda el campo `prev_doned`, lo que causar\u00eda corrupci\u00f3n de datos y un bloqueo de BUG() (\"No se puede donar antes del front\")." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-219xx/CVE-2025-21995.json b/CVE-2025/CVE-2025-219xx/CVE-2025-21995.json index a25023172fc..8def0615628 100644 --- a/CVE-2025/CVE-2025-219xx/CVE-2025-21995.json +++ b/CVE-2025/CVE-2025-219xx/CVE-2025-21995.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-03T08:15:14.870", "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2124.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2124.json index 6e2c4408458..3f78ef87e28 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2124.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T16:15:11.533", "lastModified": "2025-03-09T16:15:11.533", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json index ffe5981472f..3462c065018 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T13:15:35.683", "lastModified": "2025-03-22T13:15:35.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the \u2018automationId\u2019 parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"automationId\" en todas las versiones hasta la 3.5.1 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json index 4680290f492..a1a7db82263 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json @@ -76,7 +76,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json index 677bca6428b..f43534cff63 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "VMware Aria Operations contains a local privilege escalation vulnerability.\u00a0A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations." + }, + { + "lang": "es", + "value": "VMware Aria Operations presenta una vulnerabilidad de escalada de privilegios locales. Un agente malicioso con privilegios administrativos locales puede escalar sus privilegios a root en el dispositivo que ejecuta VMware Aria Operations." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22277.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22277.json index 69da8397b6f..9881c6e2bf8 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22277.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22277.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in appsbd Vitepos allows Authentication Abuse. This issue affects Vitepos: from n/a through 3.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en appsbd Vitepos permite el abuso de autenticaci\u00f3n. Este problema afecta a Vitepos desde la versi\u00f3n n/d hasta la 3.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22278.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22278.json index f37f028f19b..c7a7fb36e8e 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22278.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22278.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yudleethemes Whitish Lite allows Stored XSS.This issue affects Whitish Lite: from n/a through 2.1.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en yudleethemes Whitish Lite permite XSS almacenado. Este problema afecta a Whitish Lite: desde n/a hasta 2.1.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json index 482f66f324d..f31050c649f 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stencies Stencies allows Reflected XSS. This issue affects Stencies: from n/a through 0.58." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Stencies Stencies permite XSS reflejado. Este problema afecta a Stencies desde n/d hasta la versi\u00f3n 0.58." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json index 59b612e4f66..0c9e000eb39 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Azure offload allows Reflected XSS. This issue affects WP Azure offload: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Azure offload permite XSS reflejado. Este problema afecta a la descarga de WP Azure desde n/d hasta la versi\u00f3n 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json index da279e3b2c3..8d3bb0b1567 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22398.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution as root. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it can be leveraged to completely compromise the operating system. Dell recommends customers to upgrade at the earliest opportunity." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, contiene una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos arbitrarios como root. Esta explotaci\u00f3n podr\u00eda provocar que un atacante se apodere del sistema. Esta vulnerabilidad se considera cr\u00edtica, ya que puede utilizarse para comprometer completamente el sistema operativo. Dell recomienda a los clientes que actualicen su sistema operativo lo antes posible." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json index e03c97a764f..16b472feae3 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DLL hijacking in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an authenticated attacker to escalate to System." + }, + { + "lang": "es", + "value": "El secuestro de DLL en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante autenticado escale al System." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json index 9d3bf59e7c3..eeaabab00e4 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper certificate validation in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to intercept limited traffic between clients and servers." + }, + { + "lang": "es", + "value": "La validaci\u00f3n incorrecta de certificados en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante remoto no autenticado intercepte tr\u00e1fico limitado entre clientes y servidores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json index 31b6a42300c..25342586f69 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL injection in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote authenticated attacker with admin privileges to achieve code execution." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de SQL en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n del c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json index 55e88b63d88..14aa2ad25ce 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An untrusted pointer dereference vulnerability in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an attacker with local access to write arbitrary data into memory causing a denial-of-service condition." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero no confiable en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante con acceso local escriba datos arbitrarios en la memoria, lo que provoca una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json index dbb8038102d..10d6f3bbe34 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected XSS in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to execute arbitrary javascript in a victim's browser. Unlikely user interaction is required." + }, + { + "lang": "es", + "value": "XSS reflejado en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante remoto no autenticado ejecute JavaScript arbitrario en el navegador de la v\u00edctima. Se requiere una interacci\u00f3n improbable del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json index 9e10e3d9c13..392396fa80b 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected XSS in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required." + }, + { + "lang": "es", + "value": "XSS reflejado en Ivanti Endpoint Manager anterior a la versi\u00f3n 2024 SU1 o anterior a la versi\u00f3n 2022 SU7 permite que un atacante remoto no autenticado obtenga privilegios de administrador. Se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22496.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22496.json index 69e135e2652..be1ef9deb94 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22496.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22496.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarMar8x Notif Bell allows Stored XSS.This issue affects Notif Bell: from n/a through 0.9.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en MarMar8x Notif Bell permite XSS almacenado. Este problema afecta a Notif Bell: desde n/a hasta 0.9.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22497.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22497.json index 2d962dd688c..b52d2952daf 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22497.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22497.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in A.H.C. Waasdorp Simple Google Calendar Outlook Events Block Widget allows Stored XSS.This issue affects Simple Google Calendar Outlook Events Block Widget: from n/a through 2.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en A.H.C. Waasdorp Simple Google Calendar Outlook Events Block Widget permite XSS almacenado. Este problema afecta a Simple Google Calendar Outlook Events Block Widget: desde n/d hasta 2.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json index b114b8a8edf..2d10ca1f695 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Improve My City Improve My City allows Reflected XSS. This issue affects Improve My City: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en Improve My City Improve My City permite XSS reflejado. Este problema afecta a Improve My City desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json index 64122312186..5ebabcaf735 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Schedule allows Blind SQL Injection. This issue affects Schedule: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Schedule permite la inyecci\u00f3n SQL ciega. Este problema afecta a Schedule desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json index 2885101f3fc..e17efc9c6a0 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in NotFound PHP/MySQL CPU performance statistics allows Object Injection. This issue affects PHP/MySQL CPU performance statistics: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en NotFound PHP/MySQL CPU performance statistics permite la inyecci\u00f3n de objetos. Este problema afecta a las estad\u00edsticas de rendimiento de CPU de PHP/MySQL: desde n/d hasta la versi\u00f3n 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json index d3adac23848..cc472609ab8 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ULTIMATE VIDEO GALLERY allows Reflected XSS. This issue affects ULTIMATE VIDEO GALLERY: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ULTIMATE VIDEO GALLERY permite XSS reflejado. Este problema afecta a ULTIMATE VIDEO GALLERY desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json index 42abd097a8c..1956d6065c9 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in extendyourweb SUPER RESPONSIVE SLIDER allows Reflected XSS. This issue affects SUPER RESPONSIVE SLIDER: from n/a through 1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en extendyourweb SUPER RESPONSIVE SLIDER permite XSS reflejado. Este problema afecta a SUPER RESPONSIVE SLIDER desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22628.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22628.json index c6da4ab659f..533f352d3a3 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22628.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22628.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Foliovision Filled In allows Stored XSS.This issue affects Filled In: from n/a through 1.9.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Foliovision Filled In permite XSS almacenado. Este problema afecta a Filled In: desde n/a hasta 1.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22629.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22629.json index 702fadee310..0fece51e028 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22629.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22629.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in iNET iNET Webkit allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects iNET Webkit: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en iNET iNET Webkit permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a iNET Webkit: desde n/a hasta 1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22634.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22634.json index e82a8a85f97..5ab5e4b19bd 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22634.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22634.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in MD Abu Jubayer Hossain Easy Booked \u2013 Appointment Booking and Scheduling Management System for WordPress allows Cross Site Request Forgery.This issue affects Easy Booked \u2013 Appointment Booking and Scheduling Management System for WordPress: from n/a through 2.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MD Abu Jubayer Hossain Easy Booked \u2013 Appointment Booking and Scheduling Management System for WordPres, permite Cross-Site Request Forgery. Este problema afecta a Easy Booked, el sistema de gesti\u00f3n de reservas y programaci\u00f3n de citas para WordPress: desde n/d hasta 2.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22637.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22637.json index ecea100c9b8..f4a33ad4abc 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22637.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22637.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in verkkovaraani Print PDF Generator and Publisher allows Cross Site Request Forgery.This issue affects Print PDF Generator and Publisher: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en verkkovaraani Print PDF Generator and Publisher permite Cross-Site Request Forgery. Este problema afecta a Print PDF Generator and Publisher: desde n/a hasta 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22638.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22638.json index 586b8e48a51..3c5343dcb1c 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22638.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22638.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Acowebs Product Table For WooCommerce allows Stored XSS.This issue affects Product Table For WooCommerce: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Acowebs Product Table For WooCommerce permite XSS almacenado. Este problema afecta a Product Table For WooCommerce: desde n/d hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22640.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22640.json index 51f9c9dcd06..a11d4545220 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22640.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22640.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paytm Paytm Payment Donation allows Stored XSS.This issue affects Paytm Payment Donation: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Paytm Paytm Payment Donation permite XSS almacenado. Este problema afecta a Paytm Payment Donation: desde n/d hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22644.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22644.json index 2580b49f726..3ae5125b633 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22644.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22644.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeHunk Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce allows Stored XSS.This issue affects Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ThemeHunk Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommercee permite XSS almacenado. Este problema afecta a Vayu Blocks \u2013 Gutenberg Blocks para WordPress y WooCommerce: desde n/d hasta 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22646.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22646.json index 40052ba324f..21c130f0a70 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22646.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22646.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aThemes aThemes Addons for Elementor allows Stored XSS.This issue affects aThemes Addons for Elementor: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en aThemes Addons for Elementor permite XSS almacenado. Este problema afecta a aThemes Addons for Elementor: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22647.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22647.json index cccef5fbc4f..1d93e0d10b8 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22647.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22647.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in smackcoders AIO Performance Profiler, Monitor, Optimize, Compress & Debug allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AIO Performance Profiler, Monitor, Optimize, Compress & Debug: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en AIO Performance Profiler, Monitor, Optimize, Compress & Debug de smackcoders permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a AIO Performance Profiler, Monitor, Optimize, Compress & Debug: desde n/d hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22648.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22648.json index cf271192bcb..d056411a641 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22648.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22648.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plugin Devs Blog, Posts and Category Filter for Elementor allows Stored XSS.This issue affects Blog, Posts and Category Filter for Elementor: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Plugin Devs Blog, Posts and Category Filter for Elementor permite XSS almacenado. Este problema afecta a Blog, Posts and Category Filter para Elementor: desde n/d hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22652.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22652.json index a301c770467..f70c8ba103f 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22652.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22652.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kendysond Payment Forms for Paystack allows SQL Injection.This issue affects Payment Forms for Paystack: from n/a through 4.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en kendysond Payment Forms for Paystack permite la inyecci\u00f3n SQL. Este problema afecta a los formularios de pago para Paystack: desde n/a hasta 4.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22658.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22658.json index ddd47a5dbc1..14537566dbc 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22658.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Deepak Khokhar Listings for Appfolio allows Stored XSS.This issue affects Listings for Appfolio: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Deepak Khokhar Listings for Appfolio permite XSS almacenado. Este problema afecta a Listings for Appfolio: desde n/d hasta 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json index 27aeaf2c091..a5e042f7eb7 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22659.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeisle Orbit Fox by ThemeIsle allows Stored XSS.This issue affects Orbit Fox by ThemeIsle: from n/a through 2.10.44." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ThemeIsle Orbit Fox de ThemeIsle permite XSS almacenado. Este problema afecta a Orbit Fox de ThemeIsle: desde n/a hasta 2.10.44." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22660.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22660.json index dafe8d655bf..e94a1dca7d1 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22660.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22660.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wolfgang Include Mastodon Feed allows DOM-Based XSS.This issue affects Include Mastodon Feed: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Wolfgang Include Mastodon Feed permite XSS basado en DOM. Este problema afecta a Include Mastodon Feed: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json index 3defccf7eb4..d0117997393 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22664.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-04T15:15:21.003", "lastModified": "2025-02-18T19:15:25.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22665.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22665.json index a4f6083f400..8840d4c067a 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22665.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22665.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Shakeeb Sadikeen RapidLoad allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RapidLoad: from n/a through 2.4.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Shakeeb Sadikeen RapidLoad permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a RapidLoad: desde n/a hasta 2.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22667.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22667.json index d9d21c3867b..c03dbdc68c1 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22667.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22667.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets.This issue affects Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets: from n/a through 1.8.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets. Este problema afecta a Exportar pedido, producto, cliente y cup\u00f3n de WooCommerce a Hojas de c\u00e1lculo de Google: desde n/d hasta 1.8.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22668.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22668.json index bcba4ba521f..be2a1885526 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22668.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22668.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in AwesomeTOGI Awesome Event Booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Event Booking: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en AwesomeTOGI Awesome Event Booking permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Awesome Event Booking: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22669.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22669.json index adb1bc6e31f..8ae73e7befd 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22669.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22669.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in AwesomeTOGI Awesome Event Booking allows Cross Site Request Forgery.This issue affects Awesome Event Booking: from n/a through 2.7.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en AwesomeTOGI Awesome Event Booking permite Cross-Site Request Forgery. Este problema afecta a Awesome Event Booking: desde n/d hasta 2.7.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22670.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22670.json index d8d1b138d13..f9bd6e9d60a 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22670.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22670.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in e4jvikwp VikBooking Hotel Booking Engine & PMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VikBooking Hotel Booking Engine & PMS: from n/a through 1.7.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en e4jvikwp VikBooking Hotel Booking Engine & PMS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a VikBooking Hotel Booking Engine & PMS: desde n/a hasta 1.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22671.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22671.json index f890179a4c1..8a4fd3d0a88 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22671.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22671.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Leap13 Disable Elementor Editor Translation allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Disable Elementor Editor Translation: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Leap13 Disable Elementor Editor Translation permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Disable Elementor Editor Translation: desde n/d hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22672.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22672.json index b1c57a4f7cc..17db5ec44bf 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22672.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in SuitePlugins Video & Photo Gallery for Ultimate Member allows Server Side Request Forgery.This issue affects Video & Photo Gallery for Ultimate Member: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en SuitePlugins Video & Photo Gallery para Ultimate Member permite Server-Side Request Forgery. Este problema afecta a Video & Photo Gallery para Ultimate Member: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22673.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22673.json index b3d05184561..45cc4e5d83b 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22673.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPFactory EAN for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EAN for WooCommerce: from n/a through 5.3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en WPFactory EAN para WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a EAN para WooCommerce: desde n/a hasta 5.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22693.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22693.json index 4e24b84c255..d6d71830d9e 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22693.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22693.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-03T15:15:19.467", "lastModified": "2025-02-03T15:15:19.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json index adb8804753e..d415025e291 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ThimPress LearnPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LearnPress: from n/a through 4.2.7.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en ThimPress LearnPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a LearnPress: desde n/a hasta 4.2.7.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json index 3518d306809..5db4f70b8e9 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Automattic Sensei LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sensei LMS: from n/a through 4.24.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Automattic Sensei LMS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sensei LMS: desde n/a hasta 4.24.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json index 64e2ed033f3..84166534254 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in globalpayments GlobalPayments WooCommerce allows Reflected XSS. This issue affects GlobalPayments WooCommerce: from n/a through 1.13.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-Site Scripting') en globalpayments GlobalPayments WooCommerce permite XSS reflejado. Este problema afecta a GlobalPayments WooCommerce desde n/d hasta la versi\u00f3n 1.13.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22770.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22770.json index a7b0bb1911d..1670a1ab8bf 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22770.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22770.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in EnvoThemes Envo Multipurpose allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envo Multipurpose: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en EnvoThemes Envo Multipurpose permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Envo Multipurpose: desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22816.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22816.json index bf92b0b8f5b..4bae384159b 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22816.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22816.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeTrendy Power Mag allows DOM-Based XSS.This issue affects Power Mag: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CodeTrendy Power Mag permite XSS basado en DOM. Este problema afecta a Power Mag: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json index f9080331b03..d80b77356a5 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Fortinet FortiClient before 7.4.1 may allow the EMS administrator to send messages containing javascript code." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') [CWE-79] en Fortinet FortiClient anterior a 7.4.1 puede permitir que el administrador de EMS env\u00ede mensajes que contengan c\u00f3digo javascript." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json index d3aa599b09c..82861c94560 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@golang.org", "published": "2025-02-26T08:14:24.897", "lastModified": "2025-02-26T15:15:24.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22937.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22937.json index 38718a52279..8625979fa37 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22937.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22937.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in Adtran 411 ONT vL80.00.0011.M2 allows attackers to escalate privileges via unspecified vectors." + }, + { + "lang": "es", + "value": "Un problema en Adtran 411 ONT vL80.00.0011.M2 permite a los atacantes escalar privilegios a trav\u00e9s de vectores no especificados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22938.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22938.json index af2c22f4e93..72619cacdb9 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22938.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adtran 411 ONT L80.00.0011.M2 was discovered to contain weak default passwords." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Adtran 411 ONT L80.00.0011.M2 conten\u00eda contrase\u00f1as predeterminadas d\u00e9biles." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22939.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22939.json index 4ca1ca7e0f6..13403721f25 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22939.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22939.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection vulnerability in the telnet service of Adtran 411 ONT L80.00.0011.M2 allows attackers to escalate privileges to root and execute arbitrary commands." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en el servicio telnet de Adtran 411 ONT L80.00.0011.M2 permite a los atacantes escalar privilegios a root y ejecutar comandos arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22940.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22940.json index 65bb7e53c21..ed78aa34e21 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22940.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22940.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect access control in Adtran 411 ONT L80.00.0011.M2 allows unauthorized attackers to arbitrarily set the admin password." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Adtran 411 ONT L80.00.0011.M2 permite que atacantes no autorizados establezcan arbitrariamente la contrase\u00f1a de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json index 83147a22527..e1b49ed610d 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22941.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection vulnerability in the web interface of Adtran 411 ONT L80.00.0011.M2 allows attackers to escalate privileges to root and execute arbitrary commands." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en la interfaz web de Adtran 411 ONT L80.00.0011.M2 permite a los atacantes escalar privilegios a root y ejecutar comandos arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22953.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22953.json index feb12ff9666..0a6bb263506 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22953.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:17.617", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2205.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2205.json index 49a085406c2..0e23bbe9f8d 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2205.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-12T04:15:19.810", "lastModified": "2025-03-12T04:15:19.810", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json index 2178fcd4259..b8ecad1b45b 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak\ninformation and potential privilege escalation following man in the middle attack." + }, + { + "lang": "es", + "value": "CWE-552: Existe una vulnerabilidad de archivos o directorios accesibles para partes externas a trav\u00e9s de https que podr\u00eda filtrar informaci\u00f3n y provocar una posible escalada de privilegios luego de un ataque del tipo \"man in the middle\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json index 1125a2c5934..0d52cf59c06 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and\nAvailability of engineering workstation when a malicious project file is loaded by a user from the local system." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar una p\u00e9rdida de confidencialidad, integridad y disponibilidad de la estaci\u00f3n de trabajo de ingenier\u00eda cuando un usuario carga un archivo de proyecto malicioso desde el sistema local." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json index 17a6736278f..08314be5119 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the 'process_register' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role." + }, + { + "lang": "es", + "value": "El complemento WP RealEstate para WordPress, utilizado por el tema Homeo, es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 1.6.26 incluida. Esto se debe a restricciones de rol insuficientes en la funci\u00f3n 'process_register'. Esto permite que atacantes no autenticados registren una cuenta con el rol de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2251.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2251.json index b6493aee9a2..157d9f70c5c 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2251.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2251.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication." + }, + { + "lang": "es", + "value": "Existe una falla de seguridad en WildFly y JBoss Enterprise Application Platform (EAP) dentro del mecanismo de invocaci\u00f3n remota de Enterprise JavaBeans (EJB). Esta vulnerabilidad se debe a la deserializaci\u00f3n de datos no confiables gestionada por JBoss Marshalling. Esta falla permite a un atacante enviar un objeto serializado especialmente manipulado, lo que provoca la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json index add1bc8591b..b62b0e5a4d4 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a un puntero no inicializado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json index 1eda4869ec8..65366845c1e 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a un puntero no inicializado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json index c82e18c1dfa..2f721a60fa2 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a un puntero no inicializado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json index 79eab88f3b8..63d22edeb93 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede escribir fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2292.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2292.json index c62bc179ac1..ecb5c3f0853 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2292.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2292.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup and Restore functionality.This issue affects CompletePBX: through 5.2.35." + }, + { + "lang": "es", + "value": "Xorcom CompletePBX es vulnerable a un Path Traversal autenticado, lo que permite lecturas de archivos arbitrarias a trav\u00e9s de la funcionalidad de copia de seguridad y restauraci\u00f3n. Este problema afecta a CompletePBX: hasta la versi\u00f3n 5.2.35." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json index 7e427a0a9ca..93e3c4eea06 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede escribir fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2294.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2294.json index 4a8eda951f1..0ad832a3ed5 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2294.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2294.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Kubio AI Page Builder para WordPress es vulnerable a la inclusi\u00f3n local de archivos en todas las versiones hasta la 2.5.1 (incluida) a trav\u00e9s de la funci\u00f3n kubio_hybrid_theme_load_template. Esto permite a atacantes no autenticados incluir y ejecutar archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en dichos archivos. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar c\u00f3digo cuando se pueden subir e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json index 239c4f2af60..1e339258e8b 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23044.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-20T16:15:28.170", "lastModified": "2025-01-20T16:15:28.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23053.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23053.json index 09be1156eaf..d307421b909 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23053.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23053.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-28T18:15:38.987", "lastModified": "2025-03-13T19:15:51.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23054.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23054.json index de81819719e..c0181863112 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23054.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23054.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-28T18:15:39.147", "lastModified": "2025-03-13T15:15:52.867", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23215.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23215.json index 598f1ad6057..76be3cba5a0 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23215.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23215.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23215", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-31T16:15:35.643", - "lastModified": "2025-01-31T17:15:16.957", + "lastModified": "2025-04-04T21:15:44.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,9 +22,9 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:N/MVI:N/MVA:N/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear", - "baseScore": 0.0, - "baseSeverity": "NONE", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -45,9 +45,9 @@ "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnConfidentialityImpact": "NONE", - "modifiedVulnIntegrityImpact": "NONE", - "modifiedVulnAvailabilityImpact": "NONE", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json index 39b143c532e..c4d2f238a1d 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json index 9c35cb840ad..32bb0e0693f 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:12.073", "lastModified": "2025-02-13T22:15:12.073", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23995.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23995.json index 08c65289edf..e0f9666b26d 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23995.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23995.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ta2g Tantyyellow allows Reflected XSS.This issue affects Tantyyellow: from n/a through 1.0.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ta2g Tantyyellow permite XSS reflejado. Este problema afecta a Tantyyellow: desde n/a hasta 1.0.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2303.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2303.json index a96bdbea61d..721dfd62b23 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2303.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2303.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.613", "lastModified": "2025-03-22T07:15:24.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Block Logic \u2013 Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento Block Logic \u2013 Full Gutenberg Block Display Control para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo en todas las versiones hasta la 1.0.8 incluida, a trav\u00e9s de la funci\u00f3n block_logic_check_logic. Esto se debe a la evaluaci\u00f3n insegura de la entrada controlada por el usuario. Esto permite que atacantes autenticados, con acceso de colaborador o superior, ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2328.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2328.json index f4e3237313b..26a138bf547 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2328.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2328.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'dnd_remove_uploaded_files' function in all versions up to, and including, 1.3.8.7. This makes it possible for unauthenticated attackers to add arbitrary file paths (such as ../../../../wp-config.php) to uploaded files on the server, which can easily lead to remote code execution when an Administrator deletes the message. Exploiting this vulnerability requires the Flamingo plugin to be installed and activated." + }, + { + "lang": "es", + "value": "El complemento Drag and Drop Multiple File Upload for Contact Form 7 de WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n \"dnd_remove_uploaded_files\" en todas las versiones hasta la 1.3.8.7 incluida. Esto permite que atacantes no autenticados a\u00f1adan rutas de archivo arbitrarias (como ../../../../wp-config.php) a los archivos subidos al servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo cuando un administrador elimina el mensaje. Para explotar esta vulnerabilidad, es necesario instalar y activar el complemento Flamingo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2331.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2331.json index 99c5545535f..0e39f17e003 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2331.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2331.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:26.833", "lastModified": "2025-03-22T12:15:26.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.22.1 via a misconfigured capability check in the 'permissionsCheck' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including reports detailing donors and donation amounts." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a la Exposici\u00f3n de Informaci\u00f3n Sensible en todas las versiones hasta la 3.22.1 incluida, debido a una comprobaci\u00f3n de capacidad mal configurada en la funci\u00f3n \"permissionsCheck\". Esto permite a atacantes autenticados, con acceso de suscriptor o superior, extraer datos sensibles, incluyendo informes que detallan los donantes y los montos de las donaciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2356.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2356.json index 75976cfdfaf..1daecf9c79b 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2356.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2356.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad en BlackVue App 3.65 para Android. Se ha clasificado como problem\u00e1tica. Afecta a la funci\u00f3n deviceDelete del componente API Handler. La manipulaci\u00f3n implica el uso del m\u00e9todo de solicitud GET con cadenas de consulta sensibles. Es posible iniciar el ataque de forma remota. La complejidad del ataque es bastante alta. Se considera que su explotaci\u00f3n es dif\u00edcil. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." + "value": "Se encontr\u00f3 una vulnerabilidad en BlackVue App 3.65 para Android. Se ha clasificado como problem\u00e1tica. Afecta a la funci\u00f3n deviceDelete del componente API Handler. La manipulaci\u00f3n implica el uso del m\u00e9todo de solicitud GET con cadenas de consulta sensibles. Es posible iniciar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json index 5b317f049d2..ec50c7bd461 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-07T23:15:15.013", "lastModified": "2025-02-10T18:15:35.563", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json index c9679bad619..2c6b595d7a6 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json index 492ab13a02a..786b3ca7d6f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json index 034a141c79a..4564b55cb72 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json index 3390ef36201..47725da6ee1 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json index 0a0106b730e..3bb1be33c34 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json index fdb350f6867..38d004d4ac2 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json index 044f482a363..b9167321720 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T18:15:42.003", "lastModified": "2025-01-27T19:15:29.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json index c683fe4ab9a..747500f1312 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-27T18:15:42.157", "lastModified": "2025-01-27T19:15:29.540", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json index 7babeb5b279..531b022b058 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24377.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json index 17801b206a3..482a10e6296 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json index 20aa35c1653..3a2a35beccd 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24379.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json index 85490c32268..df96861a136 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24380.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json index bb308815c8b..c94f2be0a4b 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24381.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. Exploitation may allow for session theft." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Open Redirect'). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda que el usuario de la aplicaci\u00f3n objetivo fuera redirigido a URL arbitrarias. Los atacantes podr\u00edan aprovechar esta vulnerabilidad para realizar ataques de phishing que inciten a los usuarios a divulgar informaci\u00f3n confidencial. Esta vulnerabilidad podr\u00eda permitir el robo de sesiones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json index e295254cbd5..76bec758dab 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24382.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n del comando." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json index 70043798492..a6a42d04bb0 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability to delete arbitrary files. This vulnerability is considered critical as it can be leveraged to delete critical system files as root. Dell recommends customers to upgrade at the earliest opportunity." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, contiene una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizada en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad para eliminar archivos arbitrarios. Esta vulnerabilidad se considera cr\u00edtica, ya que puede utilizarse para eliminar archivos cr\u00edticos del sistema como root. Dell recomienda a sus clientes actualizar a la versi\u00f3n m\u00e1s reciente lo antes posible." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json index 710552d808a..bfc5c442801 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json index 10819c214ce..ef5763152fe 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges." + }, + { + "lang": "es", + "value": "Dell Unity, versi\u00f3n 5.4 y anteriores, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (inyecci\u00f3n de comandos del sistema operativo). Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de comandos y la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json index b5629033fb6..f3daedaab1b 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json index 9053aee3698..f69a42b4488 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json index e1388c626f3..991b48e0040 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:30.277", "lastModified": "2025-03-11T18:15:30.277", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json index d1da0452106..3de2f6a6fec 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json index 165b581c09b..3e71a7b51e1 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:20.417", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json index 491786d15dd..7a178fcb7a3 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:20.573", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json index d3397bc37d6..0219ae20227 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.543", "lastModified": "2025-03-11T18:15:31.543", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json index b658b8cb306..7571a572e95 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.700", "lastModified": "2025-03-11T18:15:31.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json index 618046a6a8a..654d2bc6636 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.840", "lastModified": "2025-03-11T18:15:31.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json index bf50eec45f4..bbdc8b319ee 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.993", "lastModified": "2025-03-11T18:15:31.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json index e446a3a96d6..4c0c3cb9772 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:32.140", "lastModified": "2025-03-11T18:15:32.140", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json index 8074a187d1b..dfbdf4b0eb0 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:32.297", "lastModified": "2025-03-11T18:15:32.297", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json index 0130a775dc5..b8e492b62a5 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El path traversal puede permitir la ejecuci\u00f3n remota de c\u00f3digo mediante una cuenta privilegiada (requiere una cuenta de administrador del dispositivo, no puede ser realizada por un usuario normal). En combinaci\u00f3n con la funci\u00f3n \"Cargar\", esto podr\u00eda usarse para ejecutar un script arbitrario o posiblemente un binario cargado. Soluci\u00f3n en la versi\u00f3n 6.7.0, fecha de lanzamiento: 20 de octubre de 2024." + "value": "El path traversal puede permitir la ejecuci\u00f3n remota de c\u00f3digo mediante una cuenta privilegiada (requiere una cuenta de administrador del dispositivo, no puede ser realizada por un usuario normal). En combinaci\u00f3n con la funci\u00f3n \"Upload\", esto podr\u00eda usarse para ejecutar un script arbitrario o posiblemente un binario cargado. Soluci\u00f3n en la versi\u00f3n 6.7.0, fecha de lanzamiento: 20 de octubre de 2024." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json index 571915ce648..ce29b26342a 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:12.270", "lastModified": "2025-02-13T22:15:12.270", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24915.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24915.json index b84f0cc87ee..d97f0dabd62 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24915.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24915.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-03-21T15:15:42.020", "lastModified": "2025-03-21T15:15:42.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When installing Nessus Agent to a non-default location on a Windows host, Nessus Agent versions prior to 10.8.3 did not enforce secure permissions for sub-directories. \u00a0This could allow for local privilege escalation if users had not secured the directories in the non-default installation location." + }, + { + "lang": "es", + "value": "Al instalar Nessus Agent en una ubicaci\u00f3n no predeterminada en un host Windows, las versiones de Nessus Agent anteriores a la 10.8.3 no aplicaban permisos seguros a los subdirectorios. Esto pod\u00eda provocar una escalada de privilegios local si los usuarios no hab\u00edan protegido los directorios en la ubicaci\u00f3n de instalaci\u00f3n no predeterminada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json index 9fe348ca784..fa1212914c8 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized\naccess of confidential data when a malicious user, having physical access and advanced information on the file\nsystem, sets the radio in factory default mode." + }, + { + "lang": "es", + "value": "CWE-922: Existe una vulnerabilidad de almacenamiento inseguro de informaci\u00f3n confidencial que podr\u00eda conducir potencialmente a un acceso no autorizado a datos confidenciales cuando un usuario malintencionado, con acceso f\u00edsico e informaci\u00f3n avanzada en el sistema de archivos, configura la radio en el modo predeterminado de f\u00e1brica." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json index ebbf013cc67..afee3a10bfb 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of\nconfidentiality when a malicious user, having physical access, sets the radio in factory default mode where the\nproduct does not correctly initialize all data." + }, + { + "lang": "es", + "value": "CWE-1188: Existe una vulnerabilidad de inicializaci\u00f3n de un recurso con un valor predeterminado inseguro que podr\u00eda llevar a la p\u00e9rdida de confidencialidad cuando un usuario malintencionado, con acceso f\u00edsico, configura la radio en el modo predeterminado de f\u00e1brica donde el producto no inicializa correctamente todos los datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json index 7c7afb26b6d..50e2af31539 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to\nunauthorized access which could result in the loss of confidentially, integrity and availability when a malicious\nuser, having physical access, sets the radio to the factory default mode." + }, + { + "lang": "es", + "value": "CWE-1188: Existe una vulnerabilidad de inicializaci\u00f3n de un recurso con un valor predeterminado inseguro que podr\u00eda conducir potencialmente a un acceso no autorizado que podr\u00eda causar la p\u00e9rdida de confidencialidad, integridad y disponibilidad cuando un usuario malintencionado, con acceso f\u00edsico, configura la radio al modo predeterminado de f\u00e1brica." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2477.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2477.json index 6c78c260035..6090a4a7260 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2477.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2477.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.780", "lastModified": "2025-03-22T07:15:24.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CryoKey plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018ckemail\u2019 parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento CryoKey para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'ckemail' en todas las versiones hasta la 2.4 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2478.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2478.json index 5402a273ff8..51c8327f5cf 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2478.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2478.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:24.963", "lastModified": "2025-03-22T07:15:24.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Code Clone plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018snippetId\u2019 parameter in all versions up to, and including, 0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Code Clone para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo mediante el par\u00e1metro 'snippetId' en todas las versiones hasta la 0.9 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de administrador o superior, a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2479.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2479.json index 74892c153f9..b353da622a3 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2479.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2479.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:25.123", "lastModified": "2025-03-22T07:15:25.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Custom Admin Bar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018msg\u2019 parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Easy Custom Admin Bar para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'msg' en todas las versiones hasta la 1.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2482.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2482.json index 3f555c32961..aa96d6979e7 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2482.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2482.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:25.307", "lastModified": "2025-03-22T07:15:25.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gotcha | Gesture-based Captcha plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menu' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Gotcha | Gesture-based Captcha para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'menu' en todas las versiones hasta la 1.0.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2483.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2483.json index 8e92a88fa5c..c3146ac0b23 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2483.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018receip_address\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Gift Certificate Creator para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro \"receip_address\" en todas las versiones hasta la 1.1.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2484.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2484.json index c3c6e6fa1d2..84ef73bc3cc 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2484.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2484.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T07:15:25.470", "lastModified": "2025-03-22T07:15:25.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Multi Video Box para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s de los par\u00e1metros 'video_id' y 'group_id' en todas las versiones hasta la 1.5.2 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2485.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2485.json index 9b357937d65..2ef94596ae7 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2485.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2485.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8.7 via deserialization of untrusted input from the 'dnd_upload_cf7_upload'\r\n function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file upload action. The Flamingo plugin must be installed and activated in order to exploit the vulnerability." + }, + { + "lang": "es", + "value": "El complemento Drag and Drop Multiple File Upload for Contact Form 7 de WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.3.8.7 incluida, mediante la deserializaci\u00f3n de entradas no confiables de la funci\u00f3n \"dnd_upload_cf7_upload\". Esto permite a los atacantes inyectar un objeto PHP a trav\u00e9s de un archivo PHAR. No se conoce ninguna cadena POP presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si una cadena POP est\u00e1 presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema objetivo, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo, dependiendo de la cadena POP presente. Esta vulnerabilidad puede ser explotada por atacantes no autenticados cuando hay un formulario en el sitio con la acci\u00f3n de subir archivos. El complemento Flamingo debe estar instalado y activado para explotar la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25000.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25000.json index 8c6e76941bf..b1c3b1bdc7f 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25000.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25000.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json index 5a332dea8ca..abb78faa610 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Guardium 11.4 and 12.1 could allow a privileged user to read any file on the system due to incorrect privilege assignment." + }, + { + "lang": "es", + "value": "IBM Security Guardium 11.4 y 12.1 podr\u00edan permitir que un usuario privilegiado lea cualquier archivo del sistema debido a una asignaci\u00f3n incorrecta de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25035.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25035.json index de87ce54af4..eb31b30bb91 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25035.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25035.json @@ -3,12 +3,16 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-03-21T19:15:45.437", "lastModified": "2025-03-21T19:15:45.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5" + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web. La vulnerabilidad de Cross-site Scripting en Jalios JPlatform 10 permite XSS reflejado y XSS almacenado. Este problema afecta a JPlatform 10: anteriores a 10.0.8 (SP8), anteriores a 10.0.7 (SP7), anteriores a 10.0.6 (SP6) y Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0 y Jalios Workplace 5.3 a 5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25036.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25036.json index 3c3d19e7822..95827c7f749 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25036.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25036.json @@ -3,12 +3,16 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-03-21T20:15:15.293", "lastModified": "2025-03-21T20:15:15.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all versions of JPlatform 10 before 10.0.8 (SP8)." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML en Jalios JPlatform permite la inyecci\u00f3n de XML. Este problema afecta a todas las versiones de JPlatform 10 anteriores a 10.0.8 (SP8)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25060.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25060.json index ec3d06b2682..345a77d6b13 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25060.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25060.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing authentication for critical function vulnerability exists in AssetView and AssetView CLOUD. If exploited, the files on the server where the product is running may be obtained and/or deleted by a remote unauthenticated attacker." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en AssetView y AssetView CLOUD. Si se explota, un atacante remoto no autenticado podr\u00eda obtener o eliminar los archivos del servidor donde se ejecuta el producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json index bfd641e3293..7ba0c3e2e7d 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:12.780", "lastModified": "2025-03-04T21:05:57.430", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25086.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25086.json index f47c401630a..a933fc717df 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25086.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25086.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPDeveloper Secret Meta allows Reflected XSS.This issue affects Secret Meta: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPDeveloper Secret Meta permite XSS reflejado. Este problema afecta a Secret Meta: desde n/a hasta 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25100.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25100.json index b00d4fc0e15..deb59e5fccd 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25100.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25100.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in victoracano Cazamba allows Reflected XSS.This issue affects Cazamba: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en victoracano Cazamba permite XSS reflejado. Este problema afecta a Cazamba: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json index e360b67521f..923aa5f8230 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T18:15:27.583", "lastModified": "2025-03-18T17:15:45.720", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json index 70703a2c91a..8edc94867c5 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficient state checks lead to a vector that allows to bypass 2FA checks." + }, + { + "lang": "es", + "value": "Los controles de estado insuficientes conducen a un vector que permite eludir los controles 2FA." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json index 87ddce3356e..d3e000c8ac6 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiWeb version 7.6.2 and below, version 7.4.6 and below, 7.2 all versions, 7.0 all versions endpoint may allow an authenticated admin to access and modify the filesystem via crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') [CWE-22] en FortiWeb versi\u00f3n 7.6.2 y anteriores, versi\u00f3n 7.4.6 y anteriores, 7.2 todas las versiones, 7.0 todas las versiones puede permitir que un administrador autenticado acceda y modifique el sistema de archivos a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json index bff17f2cede..5fb718f9a15 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en tianti v2.3 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro coverImageURL en /article/ajax/save." + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en tianti v2.3 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro coverImageURL en /article/ajax/save." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25925.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25925.json index 782c88258bd..0eb6e3df439 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25925.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25925.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de cross-scripting (XSS) almacenado en Openmrs v2.4.3 Build 0ff0ed permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro personName.middleName en /openmrs/admin/patients/shortPatientForm.form." + "value": "Una vulnerabilidad de cross-scripting (XSS) almacenado en Openmrs v2.4.3 Build 0ff0ed permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro personName.middleName en /openmrs/admin/patients/shortPatientForm.form." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json index fbbdff9b9ce..c0a20fdac3a 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25949.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulada en el par\u00e1metro de ID de usuario en /rest/staffResource/update." + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulada en el par\u00e1metro de ID de usuario en /rest/staffResource/update." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2513.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2513.json index efb7dd2d106..439298a471a 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2513.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2513.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Smart Icons For WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Smart Icons For WordPress es vulnerable a cross-site scripting almacenado al subir archivos SVG en todas las versiones hasta la 1.0.4 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de editor o superior, inyectar scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo SVG." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2516.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2516.json index b2b411cd16f..f7f277bea94 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2516.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2516.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The use of a weak cryptographic key pair in the signature verification process in WPS Office (Kingsoft) on Windows allows an attacker who successfully recovered the private key to sign components.\n\nAs older versions of WPS Office did not validate the update server's certificate, an Adversary-In-The-Middle attack was possible allowing updates to be hijacked." + }, + { + "lang": "es", + "value": "El uso de un par de claves criptogr\u00e1ficas d\u00e9biles en el proceso de verificaci\u00f3n de firmas de WPS Office (Kingsoft) en Windows permite que un atacante que haya recuperado la clave privada firme componentes. Dado que las versiones anteriores de WPS Office no validaban el certificado del servidor de actualizaciones, era posible un ataque de intermediario que permitiera el secuestro de actualizaciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2555.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2555.json index 3d02a386126..c862449abbf 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2555.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2555.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Audi Universal Traffic Recorder App 2.0. Se trata de una funci\u00f3n desconocida del componente Credenciales FTP. La manipulaci\u00f3n conlleva el uso de contrase\u00f1as predefinidas. Es necesario realizar un ataque local. La complejidad del ataque es bastante alta. Se considera que su explotaci\u00f3n es dif\u00edcil. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a las versiones 2.89 y 2.90 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contact\u00f3 con el proveedor con prontitud para informarle sobre estos problemas y actu\u00f3 con gran profesionalidad. La versi\u00f3n 2.89 soluciona este problema para los nuevos clientes y la 2.90 lo solucionar\u00e1 para los clientes existentes." + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Audi Universal Traffic Recorder App 2.0. Se trata de una funci\u00f3n desconocida del componente Credenciales FTP. La manipulaci\u00f3n conlleva el uso de contrase\u00f1as predefinidas. Es necesario realizar un ataque local. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a las versiones 2.89 y 2.90 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contact\u00f3 con el proveedor con prontitud para informarle sobre estos problemas y actu\u00f3 con gran profesionalidad. La versi\u00f3n 2.89 soluciona este problema para los nuevos clientes y la 2.90 lo solucionar\u00e1 para los clientes existentes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2565.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2565.json index 5909d241c6a..2eaab367f31 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2565.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2565.json @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@liferay.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json index 9470b6fa351..cfa0184fea3 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on the 'vayu_blocks_get_toggle_switch_values_callback' and 'vayu_blocks_save_toggle_switch_callback' function in versions 1.0.4 to 1.2.1. This makes it possible for unauthenticated attackers to read plugin options and update any option with a key name ending in '_value'." + }, + { + "lang": "es", + "value": "El complemento Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce para WordPress es vulnerable al acceso no autorizado y la modificaci\u00f3n de datos debido a la falta de comprobaciones de capacidad en las funciones \u00abvayu_blocks_get_toggle_switch_values_callback\u00bb y \u00abvayu_blocks_save_toggle_switch_callback\u00bb en las versiones 1.0.4 a 1.2.1. Esto permite que atacantes no autenticados lean las opciones del plugin y actualicen cualquier opci\u00f3n cuyo nombre de clave termine en \u00ab_value\u00bb." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2577.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2577.json index 5e74f46de75..137203d7cb6 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2577.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2577.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-22T12:15:27.013", "lastModified": "2025-03-22T12:15:27.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bitspecter Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Bitspecter Suite para WordPress es vulnerable a Cross-Site Scripting almacenado al subir archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de autor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo SVG." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2578.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2578.json index acc859a1385..f381f7048ea 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2578.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2578.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2.19 via the 'wpAmeliaApiCall' function. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Booking for Appointments and Events Calendar \u2013 Amelia para WordPress, es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.2.19 incluida, mediante la funci\u00f3n \"wpAmeliaApiCall\". Esto permite a atacantes no autenticados obtener la ruta completa de la aplicaci\u00f3n web, lo que puede utilizarse para otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere otra vulnerabilidad para que se produzcan da\u00f1os en el sitio web afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json index 504fb4a0b6b..837139a3111 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2584.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se encontr\u00f3 una vulnerabilidad en WebAssembly wabt 1.0.36. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n BinaryReaderInterp::GetReturnCallDropKeepCount del archivo wabt/src/interp/binary-reader-interp.cc. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque puede iniciarse remotamente. La complejidad del ataque es bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." + "value": "Se encontr\u00f3 una vulnerabilidad en WebAssembly wabt 1.0.36. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n BinaryReaderInterp::GetReturnCallDropKeepCount del archivo wabt/src/interp/binary-reader-interp.cc. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque puede iniciarse remotamente. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2586.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2586.json index a58816c443e..4ba2163d652 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2586.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2586.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in the OpenShift Lightspeed Service, which is vulnerable to unauthenticated API request flooding. Repeated queries to non-existent endpoints inflate metrics storage and processing, consuming excessive resources. This issue can lead to monitoring system degradation, increased disk usage, and potential service unavailability. Since the issue does not require authentication, an external attacker can exhaust CPU, RAM, and disk space, impacting both application and cluster stability." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en el servicio OpenShift Lightspeed, vulnerable a la inundaci\u00f3n de solicitudes de API no autenticadas. Las consultas repetidas a endpoints inexistentes inflan el almacenamiento y el procesamiento de m\u00e9tricas, consumiendo recursos excesivos. Este problema puede provocar la degradaci\u00f3n del sistema de monitorizaci\u00f3n, un mayor uso del disco y la posible indisponibilidad del servicio. Dado que el problema no requiere autenticaci\u00f3n, un atacante externo puede agotar la CPU, la RAM y el espacio en disco, lo que afecta la estabilidad tanto de la aplicaci\u00f3n como del cl\u00faster." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2591.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2591.json index 8378220c87c..48947f7bcee 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2591.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2591.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T14:15:16.853", "lastModified": "2025-03-21T14:15:16.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function MDLImporter::InternReadFile_Quake1 of the file code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument skinwidth/skinheight leads to divide by zero. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Open Asset Import Library Assimp 5.4.3. Esta vulnerabilidad afecta la funci\u00f3n MDLImporter::InternReadFile_Quake1 del archivo code/AssetLib/MDL/MDLLoader.cpp. La manipulaci\u00f3n del argumento Skinwidth/SkinHeight conduce a dividir por cero. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado . El parche se identifica como AB66A1674FCFAC87AABA4C8B900B315EBC3E7DBD. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2592.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2592.json index 2c3084f2e60..5b9d7b6a9ec 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2592.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2592.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T14:15:17.037", "lastModified": "2025-03-21T14:15:17.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se clasific\u00f3 como cr\u00edtica, en Open Asset Import Library Assimp 5.4.3. Este problema afecta la funci\u00f3n CSMIMPORTER::InternetFile del archivo de archivo/AssetLib/CSM/CSMLoader.cpp. La manipulaci\u00f3n conduce al desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se llama 2690E354DA0C681DB000CFD892A55226788F2743. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2598.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2598.json index 920b3640280..8c083e130ad 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2598.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2598.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2025-03-21T15:15:43.120", "lastModified": "2025-03-21T17:15:40.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "Cuando se utiliza la interfaz de l\u00ednea de comandos (CLI) de AWS CDK de AWS Cloud Development Kit (AWS CDK) con un complemento de credenciales que devuelve una propiedad de expiraci\u00f3n con las credenciales de AWS recuperadas, estas se imprimen en la salida de la consola. Para mitigar este problema, los usuarios deben actualizar a la versi\u00f3n 2.178.2 o posterior y asegurarse de que cualquier c\u00f3digo bifurcado o derivado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26054.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26054.json index b66165c8a3b..d2f424675ba 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26054.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Infinxt iEdge 100 2.1.32 is vulnerable to Cross Site Scripting (XSS) via the \"Description\" field during LAN configuration." + }, + { + "lang": "es", + "value": "Infinxt iEdge 100 2.1.32 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo \"Descripci\u00f3n\" durante la configuraci\u00f3n de LAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26055.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26055.json index c78c7adef90..ac57c358e45 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26055.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26055.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An OS Command Injection vulnerability exists in the Infinxt iEdge 100 2.1.32 Troubleshoot module, specifically in the tracertVal parameter of the Tracert function." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el m\u00f3dulo Troubleshoot de Infinxt iEdge 100 2.1.32, espec\u00edficamente en el par\u00e1metro tracertVal de la funci\u00f3n Tracert." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26056.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26056.json index e7742b9f8e2..8e8cda7e511 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26056.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26056.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in the Infinxt iEdge 100 2.1.32 in the Troubleshoot module \"MTR\" functionality. The vulnerability is due to improper validation of user-supplied input in the mtrIp parameter. An attacker can exploit this flaw to execute arbitrary operating system commands on the underlying system with the same privileges as the web application process." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en Infinxt iEdge 100 2.1.32, en la funcionalidad \"MTR\" del m\u00f3dulo de soluci\u00f3n de problemas. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en el par\u00e1metro mtrIp. Un atacante puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema operativo en el sistema subyacente con los mismos privilegios que el proceso de la aplicaci\u00f3n web." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json index 1c92d75df9d..096956973df 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.533", "lastModified": "2025-04-10T19:54:17.250", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json index 8a2eb8e657c..d53c855fa5f 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.800", "lastModified": "2025-03-03T22:11:42.140", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json index 659bf6b5a11..199accd12ca 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.077", "lastModified": "2025-04-10T19:54:12.560", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json index 32366a636ec..80b12b09c97 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.777", "lastModified": "2025-04-10T19:54:07.187", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json index da9bf3305b9..f3eead58d3e 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26500.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26500.json index 5a1e72a03bb..f0699e0abbe 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26500.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26500.json @@ -3,12 +3,16 @@ "sourceIdentifier": "0bf9931a-6ebf-4f48-bd14-39ee5e1d61f8", "published": "2025-03-21T23:15:21.327", "lastModified": "2025-03-21T23:15:21.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Uncontrolled Resource Consumption vulnerability in Wind River Systems VxWorks 7 on VxWorks allows Excessive Allocation.\u00a0\u00a0\n\nSpecifically crafted USB packets may lead to the system becoming unavailable\n\nThis issue affects VxWorks 7: from 22.06 through 24.03." + }, + { + "lang": "es", + "value": "La vulnerabilidad de consumo incontrolado de recursos en Wind River Systems VxWorks 7 permite una asignaci\u00f3n excesiva. Los paquetes USB manipulados espec\u00edficamente pueden provocar la indisponibilidad del sistema. Este problema afecta a VxWorks 7 desde la versi\u00f3n 22/06 hasta la 24/03." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json index 5fa7c5bbbda..641e5341f10 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json index f12b78b937f..9f139770f19 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26595.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-25T16:15:38.390", "lastModified": "2025-03-17T05:15:34.563", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json index 0805210a67d..762de4b197a 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json index 26c2350eebb..e0038877218 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json index 5e62683f105..a9d8824d736 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json index eed0ee1d814..39622377052 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json index 51ea65f0d35..c01cdcbb8dd 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json index 8c3cef356cb..fed2ef1ce3a 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json index 69decd376dc..5880d45a777 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json index 033fdfcedca..9f220bc7bb4 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json index 72f908c8790..eab0ce53b00 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json index 90d4e7e1d4d..9a9a0213b7d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json index dadd39c9b55..7ccd4c923b4 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json index babc7aa747d..76f174036ef 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26683.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26683.json index ba2073a0d92..48868c253a9 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26683.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26683.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Improper authorization in Azure Playwright allows an unauthorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n incorrecta en Azure Playwright permite que un atacante no autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json index 60d6d95b094..58cb2e7dc2f 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json index 6dae47051ed..9b2469b2712 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json index a71396f2143..edb9eddddd6 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26731.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26731.json index c6345920738..9d38fda3d32 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26731.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26731.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute Infosystems ARPrice allows Stored XSS.This issue affects ARPrice: from n/a through 4.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Repute Infosystems ARPrice permite XSS almacenado. Este problema afecta a ARPrice: desde n/a hasta 4.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26732.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26732.json index dcaf50f022f..df3f0819760 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26732.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26732.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BurgerThemes StoreBiz allows DOM-Based XSS.This issue affects StoreBiz: from n/a through 1.0.32." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BurgerThemes StoreBiz permite XSS basado en DOM. Este problema afecta a StoreBiz: desde n/a hasta 1.0.32." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json index f6ea4294153..30321d7b905 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Shinetheme Traveler. Este problema afecta a Traveler: desde n/a hasta 3.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26734.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26734.json index 4116c8c6bb8..22fe80881d2 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26734.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26734.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in peregrinethemes Hester allows Stored XSS.This issue affects Hester: from n/a through 1.1.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en peregrinethemes Hester permite XSS almacenado. Este problema afecta a Hester: desde n/a hasta 1.1.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26736.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26736.json index f59faefa9fb..738046a414a 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26736.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26736.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in viktoras MorningTime Lite allows Stored XSS.This issue affects MorningTime Lite: from n/a through 1.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en viktoras MorningTime Lite permite XSS almacenado. Este problema afecta a MorningTime Lite: desde n/a hasta 1.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26737.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26737.json index 29a4d61f5b1..b09e6216e6a 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26737.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26737.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yudleethemes City Store allows DOM-Based XSS.This issue affects City Store: from n/a through 1.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en yudleethemes City Store permite XSS basado en DOM. Este problema afecta a City Store: desde n/a hasta 1.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26738.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26738.json index 85ef2119aac..daff4d8a771 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26738.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26738.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Graham Quick Interest Slider allows DOM-Based XSS.This issue affects Quick Interest Slider: from n/a through 3.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Graham Quick Interest Slider permite XSS basado en DOM. Este problema afecta a Quick Interest Slider: desde n/a hasta 3.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26762.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26762.json index 669fc110f0f..914578cc4fc 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26762.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26762.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WooCommerce allows Stored XSS.This issue affects WooCommerce: from n/a through 9.7.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Automattic WooCommerce permite XSS almacenado. Este problema afecta a WooCommerce: desde n/d hasta 9.7.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json index e99832be46c..a2446d6becf 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json index b494e1224cf..5aef8b46a24 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:23.837", "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json index d5de5194b68..321a951bdcc 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Shinetheme Traveler. Este problema afecta a Traveler: desde n/a hasta 3.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26909.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26909.json index 85d15900775..038c4942ab8 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26909.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26909.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through 5.4.01." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivos remotos PHP') en John Darrel Hide My WP Ghost permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Hide My WP Ghost: desde n/a hasta 5.4.01." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2601.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2601.json index 41050db4e87..713c0c236fb 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2601.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2601.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T20:15:15.683", "lastModified": "2025-03-21T20:15:15.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This affects an unknown part of the file activate_reg.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Kortex Lite Advocate Office Management System 1.0. Esta afecta a una parte desconocida del archivo activate_reg.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2602.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2602.json index 0ba6a43fffd..f5086b25694 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2602.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2602.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T20:15:15.863", "lastModified": "2025-03-21T20:15:15.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file deactivate_reg.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en SourceCodester Kortex Lite Advocate Office Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo deactivate_reg.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2608.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2608.json index bf90fb8156b..f10be618afa 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2608.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2608.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-21T22:15:26.250", "lastModified": "2025-03-21T22:15:26.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Banquet Booking System 1.2. This affects an unknown part of the file /admin/view-user-queries.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Banquet Booking System 1.2. Esta afecta a una parte desconocida del archivo /admin/view-user-queries.php. La manipulaci\u00f3n del argumento viewid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2616.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2616.json index 1b3656a08ab..497583521f6 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2616.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2616.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T10:15:16.533", "lastModified": "2025-03-22T10:15:16.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in yangyouwang \u6768\u6709\u65fa crud \u7b80\u7ea6\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf 1.0.0. Affected is an unknown function of the component Role Management Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en yangyouwang ??? crud ???????? 1.0.0. Se ve afectada una funci\u00f3n desconocida del componente P\u00e1gina de Gesti\u00f3n de Roles. La manipulaci\u00f3n provoca cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json index 04b78164b5e..db953e42fc3 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2617.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-22T13:15:35.837", "lastModified": "2025-03-22T13:15:35.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in yangyouwang \u6768\u6709\u65fa crud \u7b80\u7ea6\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf 1.0.0. Affected by this vulnerability is an unknown functionality of the component Department Page. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en yangyouwang ??? crud ???????? 1.0.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Department Page. La manipulaci\u00f3n provoca cross site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json index 23424573db4..e664133d6ef 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de secuestro de DLL debido a una ruta de b\u00fasqueda no controlada en NI LabVIEW al cargar NI Error Reporting. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla correctamente, un atacante debe insertar una DLL maliciosa en la ruta de b\u00fasqueda no controlada. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json index 4837658cd31..1b8c99f1842 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de secuestro de DLL debido a una ruta de b\u00fasqueda no controlada en NI LabVIEW. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla correctamente, un atacante debe insertar una DLL maliciosa en la ruta de b\u00fasqueda no controlada. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2651.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2651.json index 0799c57dcc3..d5097b2c692 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2651.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2651.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T15:15:13.523", "lastModified": "2025-03-23T15:15:13.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /oews/admin/. The manipulation leads to exposure of information through directory listing. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. Multiple sub-directories are affected." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Online Eyewear Shop 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /oews/admin/. La manipulaci\u00f3n expone informaci\u00f3n a trav\u00e9s de la lista de directorios. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se recomienda cambiar la configuraci\u00f3n. Varios subdirectorios est\u00e1n afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2653.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2653.json index 6c10d68e221..2edb242fc29 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2653.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2653.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T16:15:13.240", "lastModified": "2025-03-23T16:15:13.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in FoxCMS 1.25 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FoxCMS 1.25 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2655.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2655.json index 2e526c16514..9fbfab9ac94 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2655.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2655.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T17:15:29.687", "lastModified": "2025-03-23T17:15:29.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been declared as critical. This vulnerability affects the function save_users of the file /classes/Users.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester AC Repair and Services System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n save_users del archivo /classes/Users.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2656.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2656.json index 76d93dcf887..20d7d787100 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2656.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2656.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T17:15:29.867", "lastModified": "2025-03-23T17:15:29.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Zoo Management System 2.1. Se ve afectada una funci\u00f3n desconocida del archivo /admin/login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2657.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2657.json index 1cc37872eff..e7445221c26 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2657.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2657.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T18:15:13.607", "lastModified": "2025-03-23T18:15:13.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in projectworlds Apartment Visitors Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /front.php. The manipulation of the argument rid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en projectworlds Apartment Visitors Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /front.php. La manipulaci\u00f3n del argumento rid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2658.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2658.json index c6243a1f82e..513c04031c6 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2658.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2658.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T18:15:14.533", "lastModified": "2025-03-23T18:15:14.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Online Security Guards Hiring System 1.0. Affected by this issue is some unknown functionality of the file /search-request.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Online Security Guards Hiring System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /search-request.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json index 5d885fd57b7..5d2af1021fb 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2659.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T19:15:14.570", "lastModified": "2025-03-23T19:15:14.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file /student/index.php. The manipulation of the argument e leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Project Worlds Online Time Table Generator 1.0. Esta afecta a una parte desconocida del archivo /student/index.php. La manipulaci\u00f3n del argumento \"e\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json index 6269e5877ed..e5cca473fa3 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2660.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T19:15:14.770", "lastModified": "2025-03-23T19:15:14.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Project Worlds Online Time Table Generator 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument e leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Project Worlds Online Time Table Generator 1.0 clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/index.php. La manipulaci\u00f3n del argumento \"e\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json index 202859e990e..a469805f985 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2661.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T20:15:12.500", "lastModified": "2025-03-23T20:15:12.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Project Worlds Online Time Table Generator 1.0 and classified as critical. This issue affects some unknown processing of the file /staff/index.php. The manipulation of the argument e leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Project Worlds Online Time Table Generator 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /staff/index.php. La manipulaci\u00f3n del argumento \"e\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json index 493e32d3afc..b0acc86026a 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2662.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T20:15:12.697", "lastModified": "2025-03-23T20:15:12.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Project Worlds Online Time Table Generator 1.0. It has been classified as critical. Affected is an unknown function of the file student/studentdashboard.php. The manipulation of the argument course leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Project Worlds Online Time Table Generator 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo student/studentdashboard.php. La manipulaci\u00f3n del argumento \"course\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2663.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2663.json index 8dc98da7789..3bc5d1c15ed 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2663.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2663.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T21:15:14.603", "lastModified": "2025-03-23T21:15:14.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /search-locker-details.php. The manipulation of the argument searchinput leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search-locker-details.php. La manipulaci\u00f3n del argumento \"searchinput\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2664.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2664.json index 0d329b21003..888aa378042 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2664.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2664.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T21:15:14.790", "lastModified": "2025-03-23T21:15:14.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeZips Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /suadpeted.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CodeZips Hospital Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /suadpeted.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2665.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2665.json index 3e7557c5e51..0f5b054a606 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2665.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2665.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T22:15:13.340", "lastModified": "2025-03-23T22:15:13.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Online Security Guards Hiring System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate/todate provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2671.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2671.json index 6812ebe66f3..1f8bf5b43a0 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2671.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2671.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T22:15:13.513", "lastModified": "2025-03-23T22:15:13.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Yue Lao Blind Box \u6708\u8001\u76f2\u76d2 up to 4.0. It has been declared as critical. This vulnerability affects the function base64image of the file /app/controller/Upload.php. The manipulation of the argument data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Yue Lao Blind Box ???? hasta la versi\u00f3n 4.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta la funci\u00f3n base64image del archivo /app/controller/Upload.php. La manipulaci\u00f3n de los datos de los argumentos permite la carga sin restricciones. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2675.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2675.json index 8d55e7801cd..4e003e8aec4 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2675.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2675.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T01:15:16.490", "lastModified": "2025-03-26T14:03:31.380", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2676.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2676.json index 3f3ae49729b..8bd94fff115 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2676.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2676.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T01:15:17.177", "lastModified": "2025-03-26T13:55:26.630", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2677.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2677.json index fe92eab3692..b12c387edff 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2677.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2677.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T02:15:15.540", "lastModified": "2025-03-26T13:48:38.670", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json index a12c7a01be7..7922f0a65e3 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2678.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:14.573", "lastModified": "2025-03-26T13:42:31.437", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json index e5ea0a7da32..d27f29eb75a 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2679.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:15.553", "lastModified": "2025-03-26T13:35:46.297", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json index 8915cbf43eb..06fd5562ae1 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2680.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T03:15:15.727", "lastModified": "2025-03-26T13:23:41.867", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2682.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2682.json index 67ad1f4f567..129adcf7478 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2682.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2682.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2682", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T04:15:14.643", - "lastModified": "2025-03-25T15:16:47.100", + "lastModified": "2025-03-27T18:14:29.287", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -163,8 +163,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10" + "criteria": "cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E8782F27-C73C-497B-92B3-2F9DC551C233" } ] } @@ -177,7 +177,8 @@ "source": "cna@vuldb.com", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "Issue Tracking" ] }, { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2684.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2684.json index c0bb6785019..33b0f89325d 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2684.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2684.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Bank Locker Management System 1.0. This issue affects some unknown processing of the file /search-report-details.php. The manipulation of the argument searchinput leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Este problema afecta a un procesamiento desconocido del archivo /search-report-details.php. La manipulaci\u00f3n del argumento \"searchinput\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2686.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2686.json index 9a0b6dddcf9..12696750b10 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2686.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2686.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T06:15:13.127", "lastModified": "2025-03-24T06:15:13.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in mingyuefusu \u660e\u6708\u590d\u82cf tushuguanlixitong \u56fe\u4e66\u7ba1\u7406\u7cfb\u7edf up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as critical. Affected by this vulnerability is the function doFilter of the file /admin/ of the component Backend. The manipulation of the argument Request leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en mingyuefusu ???? tushuguanlixitong ?????? hasta d4836f6b49cd0ac79a4021b15ce99ff7229d4694, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n doFilter del archivo /admin/ del componente Backend. La manipulaci\u00f3n del argumento Request genera controles de acceso inadecuados. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2688.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2688.json index cead83634a0..7e3f527d619 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2688.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2688.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T07:15:12.760", "lastModified": "2025-03-24T07:15:12.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en TOTOLINK A3000RU hasta la versi\u00f3n 5.9c.5185. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /cgi-bin/ExportSyslog.sh del componente Syslog Configuration File Handler. Esta manipulaci\u00f3n genera controles de acceso inadecuados. El ataque debe realizarse dentro de la red local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2689.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2689.json index d00fa311e2e..b0856081cb2 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2689.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2689.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in yiisoft Yii2 up to 2.0.45. Affected by this issue is the function getIterator of the file symfony\\finder\\Iterator\\SortableIterator.php. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, clasificada como cr\u00edtica, en Yiisoft Yii2 (hasta la versi\u00f3n 2.0.45). Este problema afecta a la funci\u00f3n getIterator del archivo symfony\\finder\\Iterator\\SortableIterator.php. La manipulaci\u00f3n provoca la deserializaci\u00f3n. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2690.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2690.json index 050c6aa5778..5fdbc27694c 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2690.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2690.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in yiisoft Yii2 up to 2.0.39. This affects the function Generate of the file phpunit\\src\\Framework\\MockObject\\MockClass.php. The manipulation leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad, clasificada como cr\u00edtica, en Yiisoft Yii2 (hasta la versi\u00f3n 2.0.39). Esta afecta la funci\u00f3n Generate del archivo phpunit\\src\\Framework\\MockObject\\MockClass.php. La manipulaci\u00f3n provoca la deserializaci\u00f3n. Es posible iniciar el ataque remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2699.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2699.json index 0c879a77103..34e5156806d 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2699.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2699.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in GetmeUK ContentTools up to 1.6.16. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Image Handler. The manipulation of the argument onload leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en GetmeUK ContentTools hasta la versi\u00f3n 1.6.16. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del componente Image Handler. La manipulaci\u00f3n del argumento \"onload\" provoca ataques de cross site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27001.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27001.json index 00a89ab45c1..e1cfe7dee7c 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27001.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Shipmondo Shipmondo \u2013 A complete shipping solution for WooCommerce allows Retrieve Embedded Sensitive Data.This issue affects Shipmondo \u2013 A complete shipping solution for WooCommerce: from n/a through 5.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en Shipmondo Shipmondo \u2013 A complete shipping solution for WooCommerce, permite recuperar datos confidenciales integrados. Este problema afecta a Shipmondo, una soluci\u00f3n de env\u00edo completa para WooCommerce: desde n/a hasta 5.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json index d44fa656b45..3b63f3b3e11 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in a system binary of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to inject commands into the underlying operating system while using the CLI. Successful exploitation could lead to complete system compromise." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en un binario del sistema de AOS-8 Instant y AOS-10 AP podr\u00eda permitir que un atacante remoto autenticado inyecte comandos en el sistema operativo subyacente mientras usa la CLI. Una explotaci\u00f3n exitosa podr\u00eda comprometer completamente el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json index 032d868d9a9..a8213942006 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the file creation process on the command line interface of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to perform remote code execution (RCE). Successful exploitation could allow an attacker to execute arbitrary operating system commands on the underlying operating system leading to potential system compromise." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el proceso de creaci\u00f3n de archivos en la interfaz de l\u00ednea de comandos de AOS-8 Instant y AOS-10 AP podr\u00eda permitir que un atacante remoto autenticado realice una ejecuci\u00f3n remota de c\u00f3digo (RCE). Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute comandos arbitrarios del sistema operativo en el sistema operativo subyacente, lo que podr\u00eda comprometer el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json index c7e607685ae..ffa069941c4 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system." + }, + { + "lang": "es", + "value": "Existen vulnerabilidades de escritura arbitraria de archivos en la interfaz de administraci\u00f3n web de los sistemas operativos AOS-10 GW y AOS-8 Controller/Mobility Conductor. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante autenticado cargue archivos arbitrarios y ejecute comandos arbitrarios en el sistema operativo host subyacente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27095.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27095.json index ea6c5495214..c09cb1702d6 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27095.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18." + }, + { + "lang": "es", + "value": "JumpServer es un host basti\u00f3n de c\u00f3digo abierto y un sistema de auditor\u00eda de seguridad para operaciones y mantenimiento. En versiones anteriores a la 4.8.0 y la 3.10.18, un atacante con una cuenta con privilegios bajos pod\u00eda acceder a la funci\u00f3n de sesi\u00f3n de Kubernetes y manipular el archivo kubeconfig para redirigir las solicitudes de la API a un servidor externo controlado por el atacante. Esto le permite interceptar y capturar el token del cl\u00faster de Kubernetes. Esto podr\u00eda permitir el acceso no autorizado al cl\u00faster y comprometer su seguridad. Esta vulnerabilidad se corrigi\u00f3 en las versiones 4.8.0 y 3.10.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json index 3c6a2387510..16fceecc7d7 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json index 6092a6ddbe8..82447e45d71 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27130.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Welcart e-Commerce 2.11.6 and earlier versions contains an untrusted data deserialization vulnerability. If this vulnerability is exploited, arbitrary code may be executed by a remote unauthenticated attacker who can access websites created using the product." + }, + { + "lang": "es", + "value": "Welcart e-Commerce 2.11.6 y versiones anteriores contienen una vulnerabilidad de deserializaci\u00f3n de datos no confiable. Si se explota esta vulnerabilidad, un atacante remoto no autenticado podr\u00eda ejecutar c\u00f3digo arbitrario y acceder a sitios web creados con el producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27135.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27135.json index 1dcd76735fc..4e733a15881 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27135.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T19:15:15.677", "lastModified": "2025-02-25T19:15:15.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27149.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27149.json index 68ee7b1b2fa..f452590008c 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27149.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zulip server provides an open-source team chat that helps teams stay productive and focused. Prior to 10.0, the data export to organization administrators feature in Zulip leaks private data. The collection of user-agent types identifying specific integrations or HTTP libraries (E.g., ZulipGitlabWebhook, okhttp, or PycURL) that have been used to access any organization on the server was incorrectly included in all three export types, regardless of if they were used to access the exported organization or not. The \"public data\" and \"with consent\" exports metadata including the titles of some topics in private channels which the administrator otherwise did not have access to, and none of the users consented to exporting and metadata for which users were in a group DM together. This vulnerability is fixed in 10.0." + }, + { + "lang": "es", + "value": "El servidor Zulip ofrece un chat de equipo de c\u00f3digo abierto que ayuda a los equipos a mantenerse productivos y concentrados. Antes de la versi\u00f3n 10.0, la funci\u00f3n de exportaci\u00f3n de datos a administradores de la organizaci\u00f3n en Zulip filtraba datos privados. La recopilaci\u00f3n de tipos de agente de usuario que identificaban integraciones espec\u00edficas o bibliotecas HTTP (por ejemplo, ZulipGitlabWebhook, okhttp o PycURL) utilizadas para acceder a cualquier organizaci\u00f3n en el servidor se inclu\u00eda incorrectamente en los tres tipos de exportaci\u00f3n, independientemente de si se utilizaban para acceder a la organizaci\u00f3n exportada. Las opciones \"datos p\u00fablicos\" y \"con consentimiento\" exportan metadatos, incluyendo los t\u00edtulos de algunos temas en canales privados a los que el administrador no ten\u00eda acceso, y ning\u00fan usuario dio su consentimiento para la exportaci\u00f3n de metadatos para los que los usuarios estaban en un mensaje directo grupal. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 10.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json index b10b9a0b289..7a683d36138 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.540", "lastModified": "2025-03-12T14:15:16.323", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json index 9d3479856c9..fb9ecf6c192 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.687", "lastModified": "2025-03-11T18:15:33.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json index eaf6c1b0791..48edb69ce33 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.840", "lastModified": "2025-03-11T18:15:33.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json index d6bc99842e3..c5feb5ea5c4 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.993", "lastModified": "2025-03-11T18:15:33.993", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json index 9f0cb878cff..27a5c0db468 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.150", "lastModified": "2025-03-11T18:15:34.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json index d70a6214e1e..1e835fa7399 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.293", "lastModified": "2025-03-12T14:15:16.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json index 30d33f940ec..edb2184173f 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.437", "lastModified": "2025-03-12T14:15:16.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json index dc11fb253a2..cc5849b0143 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.580", "lastModified": "2025-03-11T18:15:34.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json index fe282675357..5226d339792 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.077", "lastModified": "2025-03-11T18:15:35.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json index 4bbeeac5294..8b299c070b0 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.377", "lastModified": "2025-03-11T18:15:35.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json index 3cf3065254f..ffd6f3e64af 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T17:16:44.420", "lastModified": "2025-03-11T17:16:44.420", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27173.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27173.json index 0d10f3ccef4..7995df6c516 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27173.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T21:15:42.307", "lastModified": "2025-03-11T21:15:42.307", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json index f39b4ea170e..3ff082fc347 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.600", "lastModified": "2025-03-11T18:15:35.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json index cc55e06a89a..674ea94b666 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.743", "lastModified": "2025-03-11T18:15:35.743", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json index dabfb009359..364b947eddf 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.897", "lastModified": "2025-03-11T18:15:35.897", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json index 329ef96a78f..27012710ea1 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.047", "lastModified": "2025-03-11T18:15:36.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json index 44b9d7a465e..6939e84a89f 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.200", "lastModified": "2025-03-11T18:15:36.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json index a48c44ad886..7675c91f8db 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:36.353", "lastModified": "2025-03-11T18:15:36.353", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27180.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27180.json index b3bcf1ab68a..7a8f483ce86 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27180.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T21:15:42.463", "lastModified": "2025-03-11T21:15:42.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27181.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27181.json index d38bcd597e4..5eef69efa66 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27181.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27181.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T21:15:42.613", "lastModified": "2025-03-11T21:15:42.613", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json index 01a331abb8b..b12d348f96b 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:53.740", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json index f9779d76140..b950ef12198 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:53.937", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json index 8bd72dca0f1..61590508985 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.090", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json index f891b001330..a12fab378fa 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.233", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json index 3edd669e2c1..c9ffbca3e9d 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.380", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json index 5625884dc2c..fc2143964b6 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.540", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json index 90d8a332571..1d327c6eef8 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.687", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json index 7766ed6a588..cc3ee310461 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.853", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json index 652e7faa719..acb6087d992 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.027", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json index 702aecbf47a..0098502f206 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.170", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json index 140e58a87bf..b4882c36eb4 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.323", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json index deb781c222b..02f5055ab30 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.477", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json index 0107bf446cd..37aa70ab92d 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.630", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json index 6f62d25a314..b89d934ed65 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.787", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json index 0108f5143cb..38fa7728f0e 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.960", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json index 0c0dff4db97..fc94cf4321c 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:56.130", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json index 34a1f566306..2f4297c4a07 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:56.290", "lastModified": "2025-04-09T20:03:01.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27219.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27219.json index 6e726b8b009..2cde00af8b9 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27219.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27219.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27220.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27220.json index d01116e54ac..fba65575436 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27220.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27220.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27221.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27221.json index 3a5a693b183..e65516d941e 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27221.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27221.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T00:15:31.847", "lastModified": "2025-03-05T14:58:05.300", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27244.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27244.json index 49e2d5c6902..87bf550dd30 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27244.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27244.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "AssetView and AssetView CLOUD contain an issue with acquiring sensitive information from sent data to the developer. If exploited, sensitive information may be obtained by a remote unauthenticated attacker." + }, + { + "lang": "es", + "value": "AssetView y AssetView CLOUD presentan un problema al obtener informaci\u00f3n confidencial de los datos enviados al desarrollador. Si se explota, un atacante remoto no autenticado podr\u00eda obtener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json index 783b19c55f2..581c86f1b21 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in Apache ActiveMQ Artemis. All the values of the broker properties are\u00a0logged when the org.apache.activemq.artemis.core.config.impl.ConfigurationImpl logger has the\u00a0debug level enabled.\n\nThis issue affects Apache ActiveMQ Artemis: from 1.5.1 before 2.40.0. It can be mitigated by restricting log access to only trusted users.\n\nUsers are recommended to upgrade to version 2.40.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Apache ActiveMQ Artemis. Todos los valores de las propiedades del agente se registran cuando el registrador org.apache.activemq.artemis.core.config.impl.ConfigurationImpl tiene habilitado el nivel de depuraci\u00f3n. Este problema afecta a Apache ActiveMQ Artemis desde la versi\u00f3n 1.5.1 hasta la 2.40.0. Se puede mitigar restringiendo el acceso al registro solo a usuarios de confianza. Se recomienda actualizar a la versi\u00f3n 2.40.0, que soluciona el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json index 2639e178f4d..3b1172cecf6 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T21:15:27.677", "lastModified": "2025-03-04T21:15:14.197", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json index b4ed6dced7f..5782ab7881e 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T21:15:27.820", "lastModified": "2025-03-04T21:15:14.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json index c6ee7a7c705..589eae6c859 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access." + }, + { + "lang": "es", + "value": "Cross site scripting en algunas aplicaciones de Zoom Workplace pueden permitir que un usuario no autenticado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso a la red adyacente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json index bdd9adcaea9..70191b1318f 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access." + }, + { + "lang": "es", + "value": "Cross site scripting en algunas aplicaciones de Zoom Workplace pueden permitir que un usuario no autenticado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso a la red adyacente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json index cc933369ccb..94307ba61bc 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access." + }, + { + "lang": "es", + "value": "La inicializaci\u00f3n insegura de variables predeterminadas en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json index 2d39b1d580d..b34578ad58c 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json index 65aae13eb5e..2747f88ffb9 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json index 61a9877cd44..06e83e7af3d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json index f1194af2a2b..2524fc1d3d7 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json index 14d4a9d8a65..b8cc7edbf3d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json index d88de33df11..dbdfb4257e0 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json index e02dc4e9604..6bb05d13734 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json index d144f36edf4..431707bcf27 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json index d5e5e96f13f..c937f3c126f 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json index c4d1675474a..4c88cfc27a5 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json index f4eeaf80572..b6fb31f11f5 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json index 9ef429ea118..4a8c4cf7d47 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T19:15:36.300", "lastModified": "2025-03-05T20:24:50.943", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json index 74b15400497..8b8c6be8fa7 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json @@ -72,7 +72,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27556.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27556.json index 5d6dc0b8cf5..19420b3aec9 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27556.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27556.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.views.LoginView, django.contrib.auth.views.LogoutView, and django.views.i18n.set_language are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.1 antes de 5.1.8 y 5.0 antes de 5.0.14. La normalizaci\u00f3n de NFKC es lenta en Windows. Como consecuencia, django.contrib.auth.views.loginview, django.contrib.auth.views.logoutview, y django.views.i18n.set_language est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio a trav\u00e9s de ciertas entradas con un n\u00famero muy grande de caracteres Unicode." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27567.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27567.json index b2f38fe5662..0ad08f9963a 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27567.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27567.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the NickName registration screen of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configuration page or functions accessible only from the LAN side of the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting en la pantalla de registro de apodos del HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, se podr\u00eda ejecutar un script arbitrario en el navegador web del usuario que utiliza la p\u00e1gina de configuraci\u00f3n o funciones accesibles \u00fanicamente desde la red local del producto. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27574.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27574.json index 59fc06fe72f..6aea07aff94 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27574.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27574.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configuration page or functions accessible only from the LAN side of the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting en la funci\u00f3n de intercambio de archivos de almacenamiento USB del HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, se podr\u00eda ejecutar un script arbitrario en el navegador web del usuario que utiliza la p\u00e1gina de configuraci\u00f3n o funciones accesibles \u00fanicamente desde la red local del producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json index 562b2028fe8..a4ba7a09a5d 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27584.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Nombre en /rest/staffResource/update." + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Nombre en /rest/staffResource/update." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json index 0344e6806a4..8fe07c18c5f 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27585.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Print Name en /rest/staffResource/update." + "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro Print Name en /rest/staffResource/update." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27612.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27612.json index 827f671bba0..a91b653f4db 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27612.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27612.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-21T15:15:42.153", "lastModified": "2025-03-21T15:15:42.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libcontainer is a library for container control. Prior to libcontainer 0.5.3, while creating a tenant container, the tenant builder accepts a list of capabilities to be added in the spec of tenant container. The logic here adds the given capabilities to all capabilities of main container if present in spec, otherwise simply set provided capabilities as capabilities of the tenant container. However, setting inherited caps in any case for tenant container can lead to elevation of capabilities, similar to CVE-2022-29162. This does not affect youki binary itself. This is only applicable if you are using libcontainer directly and using the tenant builder." + }, + { + "lang": "es", + "value": "libcontainer es una librer\u00eda para el control de contenedores. Antes de libcontainer 0.5.3, al crear un contenedor de inquilinos, el generador de inquilinos aceptaba una lista de capacidades que se a\u00f1ad\u00edan a la especificaci\u00f3n del contenedor. La l\u00f3gica aqu\u00ed a\u00f1ade las capacidades dadas a todas las capacidades del contenedor principal si est\u00e1n presentes en la especificaci\u00f3n; de lo contrario, simplemente se establecen las capacidades proporcionadas como capacidades del contenedor de inquilinos. Sin embargo, establecer l\u00edmites heredados para el contenedor de inquilinos puede provocar la elevaci\u00f3n de capacidades, similar a CVE-2022-29162. Esto no afecta al binario de Youki. Esto solo aplica si se usa libcontainer directamente y el generador de inquilinos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27686.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27686.json index 3b29ae805e4..ea5ca58623d 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27686.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27686.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Unisphere for PowerMax, version(s) prior to 10.2.0.9 and PowerMax version(s) prior to PowerMax 9.2.4.15, contain an Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection." + }, + { + "lang": "es", + "value": "Dell Unisphere para PowerMax, versiones anteriores a la 10.2.0.9 y versiones anteriores a la 9.2.4.15, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una consulta LDAP (inyecci\u00f3n LDAP). Un atacante con privilegios elevados y acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una inyecci\u00f3n de scripts." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27692.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27692.json index 06d1dd121c1..eb1e605ec8a 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27692.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27692.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Unrestricted Upload of File with Dangerous Type vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service, Information disclosure, and Remote execution" + }, + { + "lang": "es", + "value": "Dell Wyse Management Suite, versiones anteriores a WMS 5.1, contiene una vulnerabilidad de carga sin restricciones de archivos con tipo peligroso. Un atacante con privilegios elevados y acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio, divulgaci\u00f3n de informaci\u00f3n y ejecuci\u00f3n remota." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27693.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27693.json index 449c002ac8e..44df38818aa 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27693.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27693.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection." + }, + { + "lang": "es", + "value": "Dell Wyse Management Suite, versiones anteriores a WMS 5.1, contiene una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb). Un atacante con privilegios elevados y acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la inyecci\u00f3n de scripts." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27694.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27694.json index b1b105e1c30..481acf16937 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27694.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27694.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service." + }, + { + "lang": "es", + "value": "Dell Wyse Management Suite, versiones anteriores a WMS 5.1, contiene una vulnerabilidad de grupo de recursos insuficiente. Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27716.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27716.json index 435a2765af8..65041bfe095 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27716.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27716.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file/folder listing process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered by a crafted HTTP request to specific functions of the product from a device connected to the LAN side." + }, + { + "lang": "es", + "value": "Existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en el proceso de listado de archivos/carpetas de la funci\u00f3n de intercambio de archivos de almacenamiento USB de HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, los archivos del producto podr\u00edan obtenerse o modificarse mediante una solicitud HTTP manipulada a funciones espec\u00edficas del producto desde un dispositivo conectado a la LAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27718.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27718.json index 75e525b51ab..13ff640ec7f 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27718.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27718.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file upload process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered or arbitrary code may be executed by a crafted HTTP request to specific functions of the product from a device connected to the LAN side." + }, + { + "lang": "es", + "value": "Existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en el proceso de carga de archivos de la funci\u00f3n de intercambio de archivos de almacenamiento USB de HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, se podr\u00edan obtener o alterar los archivos del producto, o se podr\u00eda ejecutar c\u00f3digo arbitrario mediante una solicitud HTTP manipulada a funciones espec\u00edficas del producto desde un dispositivo conectado a la LAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27726.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27726.json index afa05bb1fe7..27744c8ff96 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27726.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27726.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file download process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered by a crafted HTTP request to specific functions of the product from a device connected to the LAN side." + }, + { + "lang": "es", + "value": "Existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') durante la descarga de archivos de la funci\u00f3n de intercambio de archivos de almacenamiento USB del HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, los archivos del producto podr\u00edan obtenerse o modificarse mediante una solicitud HTTP manipulada a funciones espec\u00edficas del producto desde un dispositivo conectado a la LAN." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json index 90cf6f01632..378bd0c03ed 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json index f2477e10d11..e1efe14cbd7 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json index 15afa1b15da..f433cbf565d 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json index 7d1b42a3549..5d010a060b2 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json index 1aeabe1f1a7..94dbdcccc83 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json index 77d5d9c19bd..e6fbd018a4c 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json index 6fad813e837..132d3c0153a 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json index e4491efca0f..b4148e74b9b 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27793.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27793.json index 49f1cbe7eaa..f2d3476fca1 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27793.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 5.32.0, corresponding to vega-functions prior to version 5.17.0, users running Vega/Vega-lite JSON definitions could run unexpected JavaScript code when drawing graphs, unless the library was used with the `vega-interpreter`. Vega version 5.32.0 and vega-functions version 5.17.0 fix the issue. As a workaround, use `vega` with expression interpreter." + }, + { + "lang": "es", + "value": "Vega es una gram\u00e1tica de visualizaci\u00f3n, un formato declarativo para crear, guardar y compartir dise\u00f1os de visualizaci\u00f3n interactivos. En Vega anterior a la versi\u00f3n 5.32.0, correspondiente a vega-functions anterior a la versi\u00f3n 5.17.0, los usuarios que ejecutaban definiciones JSON de Vega/Vega-lite pod\u00edan ejecutar c\u00f3digo JavaScript inesperado al dibujar gr\u00e1ficos, a menos que la librer\u00eda se usara con vega-interpreter. Las versiones 5.32.0 y 5.17.0 de vega-functions solucionan este problema. Como workaround, utilice vega con el int\u00e9rprete de expresiones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27829.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27829.json index d9e7441378e..0beb537ed90 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27829.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27829.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Stormshield Network Security (SNS) 4.3.x before 4.3.35. If multicast streams are enabled on different interfaces, it may be possible to interrupt multicast traffic on some of these interfaces. That could result in a denial of the multicast routing service on the firewall." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en Stormshield Network Security (SNS) 4.3.x anterior a la versi\u00f3n 4.3.35. Si se habilitan los flujos de multidifusi\u00f3n en diferentes interfaces, es posible que se interrumpa el tr\u00e1fico de multidifusi\u00f3n en algunas de ellas. Esto podr\u00eda provocar la denegaci\u00f3n del servicio de enrutamiento de multidifusi\u00f3n en el firewall." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27932.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27932.json index 849529d2c9a..78af19fea98 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27932.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27932.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file deletion process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an attacker may delete a file on the device or cause a denial of service (DoS) condition." + }, + { + "lang": "es", + "value": "Existe un problema de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en el proceso de eliminaci\u00f3n de archivos de la funci\u00f3n de intercambio de archivos de almacenamiento USB de HGW-BL1500HM versi\u00f3n 002.002.003 y anteriores. Si se explota esta vulnerabilidad, un atacante podr\u00eda eliminar un archivo del dispositivo o provocar una denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2701.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2701.json index 66d42780efa..e1ba4c02c72 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2701.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2701.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T09:15:13.950", "lastModified": "2025-03-24T09:15:13.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in AMTT Hotel Broadband Operation System 1.0. This vulnerability affects the function popen of the file /manager/network/port_setup.php. The manipulation of the argument SwitchVersion/SwitchWrite/SwitchIP/SwitchIndex/SwitchState leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en AMTT Hotel Broadband Operation System 1.0. Esta vulnerabilidad afecta la funci\u00f3n popen del archivo /manager/network/port_setup.php. La manipulaci\u00f3n del argumento SwitchVersion/SwitchWrite/SwitchIP/SwitchIndex/SwitchState provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2702.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2702.json index 49546fd5a96..3606f69d699 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2702.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2702.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Softwin WMX3 3.1. This issue affects the function ImageAdd of the file /ImageAdd.ashx. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Softwin WMX3 3.1. Este problema afecta a la funci\u00f3n ImageAdd del archivo /ImageAdd.ashx. La manipulaci\u00f3n del argumento File permite la carga sin restricciones. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json index cfcae9dc442..0edf3952ad8 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork." + }, + { + "lang": "es", + "value": "El componente runsc de Google gVisor present\u00f3 una vulnerabilidad de escalada de privilegios local debido a la gesti\u00f3n incorrecta de los permisos de acceso a archivos, lo que permiti\u00f3 a usuarios sin privilegios acceder a archivos restringidos. Esto se debi\u00f3 a que el proceso se ejecut\u00f3 inicialmente con permisos similares a los de root hasta la primera bifurcaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2779.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2779.json index 165b423e2e4..0756269c3da 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2779.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Insert Headers and Footers Code \u2013 HT Script plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 1/true on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny access to legitimate users or be used to set some values to true, such as registration." + }, + { + "lang": "es", + "value": "El complemento Insert Headers and Footers Code \u2013 HT Script para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n ajax_dismiss en todas las versiones hasta la 1.1.2 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, actualicen los valores de las opciones a 1/true en el sitio de WordPress. Esto puede aprovecharse para actualizar una opci\u00f3n que generar\u00eda un error en el sitio y denegar\u00eda el acceso a usuarios leg\u00edtimos, o para establecer algunos valores como verdaderos, como el registro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2794.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2794.json index 04a5045aab0..5ec148c63c3 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2794.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2794.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading to a Denial-of-Service condition.\n\n\n\n\nThis issue affects Xperience: through 13.0.180." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de reflexi\u00f3n insegura en Kentico Xperience permite que un atacante no autenticado finalice el proceso actual, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio. Este problema afecta a Xperience hasta la versi\u00f3n 13.0.180." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json index 2b77b091f8a..da2e5303a55 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T16:15:27.810", "lastModified": "2025-03-28T19:49:16.520", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28131.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28131.json index 384e65912e6..d27527050aa 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28131.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28131.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with \"Read-Only\" access to perform administrative actions, including stopping system services and deleting critical resources. This flaw arises due to improper authorization enforcement, enabling unauthorized modifications that compromise system integrity and availability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso err\u00f3neo en Nagios Network Analyzer 2024R1.0.3 permite a usuarios con privilegios bajos y acceso de \"Solo lectura\" realizar acciones administrativas, como detener servicios del sistema y eliminar recursos cr\u00edticos. Esta falla surge debido a una aplicaci\u00f3n incorrecta de autorizaciones, lo que permite modificaciones no autorizadas que comprometen la integridad y la disponibilidad del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28132.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28132.json index 59b972192f0..002921f75fe 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28132.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28132.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf." + }, + { + "lang": "es", + "value": "Una falla en la gesti\u00f3n de sesiones en Nagios Network Analyzer 2024R1.0.3 permite a un atacante reutilizar tokens de sesi\u00f3n incluso despu\u00e9s de que un usuario cierre sesi\u00f3n, lo que provoca accesos no autorizados y robo de cuentas. Esto se debe a una expiraci\u00f3n de sesi\u00f3n insuficiente, donde los tokens de sesi\u00f3n siguen siendo v\u00e1lidos despu\u00e9s del cierre de sesi\u00f3n, lo que permite a un atacante suplantar la identidad de los usuarios y realizar acciones en su nombre." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json index 457b662eb80..1f8b8d90245 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netgear DC112A V1.0.0.64 has an OS command injection vulnerability in the usb_adv.cgi, which allows remote attackers to execute arbitrary commands via parameter \"deviceName\" passed to the binary through a POST request." + }, + { + "lang": "es", + "value": "Netgear DC112A V1.0.0.64 tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en usb_adv.cgi, que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro \"deviceName\" pasado al binario a trav\u00e9s de una solicitud POST." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json index ece8890bcf8..526c2833cd4 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the setcfm function, which allows remote attackers to cause web server crash via parameter funcpara1 passed to the binary through a POST request." + }, + { + "lang": "es", + "value": "Tenda W6_S v1.0.0.4_510 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n setcfm, que permite a atacantes remotos provocar el bloqueo del servidor web a trav\u00e9s del par\u00e1metro funcpara1 pasado al binario mediante una solicitud POST." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json index 21a50e09936..b4a19daa690 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the set_local_time function, which allows remote attackers to cause web server crash via parameter time passed to the binary through a POST request." + }, + { + "lang": "es", + "value": "Tenda W6_S v1.0.0.4_510 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_local_time, que permite a atacantes remotos provocar un bloqueo del servidor web a trav\u00e9s del par\u00e1metro time pasado al binario mediante una solicitud POST." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28256.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28256.json index 9c957d532df..767a803c105 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28256.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T21:15:17.810", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json index c338d5b2c9c..239d2dfdd96 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter." + }, + { + "lang": "es", + "value": "D-LINK DI-8100 16.07.26A1 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n ipsec_road_asp a trav\u00e9s del par\u00e1metro host_ip." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json index bde940ac0ed..a134d422902 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter." + }, + { + "lang": "es", + "value": "D-LINK DI-8100 16.07.26A1 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n ipsec_net_asp a trav\u00e9s del par\u00e1metro remot_ip." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2804.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2804.json index e5953fc587b..e67fa836940 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2804.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2804.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress, used by the Newspaper theme, is vulnerable to Reflected Cross-Site Scripting via the 'account_id' and 'account_username' parameters in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento tagDiv Composer para WordPress, utilizado por el tema Newspaper, es vulnerable a ataques Cross-Site Scripting Reflejado a trav\u00e9s de los par\u00e1metros 'account_id' y 'account_username' en todas las versiones hasta la 5.3 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2814.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2814.json new file mode 100644 index 00000000000..3a44626aedb --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2814.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-2814", + "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "published": "2025-04-13T00:15:14.997", + "lastModified": "2025-04-13T00:15:14.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.\n\nThis issue affects operating systems where \"/dev/urandom'\" is unavailable.\u00a0 In that case, Crypt::CBC will fallback to use the insecure rand() function." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] + } + ], + "references": [ + { + "url": "https://metacpan.org/dist/Crypt-CBC/source/lib/Crypt/CBC.pm#L777", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://perldoc.perl.org/functions/rand", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + }, + { + "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html", + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2815.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2815.json index 93a04def360..6ee0725fdc5 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2815.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Administrator Z plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the adminz_import_backup() function in all versions up to, and including, 2025.03.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento Administrator Z para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos, lo que puede provocar una escalada de privilegios debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n adminz_import_backup() en todas las versiones hasta la 2025.03.24 (incluida). Esto permite a atacantes autenticados, con acceso de suscriptor o superior, actualizar opciones arbitrarias en el sitio de WordPress. Esto puede aprovecharse para actualizar el rol predeterminado de registro a administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json index 2753dfe704f..22d759c7ce1 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json @@ -1,98 +1,16 @@ { "id": "CVE-2025-2825", - "sourceIdentifier": "disclosure@vulncheck.com", + "sourceIdentifier": "cve@mitre.org", "published": "2025-03-26T16:15:23.883", - "lastModified": "2025-04-02T21:15:33.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T20:15:17.507", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames can be used to impersonate a user and conduct actions on their behalf, including administrative actions and data retrieval." - }, - { - "lang": "es", - "value": "Las versiones 10.0.0 a 10.8.3 y 11.0.0 a 11.3.0 de CrushFTP se ven afectadas por una vulnerabilidad que puede provocar acceso no autenticado. Las solicitudes HTTP remotas y no autenticadas a CrushFTP pueden permitir a los atacantes obtener acceso no autorizado." + "value": "Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2025-31161. Reason: This Record is a reservation duplicate of CVE-2025-31161. Notes: All CVE users should reference CVE-2025-31161 instead of this Record. All references and descriptions in this Record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "disclosure@vulncheck.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "disclosure@vulncheck.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] - } - ], - "references": [ - { - "url": "https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://projectdiscovery.io/blog/crushftp-authentication-bypass", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/main/http/cves/2025/CVE-2025-2825.yaml", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://www.runzero.com/blog/crushftp/", - "source": "disclosure@vulncheck.com" - }, - { - "url": "https://projectdiscovery.io/blog/crushftp-authentication-bypass", - "source": "af854a3a-2127-422b-91ae-364da2661108" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json index f23330daf52..c62f6a8b281 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede escribir fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json index 0b0a0621c1e..73ab1539870 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file update_employee.php. The manipulation of the argument emp_type leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Payroll Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo update_employee.php. La manipulaci\u00f3n del argumento emp_type provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2855.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2855.json index 8c3e5d61102..d58d09d9a1f 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2855.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2855.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is the function checkFile of the file /api/deploy/upload. The manipulation of the argument servers leads to deserialization. The attack may be launched remotely." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en elunez eladmin hasta la versi\u00f3n 2.7. Este problema afecta a la funci\u00f3n checkFile del archivo /api/deploy/upload. La manipulaci\u00f3n de los servidores de argumentos provoca la deserializaci\u00f3n. El ataque puede ejecutarse remotamente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json index 64d6eefab9a..f834472d308 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-03-27T14:15:55.720", "lastModified": "2025-03-28T16:15:30.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1." + }, + { + "lang": "es", + "value": "Tras la reciente fuga de la sandbox de Chrome (CVE-2025-2783), varios desarrolladores de Firefox identificaron un patr\u00f3n similar en nuestro c\u00f3digo IPC. Un proceso secundario comprometido pod\u00eda provocar que el proceso principal devolviera un identificador involuntariamente potente, lo que provocaba una fuga de la sandbox. La vulnerabilidad original se estaba explotando in situ. *Esto solo afecta a Firefox en Windows. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Firefox < 136.0.4, Firefox ESR < 128.8.1 y Firefox ESR < 115.21.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json index 85c170c8151..f9f5477924c 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios en la versi\u00f3n 2.1.3 del firmware de saTECH BCU. Un atacante con acceso a la CLI del dispositivo podr\u00eda usar el comando nice para eludir todas las restricciones y elevar privilegios como superusuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json index 2aadaf1ad5e..130607f784a 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SaTECH BCU in its firmware version 2.1.3, allows an authenticated attacker to access information about the credentials that users have within the web (.xml file). In order to exploit this vulnerability, the attacker must know the path, regardless of the user's privileges on the website." + }, + { + "lang": "es", + "value": "SaTECH BCU, en su versi\u00f3n de firmware 2.1.3, permite a un atacante autenticado acceder a informaci\u00f3n sobre las credenciales de los usuarios en la web (archivo .xml). Para explotar esta vulnerabilidad, el atacante debe conocer la ruta, independientemente de los privilegios del usuario en el sitio web." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json index 116eb586659..a0133a46564 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately." + }, + { + "lang": "es", + "value": "SaTECH BCU, en su versi\u00f3n de firmware 2.1.3, utiliza el protocolo HTTP. El uso del protocolo HTTP para la navegaci\u00f3n web presenta el problema de que la informaci\u00f3n se intercambia en texto plano. Dado que se intercambian datos confidenciales, como credenciales, un atacante podr\u00eda obtenerlos e iniciar sesi\u00f3n leg\u00edtimamente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json index c1b57d1eb40..c7058cd63e1 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption." + }, + { + "lang": "es", + "value": "SaTECH BCU, en su versi\u00f3n de firmware 2.1.3, utiliza un cifrado de contrase\u00f1as d\u00e9bil. Esto permite que un atacante con acceso al sistema o sitio web del dispositivo obtenga las credenciales, ya que los m\u00e9todos de almacenamiento utilizados no ofrecen un cifrado lo suficientemente s\u00f3lido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json index 29b71a0b3a9..6bee8ff8cc3 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the web application of saTECH BCU firmware version 2.1.3, which could allow an unauthenticated local attacker to exploit active administrator sessions and perform malicious actions. The malicious actions that can be executed by the attacker depend on the logged-in user, and may include rebooting the device or modifying roles and permissions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en la aplicaci\u00f3n web de la versi\u00f3n 2.1.3 del firmware de saTECH BCU, que podr\u00eda permitir a un atacante local no autenticado explotar sesiones de administrador activas y realizar acciones maliciosas. Las acciones maliciosas que puede ejecutar el atacante dependen del usuario conectado y pueden incluir reiniciar el dispositivo o modificar roles y permisos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json index 58c11068f95..8737804a213 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SaTECH BCU in its firmware version 2.1.3 allows an attacker to inject malicious code into the legitimate website owning the affected device, once the cookie is set. This attack only impacts the victim's browser (reflected XSS)." + }, + { + "lang": "es", + "value": "SaTECH BCU, en su versi\u00f3n de firmware 2.1.3, permite a un atacante inyectar c\u00f3digo malicioso en el sitio web leg\u00edtimo del dispositivo afectado, una vez establecida la cookie. Este ataque solo afecta al navegador de la v\u00edctima (XSS reflejado)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json index 027653c4811..fbf27238785 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SaTECH BCU, in its firmware version 2.1.3, could allow XSS attacks and other malicious resources to be stored on the web server. An attacker with some knowledge of the web application could send a malicious request to the victim users. Through this request, the victims would interpret the code (resources) stored on another malicious website owned by the attacker." + }, + { + "lang": "es", + "value": "SaTECH BCU, en su versi\u00f3n de firmware 2.1.3, podr\u00eda permitir ataques XSS y el almacenamiento de otros recursos maliciosos en el servidor web. Un atacante con cierto conocimiento de la aplicaci\u00f3n web podr\u00eda enviar una solicitud maliciosa a los usuarios v\u00edctimas. Mediante esta solicitud, las v\u00edctimas interpretar\u00edan el c\u00f3digo (recursos) almacenado en otro sitio web malicioso propiedad del atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2867.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2867.json index 663bcafaa5f..599ce2267c9 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2867.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2867.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in the GitLab Duo with Amazon Q affecting all versions from 17.8 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A specifically crafted issue could manipulate AI-assisted development features to potentially expose sensitive project data to unauthorized users." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab Duo con Amazon Q que afecta a todas las versiones (desde la 17.8 hasta la 17.8.6), desde la 17.9 hasta la 17.9.3 y desde la 17.10 hasta la 17.10.1. Un problema manipulado espec\u00edficamente podr\u00eda manipular las funciones de desarrollo asistido por IA para exponer datos confidenciales del proyecto a usuarios no autorizados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2868.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2868.json index 92dbafb16c4..212c3573e7c 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2868.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0page parameter in /index.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting (XSS) reflejado en la versi\u00f3n 1.0 de Clinic Queuing System. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute c\u00f3digo JavaScript en el navegador de la v\u00edctima enviando una URL maliciosa a trav\u00e9s del par\u00e1metro page en /index.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2869.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2869.json index 801dd7c4d44..f283badab11 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2869.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2869.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0id parameter in /manage_user.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting (XSS) reflejado en la versi\u00f3n 1.0 de Clinic Queuing System. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute c\u00f3digo JavaScript en el navegador de la v\u00edctima enviando una URL maliciosa a trav\u00e9s del par\u00e1metro id en /manage_user.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2870.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2870.json index d5a7200f788..99a03e13cf1 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2870.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2870.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0page parameter in /patient_side.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting (XSS) reflejado en la versi\u00f3n 1.0 de Clinic Queuing System. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute c\u00f3digo JavaScript en el navegador de la v\u00edctima enviando una URL maliciosa a trav\u00e9s del par\u00e1metro de p\u00e1gina en /patient_side.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json index e6c346d9552..5b40600c257 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The MelaPress Login Security and MelaPress Login Security Premium plugins for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'monitor_admin_actions' function in version 2.1.0. This makes it possible for unauthenticated attackers to delete any user." + }, + { + "lang": "es", + "value": "Los complementos MelaPress Login Security y MelaPress Login Security Premium para WordPress son vulnerables a la p\u00e9rdida no autorizada de datos debido a la falta de comprobaci\u00f3n de la funci\u00f3n \"monitor_admin_actions\" en la versi\u00f3n 2.1.0. Esto permite que atacantes no autenticados eliminen a cualquier usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2878.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2878.json index c04d03e9934..9d048d2d5e4 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2878.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2878.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Kentico CMS up to 13.0.178. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /CMSInstall/install.aspx of the component Additional Database Installation Wizard. The manipulation of the argument new database leads to cross site scripting. The attack can be launched remotely. Upgrading to version 13.0.179 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en Kentico CMS hasta la versi\u00f3n 13.0.178. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /CMSInstall/install.aspx del componente Asistente de instalaci\u00f3n de bases de datos adicionales. La manipulaci\u00f3n del argumento \"new database\" provoca ataques de cross site scripting. El ataque puede ejecutarse remotamente. Actualizar a la versi\u00f3n 13.0.179 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2885.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2885.json index 12cede19c2c..b8697eebb4d 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2885.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2885.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "La falta de validaci\u00f3n del n\u00famero de versi\u00f3n de los metadatos root podr\u00eda permitir que un actor proporcione al cliente un n\u00famero de versi\u00f3n arbitrario en lugar de la versi\u00f3n prevista en el archivo de metadatos ra\u00edz, alterando as\u00ed la versi\u00f3n obtenida por el cliente. Los usuarios deben actualizar a la versi\u00f3n 0.20.0 o posterior y asegurarse de que cualquier c\u00f3digo derivado o bifurcado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2886.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2886.json index 57c4d0847ba..f7a9377ea51 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2886.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2886.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "La falta de validaci\u00f3n de la delegaci\u00f3n final hace que el cliente contin\u00fae buscando en la lista de delegaciones definidas, incluso despu\u00e9s de buscar una delegaci\u00f3n final. Esto podr\u00eda provocar que el cliente obtenga un destino de una fuente incorrecta, alterando su contenido. Los usuarios deben actualizar a la versi\u00f3n 0.20.0 o posterior y asegurarse de que cualquier c\u00f3digo bifurcado o derivado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2887.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2887.json index 9ef0aca024e..afd0f5241a1 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2887.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "Durante la reversi\u00f3n de un objetivo, el cliente no detecta la reversi\u00f3n de los objetivos delegados. Esto podr\u00eda provocar que el cliente obtenga un objetivo de una fuente incorrecta, alterando su contenido. Los usuarios deben actualizar a la versi\u00f3n 0.20.0 o posterior y asegurarse de que cualquier c\u00f3digo derivado o bifurcado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2888.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2888.json index d3886ddffbb..d9ccb51619f 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2888.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "During a snapshot rollback, the client incorrectly caches the timestamp metadata. If the client checks the cache when attempting to perform the next update, the update timestamp validation will fail, preventing the next update until the cache is cleared. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "Durante la reversi\u00f3n de una instant\u00e1nea, el cliente almacena incorrectamente en cach\u00e9 los metadatos de la marca de tiempo. Si el cliente revisa la cach\u00e9 al intentar realizar la siguiente actualizaci\u00f3n, la validaci\u00f3n de la marca de tiempo fallar\u00e1, impidiendo la siguiente actualizaci\u00f3n hasta que se borre la cach\u00e9. Los usuarios deben actualizar a la versi\u00f3n 0.20.0 o posterior y asegurarse de que cualquier c\u00f3digo derivado o bifurcado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2891.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2891.json index ee9b3953be5..12c8539763e 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2891.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2891.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Real Estate 7 WordPress theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the 'template-submit-listing.php' file in all versions up to, and including, 3.5.4. This makes it possible for authenticated attackers, with Seller-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible if front-end listing submission has been enabled." + }, + { + "lang": "es", + "value": "El tema Real Estate 7 para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo mediante el archivo 'template-submit-listing.php' en todas las versiones hasta la 3.5.4 incluida. Esto permite que atacantes autenticados, con acceso de vendedor o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo si se ha habilitado el env\u00edo de anuncios desde la interfaz." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29033.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29033.json index 563a568c19b..843370570ce 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29033.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29033.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29033", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T21:15:43.523", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T21:15:44.653", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en BambooHR Build v.25.0210.170831-83b08dd permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro HTTP GET /saml/index.php?r=\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/Bamboohr_25.0210.170831-83b08dd/OpenRedirect", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29036.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29036.json index 1bab5244752..887cdaac7fa 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29036.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29036.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29036", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T21:15:43.680", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T21:15:44.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en hackathon-starter v.8.1.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente user.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://github.com/HypeDuke/vulnerable-research/blob/main/CVE-2025-29036", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29069.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29069.json index c23d432057a..d832782581e 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29069.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29069.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29069", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T20:15:17.607", - "lastModified": "2025-04-03T20:15:24.247", + "lastModified": "2025-04-04T21:15:44.987", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se ha identificado una vulnerabilidad de desbordamiento del b\u00fafer de mont\u00f3n en lcms2-2.16. Esta vulnerabilidad se encuentra en la funci\u00f3n UnrollChunkyBytes de cmspack.c, responsable de gestionar las transformaciones del espacio de color." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/mm2/Little-CMS/issues/476", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29070.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29070.json index e8ba1360b7f..87c9ea9c8fd 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29070.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29070.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29070", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T21:15:44.023", - "lastModified": "2025-04-04T02:15:18.183", + "lastModified": "2025-04-04T21:15:45.167", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se ha identificado una vulnerabilidad de desbordamiento de b\u00fafer de mont\u00f3n en thesmooth2() en cmsgamma.c en lcms2-2.16 que permite a un atacante remoto provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/mm2/Little-CMS/issues/475", diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json index 9645f33b6a2..084bf1f0676 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Flowise <= 2.2.3 is vulnerable to SQL Injection. via tableName parameter at Postgres_VectorStores." + }, + { + "lang": "es", + "value": "Flowise <= 2.2.3 es vulnerable a la inyecci\u00f3n SQL. a trav\u00e9s del par\u00e1metro tableName en Postgres_VectorStores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29208.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29208.json index e02b8fe60ba..ec3fc018e6f 100644 --- a/CVE-2025/CVE-2025-292xx/CVE-2025-29208.json +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29208.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CodeZips Gym Management System v1.0 is vulnerable to SQL injection in the name parameter within /dashboard/admin/deleteroutine.php." + }, + { + "lang": "es", + "value": "CodeZips Gym Management System v1.0 es vulnerable a la inyecci\u00f3n de SQL en el par\u00e1metro de nombre dentro de /dashboard/admin/deleteroutine.php." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29266.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29266.json index 153817214d5..245717d5130 100644 --- a/CVE-2025/CVE-2025-292xx/CVE-2025-29266.json +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29266.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unraid 7.0.0 before 7.0.1 allows remote users to access the Unraid WebGUI and web console as root without authentication if a container is running in Host networking mode with Use Tailscale enabled." + }, + { + "lang": "es", + "value": "Unraid 7.0.0 anterior a 7.0.1 permite a los usuarios remotos acceder a la interfaz web gr\u00e1fica de Unraid y a la consola web como root sin autenticaci\u00f3n si un contenedor se ejecuta en modo de red de host con la opci\u00f3n Usar Tailscale habilitada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json index 9ecf9a85e93..1631c712ada 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PbootCMS v3.2.9 contains a XSS vulnerability in admin.php?p=/Content/index/mcode/2#tab=t2." + }, + { + "lang": "es", + "value": "PbootCMS v3.2.9 contiene una vulnerabilidad XSS en admin.php?p=/Content/index/mcode/2#tab=t2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json index 495706de6da..55601a97878 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "jerryhanjj ERP 1.0 is vulnerable to SQL Injection in the set_password function in application/controllers/home.php." + }, + { + "lang": "es", + "value": "jerryhanjj ERP 1.0 es vulnerable a la inyecci\u00f3n SQL en la funci\u00f3n set_password en application/controllers/home.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json index 336afd958e5..bb609b57f9d 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "horvey Library-Manager v1.0 is vulnerable to SQL Injection in Admin/Controller/BookController.class.php." + }, + { + "lang": "es", + "value": "horvey Library-Manager v1.0 es vulnerable a la inyecci\u00f3n SQL en Admin/Controller/BookController.class.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json index 031bbedb90e..79ef2536cac 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An insecure permissions vulnerability in verydows v2.0 allows a remote attacker to execute arbitrary code by uploading a file type." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de permisos inseguros en verydows v2.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario al cargar un tipo de archivo." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29766.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29766.json index d9ed0dbace1..43cae623ff3 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29766.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29766.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission & edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap carece de protecci\u00f3n CSRF para el env\u00edo y la edici\u00f3n de artefactos desde la vista del rastreador. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a las v\u00edctimas y lograr que env\u00eden o editen artefactos o comentarios de seguimiento. La vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1741784483 y Tuleap Enterprise Edition 16.5-3 y 16.4-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29772.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29772.json index dfa3b740105..ab15ada2865 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29772.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29772.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. The POST parameter hidden_subcategory is output to the page without being properly processed. This leads to a reflected cross-site scripting (XSS) vul;nerability in CAMOS new.php. This vulnerability is fixed in 7.0.3." + }, + { + "lang": "es", + "value": "OpenEMR es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para la gesti\u00f3n de historiales m\u00e9dicos electr\u00f3nicos y consultas m\u00e9dicas. El par\u00e1metro POST hidden_subcategory se muestra en la p\u00e1gina sin procesarse correctamente. Esto genera una vulnerabilidad de cross-site scripting (XSS) reflejado en CAMOS new.php. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 7.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29795.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29795.json index 921e59e1c34..f2b5394829f 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29795.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29795.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-23T17:15:28.920", "lastModified": "2025-03-23T17:15:28.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La resoluci\u00f3n incorrecta de enlaces antes del acceso al archivo ('seguimiento de enlaces') en Microsoft Edge (basado en Chromium) permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29796.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29796.json index 404006f3e19..997ace62643 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29796.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29796.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json index 87ea09f9362..7d671a3daa6 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json index 28c4426bf98..bac5baab267 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29908.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29908.json index 6a90d1e486f..5e48b10b2ff 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29908.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Netty QUIC codec is a QUIC codec for netty which makes use of quiche. An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). This vulnerability is fixed in 0.0.71.Final." + }, + { + "lang": "es", + "value": "Netty QUIC codec es un codec QUIC para Netty que utiliza quiche. Se descubri\u00f3 un problema en el codec. Una vulnerabilidad de colisi\u00f3n de hash (en el mapa hash utilizado para gestionar las conexiones) permite a atacantes remotos causar una carga considerable de CPU en el servidor (un ataque de denegaci\u00f3n de servicio por hash) al iniciar conexiones con ID de conexi\u00f3n de origen (SCID) en conflicto. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.0.71.Final." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json index c6a68dc9dbe..8c5b080ff7b 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29909.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T22:15:14.657", "lastModified": "2025-03-18T14:15:43.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json index 9d2e25e12c7..4ab3e317b66 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29910.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T22:15:14.810", "lastModified": "2025-03-18T14:15:43.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json index af49c1d272c..c28ead37f6e 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29911.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T23:15:18.293", "lastModified": "2025-03-18T14:15:44.023", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29912.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29912.json index 6f6fb9e4d43..315385f9859 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29912.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T23:15:18.450", "lastModified": "2025-03-17T23:15:18.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29913.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29913.json index b707001117b..535686f1a80 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29913.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T23:15:18.590", "lastModified": "2025-03-17T23:15:18.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json index 26de4b029e7..eecc83c72db 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate." + }, + { + "lang": "es", + "value": "Authentik es un proveedor de identidad de c\u00f3digo abierto. Antes de las versiones 2024.12.4 y 2025.2.3, cuando Authentik se configuraba para usar la base de datos para el almacenamiento de sesiones (una configuraci\u00f3n no predeterminada), la eliminaci\u00f3n de sesiones mediante la interfaz web o la API no revocaba la sesi\u00f3n y el titular de la sesi\u00f3n segu\u00eda teniendo acceso a Authentik. Las versiones 2025.2.3 y 2024.12.4 de Authentik solucionan este problema. Se recomienda cambiar al almacenamiento de sesiones en cach\u00e9 hasta que se pueda actualizar la instancia de Authentik. Sin embargo, esto tambi\u00e9n eliminar\u00e1 todas las sesiones existentes y los usuarios deber\u00e1n volver a autenticarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29929.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29929.json index 9006f68aec8..14ae04ca56d 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29929.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29929.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap carece de protecci\u00f3n CSRF en la administraci\u00f3n de la jerarqu\u00eda de rastreadores. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a las v\u00edctimas y lograr que env\u00eden o editen artefactos o comentarios de seguimiento. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742306712 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29981.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29981.json index eaf5a6aeae2..83e0b6b9d90 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29981.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29981.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure." + }, + { + "lang": "es", + "value": "Dell Wyse Management Suite, versiones anteriores a WMS 5.1, contiene una vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial mediante consultas de datos. Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29982.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29982.json index 3a6df157bf6..9c0923a028a 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29982.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29982.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access." + }, + { + "lang": "es", + "value": "Dell Wyse Management Suite, versiones anteriores a WMS 5.1, contiene una vulnerabilidad de permisos heredados inseguros. Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un acceso no autorizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json index 82fe91c0562..f34a5421b28 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access." + }, + { + "lang": "es", + "value": "Dell Common Event Enabler, versi\u00f3n CEE 9.0.0.0, presenta una vulnerabilidad de inicializaci\u00f3n de un recurso con un valor predeterminado inseguro en el Agente Antivirus Com\u00fan (CAVA). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un acceso no autorizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json index ee96235c0fe..20e27ef2b6a 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access." + }, + { + "lang": "es", + "value": "Dell Common Event Enabler, versi\u00f3n CEE 9.0.0.0, presenta una vulnerabilidad de restricci\u00f3n incorrecta del canal de comunicaci\u00f3n a los endpoints previstos en el agente antivirus com\u00fan (CAVA). Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un acceso no autorizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json index eab53e3e57f..b20705de353 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en la consola de administraci\u00f3n de JBoss EAP. Esta vulnerabilidad de Cross-site scripting almacenado ocurre cuando una aplicaci\u00f3n depura incorrectamente la entrada del usuario antes de almacenarla en un almac\u00e9n de datos. Cuando estos datos almacenados se incluyen posteriormente en p\u00e1ginas web sin la depuraci\u00f3n adecuada, se pueden ejecutar scripts maliciosos en el contexto de los usuarios que visitan estas p\u00e1ginas, lo que puede provocar robo de datos, secuestro de sesi\u00f3n u otras actividades maliciosas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json index 4831d84f63d..4d75002d676 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Contempo Real Estate Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Contempo Real Estate Core para WordPress es vulnerable a cross-site scripting almacenado mediante shortcodes en versiones hasta la 3.6.3 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite a atacantes autenticados con permisos de colaborador o superiores inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json index a1495b021df..b0834a83e79 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The exposure of credentials in the call forwarding configuration module in MeetMe products in versions prior to 2024-09 allows an attacker to gain access to some important assets via configuration files." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de credenciales en el m\u00f3dulo de configuraci\u00f3n de reenv\u00edo de llamadas en los productos MeetMe en versiones anteriores a 2024-09 permite a un atacante obtener acceso a algunos activos importantes a trav\u00e9s de archivos de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json index 91688054a3d..c71a0290c8a 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The lack of encryption in the DuoxMe (formerly Blue) application binary in versions prior to 3.3.1 for iOS devices allows an attacker to gain unauthorised access to the application code and discover sensitive information." + }, + { + "lang": "es", + "value": "La falta de cifrado en el binario de la aplicaci\u00f3n DuoxMe (anteriormente Blue) en versiones anteriores a la 3.3.1 para dispositivos iOS permite a un atacante obtener acceso no autorizado al c\u00f3digo de la aplicaci\u00f3n y descubrir informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json index 6edc298f961..dcad1b22def 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "User enumeration in the password reset module of the MeetMe authentication service in versions prior to 2024-09 allows an attacker to determine whether an email address is registered through specific error messages." + }, + { + "lang": "es", + "value": "La enumeraci\u00f3n de usuarios en el m\u00f3dulo de restablecimiento de contrase\u00f1a del servicio de autenticaci\u00f3n MeetMe en versiones anteriores a 2024-09 permite a un atacante determinar si una direcci\u00f3n de correo electr\u00f3nico est\u00e1 registrada a trav\u00e9s de mensajes de error espec\u00edficos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json index c21f8314019..720a0c477c9 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unauthorised access to the call forwarding service system in MeetMe products in versions prior to 2024-09 allows an attacker to identify multiple users and perform brute force attacks via extensions." + }, + { + "lang": "es", + "value": "El acceso no autorizado al sistema de servicio de reenv\u00edo de llamadas en los productos MeetMe en versiones anteriores a 2024-09 permite a un atacante identificar a m\u00faltiples usuarios y realizar ataques de fuerza bruta a trav\u00e9s de extensiones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json index daa21bc23bc..62c22a730de 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in HDF5 up to 1.14.6. It has been declared as problematic. Affected by this vulnerability is the function H5O_msg_flush of the file src/H5Omessage.c. The manipulation of the argument oh leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en HDF5 hasta la versi\u00f3n 1.14.6. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n H5O_msg_flush del archivo src/H5Omessage.c. La manipulaci\u00f3n del argumento oh provoca un desbordamiento del b\u00fafer en el mont\u00f3n. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2913.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2913.json index dcaa931eaa9..805289a030a 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2913.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2913.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in HDF5 up to 1.14.6. It has been rated as problematic. Affected by this issue is the function H5FL__blk_gc_list of the file src/H5FL.c. The manipulation of the argument H5FL_blk_head_t leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en HDF5 hasta la versi\u00f3n 1.14.6. Se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n H5FL__blk_gc_list del archivo src/H5FL.c. La manipulaci\u00f3n del argumento H5FL_blk_head_t provoca el use after free. Un ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json index 4b5a5e76e2e..bfdccf5e07f 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2914.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in HDF5 up to 1.14.6. This affects the function H5FS__sinfo_Srialize_Sct_cb of the file src/H5FScache.c. The manipulation of the argument sect leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en HDF5 hasta la versi\u00f3n 1.14.6. Esta afecta a la funci\u00f3n H5FS__sinfo_Srialize_Sct_cb del archivo src/H5FScache.c. La manipulaci\u00f3n del argumento sect provoca un desbordamiento del b\u00fafer en el mont\u00f3n. Se requiere acceso local para abordar este ataque. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json index abdb726507f..bc3d5905f5a 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2915.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T17:15:30.750", "lastModified": "2025-03-28T18:15:17.060", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in HDF5 up to 1.14.6. This vulnerability affects the function H5F__accum_free of the file src/H5Faccum.c. The manipulation of the argument overlap_size leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en HDF5 hasta la versi\u00f3n 1.14.6. Esta vulnerabilidad afecta a la funci\u00f3n H5F__accum_free del archivo src/H5Faccum.c. La manipulaci\u00f3n del argumento overlay_size provoca un desbordamiento del b\u00fafer en el mont\u00f3n. Es necesario realizar ataques locales. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2916.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2916.json index 31b32ae15d5..190bbcb0b8e 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2916.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2916.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Aishida Call Center System up to 20250314. This issue affects some unknown processing of the file /doscall/weixin/open/amr2mp3. The manipulation of the argument File leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Aishida Call Center System hasta la versi\u00f3n 20250314. Este problema afecta a un procesamiento desconocido del archivo /doscall/weixin/open/amr2mp3. La manipulaci\u00f3n del argumento \"File\" provoca la inyecci\u00f3n de comandos. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2917.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2917.json index bdee1069d15..0463ae9960c 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2917.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2917.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T18:15:17.253", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2919.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2919.json index 62b33705721..88bbecfb720 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2919.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2919.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T18:15:17.450", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2921.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2921.json index a3395dc4446..d96e55c226f 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2921.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T18:15:17.830", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2924.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2924.json index a8d6901cb7d..e57d24e7050 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2924.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T20:15:26.147", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2925.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2925.json index 223967b6513..d6e8e246d8a 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2925.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T20:15:26.440", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2926.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2926.json index c6e638874ee..ed444d2bac7 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2926.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2926.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T20:15:26.980", "lastModified": "2025-04-01T20:26:39.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2927.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2927.json index 0249a9a0daa..5ac03686c3f 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2927.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2927.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-28T21:15:18.150", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2951.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2951.json index 3c6e521de0a..a716bbfd72a 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2951.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T12:15:27.347", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2952.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2952.json index 1b62612af68..8f450858e7d 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2952.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T15:15:28.830", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2953.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2953.json index 701584dea69..cec810fc707 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2953.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T16:15:14.380", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2954.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2954.json index a920da2d353..d71ea92712f 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2954.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T17:15:19.890", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2959.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2959.json index 13deb4460dd..7b0993478be 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2959.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2959.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T21:15:31.960", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2960.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2960.json index e4fcb85aae0..b8f8e209b6b 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2960.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-30T21:15:32.143", "lastModified": "2025-04-01T20:26:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2982.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2982.json index 07c7bc5d3b2..4f7a2e8bb31 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2982.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2982.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Legrand SMS PowerView 1.x. Affected is an unknown function. The manipulation of the argument redirect leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Legrand SMS PowerView 1.x. Se trata de una funci\u00f3n desconocida. La manipulaci\u00f3n de la redirecci\u00f3n de argumentos provoca la inclusi\u00f3n de archivos. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2983.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2983.json index 37beabcfad0..a51911dbd1d 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2983.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2983.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Legrand SMS PowerView 1.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument redirect leads to os command injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Legrand SMS PowerView 1.x, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n de la redirecci\u00f3n de argumentos provoca la inyecci\u00f3n de comandos del sistema operativo. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta vulnerabilidad, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2984.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2984.json index 4656aad8dc9..40e4f6fe97e 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2984.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /delete.php. The manipulation of the argument emp_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /delete.php. La manipulaci\u00f3n del argumento emp_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2985.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2985.json index 2b93fc0507a..6ad9f733aa5 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2985.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2985.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Payroll Management System 1.0. It has been classified as critical. This affects an unknown part of the file update_account.php. The manipulation of the argument deduction leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo update_account.php. La manipulaci\u00f3n del argumento \"deduction\" provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2997.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2997.json index 157fb25755a..6b3d03e870f 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2997.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2997.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in zhangyanbo2007 youkefu 4.2.0. It has been classified as critical. Affected is an unknown function of the file /res/url. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en zhangyanbo2007 youkefu 4.2.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /res/url. La manipulaci\u00f3n del argumento url provoca server-side request forgery. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2998.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2998.json index 9d0140ef6a2..eec52858544 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2998.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2998.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PyTorch 2.6.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n torch.nn.utils.rnn.pad_packed_sequence. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. Se requiere acceso local para abordar este ataque. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2999.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2999.json index 0c2b9cee556..716c9cbec1d 100644 --- a/CVE-2025/CVE-2025-29xx/CVE-2025-2999.json +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2999.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PyTorch 2.6.0. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n torch.nn.utils.rnn.unpack_sequence. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. Es necesario realizar ataques locales. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30004.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30004.json index 4e711ffdaf3..6d2aad95085 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30004.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30004.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35" + }, + { + "lang": "es", + "value": "Xorcom CompletePBX es vulnerable a la inyecci\u00f3n de comandos en el Programador de Tareas del administrador, lo que permite a los atacantes ejecutar comandos arbitrarios como usuario root. Este problema afecta a CompletePBX: todas las versiones hasta la 5.2.35 y anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30005.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30005.json index 4ea508d8b44..8a1f8c998f4 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30005.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Xorcom CompletePBX is vulnerable to a path traversal via the Diagnostics reporting module, which will allow reading of arbitrary files and additionally delete any retrieved file in place of the expected report.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35" + }, + { + "lang": "es", + "value": "Xorcom CompletePBX es vulnerable a path traversal a trav\u00e9s del m\u00f3dulo de informes de Diagn\u00f3stico, lo que permite la lectura de archivos arbitrarios y, adem\u00e1s, elimina cualquier archivo recuperado en lugar del informe esperado. Este problema afecta a CompletePBX: todas las versiones hasta la 5.2.35 y anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30006.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30006.json index b5e3d15ed66..3e024ebd830 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30006.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Xorcom CompletePBX is vulnerable to a reflected cross-site scripting (XSS) in the administrative control panel.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35" + }, + { + "lang": "es", + "value": "Xorcom CompletePBX es vulnerable a un ataque de cross-site scripting (XSS) reflejado en el panel de control administrativo. Este problema afecta a CompletePBX: todas las versiones hasta la 5.2.35 y anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30065.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30065.json index 4e75f743ac1..b2418e590bf 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30065.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30065.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30065", "sourceIdentifier": "security@apache.org", "published": "2025-04-01T08:15:15.283", - "lastModified": "2025-04-02T22:15:19.823", + "lastModified": "2025-04-07T03:15:21.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -81,6 +81,22 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/04/01/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2025-30065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/apache/parquet-java/pull/3169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://news.ycombinator.com/item?id=43603091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30090.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30090.json index 0130e0385e8..b9a5e95459f 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30090.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "mime.php in SquirrelMail through 1.4.23-svn-20250401 and 1.5.x through 1.5.2-svn-20250401 allows XSS via e-mail headers, because JavaScript payloads are mishandled after $encoded has been set to true." + }, + { + "lang": "es", + "value": "mime.php en Squirrelmail a trav\u00e9s de 1.4.23-SVN-20250401 y 1.5.x a 1.5.2-SVN-20250401 permite XSS a trav\u00e9s de encabezados de correo electr\u00f3nico, porque JavaScript payloads se mezclan despu\u00e9s de que $ codificado se haya establecido en verdad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json index a7afd59b0d0..5820fcdf45b 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T19:15:49.677", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions." + }, + { + "lang": "es", + "value": "HTCondor 23.0.x anterior a 23.0.22, 23.10.x anterior a 23.10.22, 24.0.x anterior a 24.0.6 y 24.6.x anterior a 24.6.1 permite a atacantes autenticados eludir las restricciones de autorizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30149.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30149.json index fb50ff1500c..d2f5d5bebe9 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30149.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows reflected cross-site scripting (XSS) in the AJAX Script interface\\super\\layout_listitems_ajax.php via the target parameter. This vulnerability is fixed in 7.0.3." + }, + { + "lang": "es", + "value": "OpenEMR es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para la gesti\u00f3n de historiales m\u00e9dicos electr\u00f3nicos y consultas m\u00e9dicas. OpenEMR permite el uso de cross-site scripting (XSS) reflejado en la interfaz AJAX Script \\super\\layout_listitems_ajax.php mediante el par\u00e1metro target. Esta vulnerabilidad se ha corregido en la versi\u00f3n 7.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json index c37f399ed15..0942d3bfe0e 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Through the store-api it is possible as a attacker to check if a specific e-mail address has an account in the shop. Using the store-api endpoint /store-api/account/recovery-password you get the response, which indicates clearly that there is no account for this customer. In contrast you get a success response if the account was found. This vulnerability is fixed in Shopware 6.6.10.3 or 6.5.8.17. For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." + }, + { + "lang": "es", + "value": "Shopware 6 es una plataforma de comercio abierta basada en Symfony Framework y Vue. A trav\u00e9s de la API de la tienda, un atacante puede comprobar si una direcci\u00f3n de correo electr\u00f3nico espec\u00edfica tiene una cuenta en la tienda. Al usar el endpoint de la API de la tienda /store-api/account/recovery-password, se obtiene una respuesta que indica claramente que no existe una cuenta para este cliente. Por el contrario, se obtiene una respuesta de \u00e9xito si se encuentra la cuenta. Esta vulnerabilidad est\u00e1 corregida en Shopware 6.6.10.3 o 6.5.8.17. Para versiones anteriores a la 6.4, las medidas de seguridad correspondientes tambi\u00e9n est\u00e1n disponibles mediante un complemento. Para disfrutar de todas las funciones, recomendamos actualizar a la \u00faltima versi\u00f3n de Shopware." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json index be733b0b6be..e6a2c79d3af 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Shopware is an open commerce platform. It's possible to pass long passwords that leads to Denial Of Service via forms in Storefront forms or Store-API. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17. For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version." + }, + { + "lang": "es", + "value": "Shopware es una plataforma de comercio abierta. Es posible pasar contrase\u00f1as largas que provoquen una denegaci\u00f3n de servicio a trav\u00e9s de formularios de Storefront o de la API de la tienda. Esta vulnerabilidad se corrigi\u00f3 en las versiones 6.6.10.3 o 6.5.8.17. Para versiones anteriores a la 6.4, las medidas de seguridad correspondientes tambi\u00e9n est\u00e1n disponibles mediante un complemento. Para disfrutar de todas las funciones, recomendamos actualizar a la \u00faltima versi\u00f3n de Shopware." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30155.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30155.json index 9b1c0c1aef5..ec109c0cfbd 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30155.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap no exige permisos de lectura a los rastreadores principales en la API REST. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742392651 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30161.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30161.json index 1bdaea88bdb..ed1e0778595 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30161.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30161.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. A stored XSS vulnerability in the Bronchitis form component of OpenEMR allows anyone who is able to edit a bronchitis form to steal credentials from administrators. This vulnerability is fixed in 7.0.3." + }, + { + "lang": "es", + "value": "OpenEMR es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para la gesti\u00f3n de historiales m\u00e9dicos electr\u00f3nicos y consultas m\u00e9dicas. Una vulnerabilidad de XSS almacenado en el componente de formulario de bronquitis de OpenEMR permite que cualquiera que pueda editar un formulario de bronquitis robe las credenciales de los administradores. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 7.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json index f6655e35611..15da9660a77 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into emails sent via the admin interface, potentially leading to session cookie theft and the alteration of page content. The vulnerability was discovered in the /admin/email/send-test-email endpoint using the POST method. The vulnerable parameter is content, which permits the injection of arbitrary HTML code during the email sending process. While JavaScript code injection is blocked through filtering, HTML code injection remains possible. This vulnerability is fixed in 1.7.6." + }, + { + "lang": "es", + "value": "El paquete Admin Classic de Pimcore proporciona una interfaz de usuario backend para Pimcore. Un problema de inyecci\u00f3n de HTML permite a los usuarios con acceso a la funci\u00f3n de env\u00edo de correos electr\u00f3nicos inyectar c\u00f3digo HTML arbitrario en los correos enviados a trav\u00e9s de la interfaz de administraci\u00f3n, lo que podr\u00eda provocar el robo de cookies de sesi\u00f3n y la alteraci\u00f3n del contenido de la p\u00e1gina. La vulnerabilidad se descubri\u00f3 en el endpoint /admin/email/send-test-email mediante el m\u00e9todo POST. El par\u00e1metro vulnerable es content, lo que permite la inyecci\u00f3n de c\u00f3digo HTML arbitrario durante el proceso de env\u00edo de correos electr\u00f3nicos. Si bien la inyecci\u00f3n de c\u00f3digo JavaScript se bloquea mediante filtrado, la inyecci\u00f3n de c\u00f3digo HTML sigue siendo posible. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.7.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30168.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30168.json index 207d7a251a4..319ff6af461 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30168.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30168.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-21T15:15:43.440", "lastModified": "2025-03-21T15:15:43.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 7.5.2 and 8.0.2, the 3rd party authentication handling of Parse Server allows the authentication credentials of some specific authentication providers to be used across multiple Parse Server apps. For example, if a user signed up using the same authentication provider in two unrelated Parse Server apps, the credentials stored by one app can be used to authenticate the same user in the other app. Note that this only affects Parse Server apps that specifically use an affected 3rd party authentication provider for user authentication, for example by setting the Parse Server option auth to configure a Parse Server authentication adapter. The fix of this vulnerability requires to upgrade Parse Server to a version that includes the bug fix, as well as upgrade the client app to send a secure payload, which is different from the previous insecure payload. This vulnerability is fixed in 7.5.2 and 8.0.2." + }, + { + "lang": "es", + "value": "Parse Server es un backend de c\u00f3digo abierto que puede implementarse en cualquier infraestructura que ejecute Node.js. En versiones anteriores a la 7.5.2 y la 8.0.2, la gesti\u00f3n de la autenticaci\u00f3n de terceros de Parse Server permit\u00eda usar las credenciales de algunos proveedores de autenticaci\u00f3n espec\u00edficos en varias aplicaciones de Parse Server. Por ejemplo, si un usuario se registraba con el mismo proveedor de autenticaci\u00f3n en dos aplicaciones de Parse Server independientes, las credenciales almacenadas por una aplicaci\u00f3n pod\u00edan usarse para autenticar al mismo usuario en la otra. Tenga en cuenta que esto solo afecta a las aplicaciones de Parse Server que utilizan espec\u00edficamente un proveedor de autenticaci\u00f3n de terceros afectado para la autenticaci\u00f3n de usuarios, por ejemplo, configurando la opci\u00f3n \"auth\" de Parse Server para configurar un adaptador de autenticaci\u00f3n de Parse Server. Para corregir esta vulnerabilidad, es necesario actualizar Parse Server a una versi\u00f3n que incluya la correcci\u00f3n del error, as\u00ed como actualizar la aplicaci\u00f3n cliente para que env\u00ede un payload seguro, diferente del payload inseguro anterior. Esta vulnerabilidad se corrigi\u00f3 en las versiones 7.5.2 y 8.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json index b5ed442a6a2..17616ee4b31 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.\n\nUsers are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.\n\nCamel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.\n\n\nThis allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n/inyecci\u00f3n en Apache Camel en el componente Camel-Undertow bajo ciertas condiciones. Este problema afecta a Apache Camel: de la versi\u00f3n 4.10.0 a la 4.10.3, y de la versi\u00f3n 4.8.0 a la 4.8.6. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.10.3 para la versi\u00f3n 4.10.x LTS y a la 4.8.6 para la versi\u00f3n 4.8.x LTS. El componente Camel Undertow es vulnerable a la inyecci\u00f3n de encabezados de mensajes de Camel; en particular, la estrategia de filtrado de encabezados personalizada que utiliza el componente solo filtra la direcci\u00f3n de salida, pero no la de entrada. Esto permite a un atacante incluir encabezados espec\u00edficos de Camel que, en algunos componentes de Camel, pueden alterar el comportamiento, como los componentes camel-bean o camel-exec." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30195.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30195.json index 34d86b7ca4c..68bb3c0bc07 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30195.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30195.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.\n\nThe remedy is: upgrade to the patched 5.2.1 version.\n\nWe would like to thank Volodymyr Ilyin for bringing this issue to our attention." + }, + { + "lang": "es", + "value": "Un atacante puede publicar una zona que contenga conjuntos de registros de recursos espec\u00edficos. El procesamiento y el almacenamiento en cach\u00e9 de los resultados de estos conjuntos pueden provocar accesos ilegales a la memoria y el bloqueo del Recursor, lo que provoca una denegaci\u00f3n de servicio. La soluci\u00f3n es actualizar a la versi\u00f3n 5.2.1 parcheada. Agradecemos a Volodymyr Ilyin por informarnos sobre este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30203.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30203.json index 27956b0b845..2b7a6ad0c29 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30203.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30203.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap permite el uso de cross-site scripting (XSS) a trav\u00e9s del contenido de las fuentes RSS en los widgets RSS. Un administrador de proyecto o alguien con control sobre una fuente RSS en uso podr\u00eda aprovechar esta vulnerabilidad para obligar a las v\u00edctimas a ejecutar c\u00f3digo no controlado. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742562878 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30209.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30209.json index 98fbb349526..8ad0cba5ab7 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30209.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30209.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Un atacante puede acceder al contenido o la informaci\u00f3n de las notas de la versi\u00f3n a trav\u00e9s de los endpoints REST de FRS a los que no deber\u00eda tener acceso. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742812323 y Tuleap Enterprise Edition 16.5-6 y 16.4-10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30210.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30210.json index 5959714792c..2464fe176ba 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30210.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30210.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bruno is an open source IDE for exploring and testing APIs. Prior to 1.39.1, the custom tool-tip components which internally use react-tooltip were setting the content (in this case the Environment name) as raw HTML which then gets injected into DOM on hover. This, combined with loose Content Security Policy restrictions, allowed any valid HTML text containing inline script to get executed on hovering over the respective Environment's name. This vulnerability's attack surface is limited strictly to scenarios where users import collections from untrusted or malicious sources. The exploit requires deliberate action from the user\u2014specifically, downloading and opening an externally provided malicious Bruno or Postman collection export and the user hovers on the environment name. This vulnerability is fixed in 1.39.1." + }, + { + "lang": "es", + "value": "Bruno es un IDE de c\u00f3digo abierto para explorar y probar API. Antes de la versi\u00f3n 1.39.1, los componentes de informaci\u00f3n sobre herramientas personalizados que usan internamente react-tooltip configuraban el contenido (en este caso, el nombre del entorno) como HTML sin formato, que se inyectaba en el DOM al pasar el cursor sobre el nombre del entorno. Esto, junto con restricciones flexibles de la Pol\u00edtica de Seguridad de Contenido, permit\u00eda que cualquier texto HTML v\u00e1lido que contuviera scripts en l\u00ednea se ejecutara al pasar el cursor sobre el nombre del entorno correspondiente. La superficie de ataque de esta vulnerabilidad se limita estrictamente a escenarios donde los usuarios importan colecciones de fuentes no confiables o maliciosas. El exploit requiere una acci\u00f3n deliberada del usuario; espec\u00edficamente, descargar y abrir una exportaci\u00f3n de colecci\u00f3n maliciosa de Bruno o Postman proporcionada externamente y pasar el cursor sobre el nombre del entorno. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.39.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json index 8d41db6cb8e..caef914cd55 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option." + }, + { + "lang": "es", + "value": "Erlang/OTP es un conjunto de librer\u00edas para el lenguaje de programaci\u00f3n Erlang. En versiones anteriores a OTP-27.3.1, 26.2.5.10 y 25.3.2.19, un mensaje de inicio de KEX malintencionado pod\u00eda generar un alto consumo de memoria. La implementaci\u00f3n no verifica los l\u00edmites especificados por RFC para los nombres de algoritmos (64 caracteres) proporcionados en el mensaje de inicio de KEX. Un paquete de inicio de KEX de gran tama\u00f1o puede provocar un procesamiento ineficiente de los datos de error. Como resultado, se asignar\u00e1 una gran cantidad de memoria para procesar datos maliciosos. Las versiones OTP-27.3.1, OTP-26.2.5.10 y OTP-25.3.2.19 solucionan este problema. Existen algunos workarounds. Se puede establecer la opci\u00f3n `parallel_login` en `false` o reducir el valor de la opci\u00f3n `max_sessions`." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30216.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30216.json index a7afa621921..dd7dc4dbffe 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30216.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30216.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-25T20:15:22.567", "lastModified": "2025-03-27T16:45:46.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30221.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30221.json index 81f206275b4..7a9373d424f 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30221.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30221.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Pitchfork is a preforking HTTP server for Rack applications. Versions prior to 0.11.0 are vulnerable to HTTP Response Header Injection when used in conjunction with Rack 3. The issue was fixed in Pitchfork release 0.11.0. No known workarounds are available." + }, + { + "lang": "es", + "value": "Pitchfork es un servidor HTTP prebifurcado para aplicaciones Rack. Las versiones anteriores a la 0.11.0 son vulnerables a la inyecci\u00f3n de encabezados de respuesta HTTP al usarse con Rack 3. El problema se solucion\u00f3 en la versi\u00f3n 0.11.0 de Pitchfork. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30223.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30223.json index e44c2670b52..87e2905d49f 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30223.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting (XSS) vulnerability exists in Beego's RenderForm() function due to improper HTML escaping of user-controlled data. This vulnerability allows attackers to inject malicious JavaScript code that executes in victims' browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability affects any application using Beego's RenderForm() function with user-provided data. Since it is a high-level function generating an entire form markup, many developers would assume it automatically escapes attributes (the way most frameworks do). This vulnerability is fixed in 2.3.6." + }, + { + "lang": "es", + "value": "Beego es un framework web de c\u00f3digo abierto para el lenguaje de programaci\u00f3n Go. Antes de la versi\u00f3n 2.3.6, exist\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n RenderForm() de Beego debido al escape HTML incorrecto de datos controlados por el usuario. Esta vulnerabilidad permite a los atacantes inyectar c\u00f3digo JavaScript malicioso que se ejecuta en los navegadores de las v\u00edctimas, lo que puede provocar el secuestro de sesiones, el robo de credenciales o la apropiaci\u00f3n de cuentas. La vulnerabilidad afecta a cualquier aplicaci\u00f3n que utilice la funci\u00f3n RenderForm() de Beego con datos proporcionados por el usuario. Al ser una funci\u00f3n de alto nivel que genera un marcado de formulario completo, muchos desarrolladores asumir\u00edan que escapa autom\u00e1ticamente los atributos (como hacen la mayor\u00eda de los frameworks). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 2.3.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30224.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30224.json index 41df4a7b725..d2d2ac4a26d 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30224.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30224.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "MyDumper is a MySQL Logical Backup Tool. The MySQL C client library (libmysqlclient) allows authenticated remote actors to read arbitrary files from client systems via a crafted server response to LOAD LOCAL INFILE query, leading to sensitive information disclosure when clients connect to untrusted MySQL servers without explicitly disabling the local infile capability. Mydumper has the local infile option enabled by default and does not have an option to disable it. This can lead to an unexpected arbitrary file read if the Mydumper tool connects to an untrusted server. This vulnerability is fixed in 0.18.2-8." + }, + { + "lang": "es", + "value": "MyDumper es una herramienta de copia de seguridad l\u00f3gica de MySQL. La librer\u00eda cliente MySQL C (libmysqlclient) permite a agentes remotos autenticados leer archivos arbitrarios de los sistemas cliente mediante una respuesta de servidor manipulada a la consulta LOAD LOCAL INFILE, lo que provoca la divulgaci\u00f3n de informaci\u00f3n confidencial cuando los clientes se conectan a servidores MySQL no confiables sin deshabilitar expl\u00edcitamente la funci\u00f3n de archivo local. Mydumper tiene la opci\u00f3n de archivo local habilitada por defecto y no permite deshabilitarla. Esto puede provocar la lectura inesperada de archivos arbitrarios si la herramienta Mydumper se conecta a un servidor no confiable. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.18.2-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30232.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30232.json index 5d2d62f7684..c0b15b2bedf 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30232.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30232.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges." + }, + { + "lang": "es", + "value": "Una funci\u00f3n de use-after-free en Exim 4.96 a 4.98.1 podr\u00eda permitir a los usuarios (con acceso a la l\u00ednea de comandos) aumentar los privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json index 9ccbae105cc..48231522351 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.670", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json index 4044fc21b47..1613ee4d4b5 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.820", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json index 40b7a689acf..f43a7f8d21e 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.980", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json index 4acfc396016..2ce3350b963 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.127", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json index 5afbe21bf6b..5b85580ae3f 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.273", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json index 67b71cd561e..9e57f9307c1 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.430", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json index c2bc0ca546f..118eeafb9c2 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.583", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json index 4e3fdbc65a8..8036e4c7455 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.737", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json index 10800fb0758..b348b4f35ec 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.883", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json index 17d08e7ee77..441359a0895 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.057", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json index 1d541d4cbff..b4c6ee72966 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.210", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json index 44eae50fb49..4f110ec9e64 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.363", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json index f75b694e511..1a536ea090c 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.527", "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30354.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30354.json index ef41a22d7e4..d25caf09b43 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30354.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30354.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bruno is an open source IDE for exploring and testing APIs. A bug in the assertion runtime caused assert expressions to run in Developer Mode, even if Safe Mode was selected. The bug resulted in the sandbox settings to be ignored for the particular case where a single request is run/sent. This vulnerability's attack surface is limited strictly to scenarios where users import collections from untrusted or malicious sources. The exploit requires deliberate action from the user\u2014specifically, downloading and opening an externally provided malicious Bruno collection. The vulnerability is fixed in 1.39.1." + }, + { + "lang": "es", + "value": "Bruno es un IDE de c\u00f3digo abierto para explorar y probar API. Un error en el entorno de ejecuci\u00f3n de aserciones provocaba que las expresiones de aserci\u00f3n se ejecutaran en modo de desarrollador, incluso con el modo seguro activado. Este error hac\u00eda que se ignorara la configuraci\u00f3n del entorno de pruebas en el caso particular de ejecutar/enviar una sola solicitud. La superficie de ataque de esta vulnerabilidad se limita estrictamente a escenarios en los que los usuarios importan colecciones de fuentes no confiables o maliciosas. El exploit requiere una acci\u00f3n deliberada del usuario; concretamente, descargar y abrir una colecci\u00f3n maliciosa de Bruno proporcionada externamente. La vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.39.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30356.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30356.json index 1489b3f5902..aba4b23aaec 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30356.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-01T22:15:21.297", "lastModified": "2025-04-02T14:58:07.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In 1.3.3 and earlier, a heap buffer overflow vulnerability persists in the Crypto_TC_ApplySecurity function due to an incomplete validation check on the fl (frame length) field. Although CVE-2025-29912 addressed an underflow issue involving fl, the patch fails to fully prevent unsafe calculations. As a result, an attacker can still craft malicious frames that cause a negative tf_payload_len, which is then interpreted as a large unsigned value, leading to a heap buffer overflow in a memcpy call." + }, + { + "lang": "es", + "value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales CCSDS - Procedimientos Extendidos (SDLS-EP) para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. En la versi\u00f3n 1.3.3 y anteriores, persiste una vulnerabilidad de desbordamiento del b\u00fafer de pila en la funci\u00f3n Crypto_TC_ApplySecurity debido a una comprobaci\u00f3n de validaci\u00f3n incompleta en el campo fl (longitud de la trama). Aunque CVE-2025-29912 solucion\u00f3 un problema de desbordamiento por debajo de la capacidad de fl, el parche no previene completamente los c\u00e1lculos inseguros. Como resultado, un atacante a\u00fan puede manipular tramas maliciosas que provoquen un valor negativo en tf_payload_len, que se interpreta como un valor grande sin signo, lo que provoca un desbordamiento del b\u00fafer de pila en una llamada a memcpy." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30358.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30358.json index 3ff22fe83b4..c0e919b5291 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30358.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mesop is a Python-based UI framework that allows users to build web applications. A class pollution vulnerability in Mesop prior to version 0.14.1 allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequences like remote code execution when gadgets are available. Users should upgrade to version 0.14.1 to obtain a fix for the issue." + }, + { + "lang": "es", + "value": "Mesop es un framework de interfaz de usuario basado en Python que permite a los usuarios crear aplicaciones web. Una vulnerabilidad de contaminaci\u00f3n de clases en Mesop, antes de la versi\u00f3n 0.14.1, permite a los atacantes sobrescribir variables globales y atributos de clase en ciertos m\u00f3dulos de Mesop durante la ejecuci\u00f3n. Esta vulnerabilidad podr\u00eda provocar un ataque de denegaci\u00f3n de servicio (DoS) contra el servidor. Adem\u00e1s, podr\u00eda tener otras consecuencias graves debido a la implementaci\u00f3n de la aplicaci\u00f3n, como la confusi\u00f3n de identidad, donde un atacante podr\u00eda suplantar la identidad de un asistente o un rol del sistema en las conversaciones. Esta suplantaci\u00f3n podr\u00eda permitir ataques de jailbreak al interactuar con grandes modelos de lenguaje (LLM). Al igual que la contaminaci\u00f3n del prototipo de Javascript, esta vulnerabilidad podr\u00eda permitir a los atacantes manipular el flujo de datos o el flujo de control previstos de la aplicaci\u00f3n durante la ejecuci\u00f3n, lo que podr\u00eda tener consecuencias graves, como la ejecuci\u00f3n remota de c\u00f3digo cuando haya gadgets disponibles. Los usuarios deben actualizar a la versi\u00f3n 0.14.1 para obtener una soluci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30368.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30368.json index 2e537e42c5f..776c1defe12 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30368.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30368.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1." + }, + { + "lang": "es", + "value": "Zulip es una herramienta de colaboraci\u00f3n en equipo de c\u00f3digo abierto. La API para eliminar una exportaci\u00f3n de organizaci\u00f3n deber\u00eda estar restringida a los administradores de la organizaci\u00f3n, pero su controlador no verificaba que el campo perteneciera a la misma organizaci\u00f3n que el usuario. Por lo tanto, se permit\u00eda incorrectamente que un administrador de cualquier organizaci\u00f3n eliminara una exportaci\u00f3n de una organizaci\u00f3n diferente. Esto se solucion\u00f3 en Zulip Server 10.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30369.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30369.json index 35ca030028c..a4c864ce9fe 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30369.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30369.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1." + }, + { + "lang": "es", + "value": "Zulip es una herramienta de colaboraci\u00f3n en equipo de c\u00f3digo abierto. La API para eliminar un campo de perfil personalizado de una organizaci\u00f3n deber\u00eda estar restringida a los administradores de la organizaci\u00f3n, pero su controlador no verificaba que el campo perteneciera a la misma organizaci\u00f3n que el usuario. Por lo tanto, se permit\u00eda incorrectamente que un administrador de cualquier organizaci\u00f3n eliminara campos de perfil personalizados pertenecientes a una organizaci\u00f3n diferente. Esto se solucion\u00f3 en Zulip Server 10.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json index 2e65a607eea..abe0a9b1c55 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround." + }, + { + "lang": "es", + "value": "Metabase es una herramienta de inteligencia empresarial y an\u00e1lisis integrado. Las versiones anteriores a v0.52.16.4, v1.52.16.4, v0.53.8 y v1.53.8 son vulnerables a la elusi\u00f3n de la protecci\u00f3n de acceso a enlaces locales en el endpoint GeoJson. Las instancias de Metabase alojadas en servidores propios que utilizan la funci\u00f3n GeoJson podr\u00edan verse afectadas si su Metabase se aloja junto con otros recursos no seguros. Esto se ha corregido en v0.52.16.4, v1.52.16.4, v0.53.8 y v1.53.8. Una soluci\u00f3n alternativa es migrar a Metabase Cloud o redistribuir Metabase en una subred dedicada con controles estrictos de puertos de salida." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json index 58e058fcb78..d4abaca0852 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-28T15:15:51.227", "lastModified": "2025-03-28T18:11:40.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue." + }, + { + "lang": "es", + "value": "Emlog es un sistema de creaci\u00f3n de sitios web de c\u00f3digo abierto. Las versiones pro-2.5.7 y pro-2.5.8 de Emlog Pro contienen una vulnerabilidad de inyecci\u00f3n SQL. `search_controller.php` no utiliza barras de adici\u00f3n despu\u00e9s de urldecode, lo que permite que la doble codificaci\u00f3n de URL omita las barras de adici\u00f3n anteriores. Esto podr\u00eda resultar en una posible filtraci\u00f3n de informaci\u00f3n confidencial de la base de datos de usuarios. La versi\u00f3n pro-2.5.9 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30520.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30520.json index 15b27454916..7f3b21a0896 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30520.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30520.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in crosstec Breezing Forms allows Reflected XSS. This issue affects Breezing Forms: from n/a through 1.2.8.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en crosstec Breezing Formspermite XSS reflejado. Este problema afecta a Breezing Forms desde n/d hasta la versi\u00f3n 1.2.8.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30544.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30544.json index 74648b0a9fd..bdbf1cfcfbb 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30544.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30544.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound OK Poster Group allows Reflected XSS. This issue affects OK Poster Group: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound OK Poster Group permite XSS reflejado. Este problema afecta a OK Poster Group desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30547.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30547.json index 431b6070f25..c50f38e79c1 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30547.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30547.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Tufts WP Cards allows Reflected XSS. This issue affects WP Cards: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en David Tufts WP Cards permite XSS reflejado. Este problema afecta a WP Cards desde n/d hasta la versi\u00f3n 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30548.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30548.json index c0d08bf7bec..1d19b81a78c 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30548.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30548.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VarDump s.r.l. Advanced Post Search allows Reflected XSS. This issue affects Advanced Post Search: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en VarDump s.r.l. Advanced Post Search que permite XSS reflejado. Este problema afecta a la B\u00fasqueda avanzada de entradas desde n/d hasta la versi\u00f3n 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30559.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30559.json index 625c16eb986..c1483cf545e 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30559.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30559.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Kento WordPress Stats allows Stored XSS. This issue affects Kento WordPress Stats: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Kento WordPress Stats permite XSS almacenado. Este problema afecta a Kento WordPress Stats desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30563.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30563.json index ccc553f804a..fec90bb801c 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30563.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30563.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tidekey allows Reflected XSS. This issue affects Tidekey: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Tidekey que permite XSS reflejado. Este problema afecta a Tidekey desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30579.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30579.json index d06cd55afb8..51a353b52b9 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30579.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30579.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jakeii Pesapal Gateway for Woocommerce allows Reflected XSS. This issue affects Pesapal Gateway for Woocommerce: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jakeii Pesapal Gateway para Woocommerce permite XSS reflejado. Este problema afecta a Pesapal Gateway para Woocommerce desde n/d hasta la versi\u00f3n 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30589.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30589.json index 4afeb0f68f2..8e091dbece9 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30589.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Flickr set slideshows allows SQL Injection. This issue affects Flickr set slideshows: from n/a through 0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Flickr set slideshows permite la inyecci\u00f3n SQL. Este problema afecta a las presentaciones de Flickr desde n/d hasta la versi\u00f3n 0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30594.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30594.json index d223753d9cd..c0d430daa2a 100644 --- a/CVE-2025/CVE-2025-305xx/CVE-2025-30594.json +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30594.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en NotFound Include URL permite el Path Traversal. Este problema afecta a la URL de inclusi\u00f3n desde n/d hasta la versi\u00f3n 0.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30607.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30607.json index 567bf3bc6da..181f4e55f40 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30607.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Name.ly Quick Localization allows Reflected XSS. This issue affects Quick Localization: from n/a through 0.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Name.ly Quick Localization permite XSS reflejado. Este problema afecta a la localizaci\u00f3n r\u00e1pida desde n/d hasta la versi\u00f3n 0.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30613.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30613.json index d550a167839..0507a1abcb4 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30613.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30613.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N-Media Nmedia MailChimp allows Stored XSS. This issue affects Nmedia MailChimp: from n/a through 5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en N-Media MailChimp permite XSS almacenado. Este problema afecta a Nmedia MailChimp desde la versi\u00f3n n/d hasta la 5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30614.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30614.json index b4527658e64..e2413dead12 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30614.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30614.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Haozhe Xie Google Font Fix allows Reflected XSS. This issue affects Google Font Fix: from n/a through 2.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Haozhe Xie Google Font Fix permite XSS reflejado. Este problema afecta a Google Font Fix desde n/d hasta la versi\u00f3n 2.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30622.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30622.json index 960f5bd9919..549d9519ef3 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30622.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30622.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in torsteino PostMash allows SQL Injection. This issue affects PostMash: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en torsteino PostMash que permite la inyecci\u00f3n SQL. Este problema afecta a PostMash desde n/d hasta la versi\u00f3n 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json index b99f5fae892..1d1646aa4f7 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero nulo en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json index 4d75f83c6dd..f4dc2d05802 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero nulo en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30672.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30672.json index 0ed00c948ea..a0ced0032c1 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30672.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mite for Perl before 0.013000 generates code with the current working directory ('.') added to the @INC path similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be \nloaded instead of the intended file, potentially leading to arbitrary \ncode execution.\n\nThis affects the Mite distribution itself, and other distributions that contain code generated by Mite." + }, + { + "lang": "es", + "value": "Mite para Perl anterior a la versi\u00f3n 0.013000 genera c\u00f3digo con el directorio de trabajo actual ('.') a\u00f1adido a la ruta @INC, similar a CVE-2016-1238. Si un atacante coloca un archivo malicioso en el directorio de trabajo actual, este podr\u00eda cargarse en lugar del archivo previsto, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Esto afecta a la propia distribuci\u00f3n de Mite y a otras distribuciones que contienen c\u00f3digo generado por Mite." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30673.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30673.json index a2c1027c7f8..38b624ae7ac 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30673.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be\u00a0loaded instead of the intended file, potentially leading to arbitrary\u00a0code execution.\n\nSub::HandlesVia uses Mite to produce the affected code section due to\u00a0CVE-2025-30672" + }, + { + "lang": "es", + "value": "Sub::HandlesVia para Perl anterior a la versi\u00f3n 0.050002 permite cargar c\u00f3digo no confiable del directorio de trabajo actual ('.') de forma similar a CVE-2016-1238. Si un atacante coloca un archivo malicioso en el directorio de trabajo actual, este podr\u00eda cargarse en lugar del archivo deseado, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Sub::HandlesVia utiliza Mite para generar la secci\u00f3n de c\u00f3digo afectada debido a CVE-2025-30672." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json index e59358f54b8..1fe813b2776 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application logs.\n\n\nThis vulnerability can lead to unintended exposure of credentials in log files, potentially allowing attackers with access to these logs to obtain Apache Kafka credentials. The vulnerability's impact is limited by the fact that an attacker would need access to the application logs to exploit this issue.\n\nThis issue affects Apache Pulsar IO's Apache Kafka connectors in all versions before 3.0.11, 3.3.6, and 4.0.4.\n\n\n3.0.x version users should upgrade to at least 3.0.11.\n\n3.3.x version users should upgrade to at least 3.3.6.\n\n4.0.x version users should upgrade to at least 4.0.4.\n\n\nUsers operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions." + }, + { + "lang": "es", + "value": "Apache Pulsar contiene m\u00faltiples conectores para la integraci\u00f3n con Apache Kafka. Los conectores de origen, receptor y receptor del adaptador Kafka Connect de Pulsar IO registran propiedades de configuraci\u00f3n sensibles en texto plano en los registros de la aplicaci\u00f3n. Esta vulnerabilidad puede provocar la exposici\u00f3n involuntaria de credenciales en los archivos de registro, lo que podr\u00eda permitir a atacantes con acceso a estos registros obtener credenciales de Apache Kafka. El impacto de la vulnerabilidad es limitado debido a que un atacante necesitar\u00eda acceder a los registros de la aplicaci\u00f3n para explotar este problema. Este problema afecta a los conectores de Apache Kafka de Apache Pulsar IO en todas las versiones anteriores a la 3.0.11, 3.3.6 y 4.0.4. Los usuarios de la versi\u00f3n 3.0.x deben actualizar al menos a la 3.0.11. Los usuarios de la versi\u00f3n 3.3.x deben actualizar al menos a la 3.3.6. Los usuarios de la versi\u00f3n 4.0.x deben actualizar al menos a la 4.0.4. Los usuarios de versiones anteriores a las mencionadas anteriormente deben actualizar a las versiones parcheadas mencionadas o a versiones m\u00e1s recientes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30774.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30774.json index 08e0c9cf7c1..5ef48dc2d18 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30774.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30774.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ays Pro Quiz Maker allows SQL Injection. This issue affects Quiz Maker: from n/a through 6.6.8.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Ays Pro Quiz Maker permite la inyecci\u00f3n SQL. Este problema afecta a Quiz Maker desde n/d hasta la versi\u00f3n 6.6.8.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30782.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30782.json index 4f9d8f1acbd..00156111144 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30782.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30782.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Shuffle Subscribe to Download Lite allows PHP Local File Inclusion. This issue affects Subscribe to Download Lite: from n/a through 1.2.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') en WP Shuffle Subscribe to Download Lite permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a Subscribe to Download Lite desde n/d hasta la versi\u00f3n 1.2.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30793.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30793.json index c253e3e88dc..f155928d73c 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30793.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Property Hive Houzez Property Feed allows Path Traversal. This issue affects Houzez Property Feed: from n/a through 2.5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Property Hive Houzez Property Feed permite Path Traversal. Este problema afecta a Houzez Property Feed desde n/d hasta la versi\u00f3n 2.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30794.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30794.json index 7bf7854d2b5..9936f00c396 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30794.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30794.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Events Calendar Event Tickets allows Reflected XSS. This issue affects Event Tickets: from n/a through 5.20.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en The Events Calendar Event Tickets permite XSS reflejado. Este problema afecta a los tickets de evento desde n/d hasta la versi\u00f3n 5.20.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30796.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30796.json index d9d765c8c88..c4bd48e6ffb 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30796.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30796.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit \u2013 WP Extended allows Reflected XSS. This issue affects The Ultimate WordPress Toolkit \u2013 WP Extended: from n/a through 3.0.14." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Extended The Ultimate WordPress Toolkit \u2013 WP Extended permite XSS reflejado. Este problema afecta a The Ultimate WordPress Toolkit \u2013 WP Extended desde n/d hasta la versi\u00f3n 3.0.14." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30797.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30797.json index 76e404cfdf7..93ddf6d4b01 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30797.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30797.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in bigdrop.gr Greek Multi Tool \u2013 Fix peralinks, accents, auto create menus and more allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Greek Multi Tool \u2013 Fix peralinks, accents, auto create menus and more: from n/a through 2.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en bigdrop.gr Greek Multi Tool \u2013 Fix peralinks, accents, auto create menus and more permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la Herramienta Multiusos Griega: Correcci\u00f3n de enlaces permanentes, acentos, creaci\u00f3n autom\u00e1tica de men\u00fas y m\u00e1s: desde n/d hasta la versi\u00f3n 2.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30798.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30798.json index 4133d4c6b76..0d982d58856 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30798.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30798.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rickonline_nl Better WishList API allows Reflected XSS. This issue affects Better WishList API: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en rickonline_nl Better WishList API, que permite XSS reflejado. Este problema afecta a la API Better WishList desde n/d hasta la versi\u00f3n 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30802.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30802.json index f4914269ef8..0b5dce6b8b6 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30802.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30802.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members. This issue affects Our Team Members: from n/a through 2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial del sistema a una esfera de control no autorizada en WPBean Our Team Members. Este problema afecta a los miembros de nuestro equipo desde n/d hasta la versi\u00f3n 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30808.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30808.json index 3e073eb8126..d20f9ac8b8a 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30808.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30808.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weblizar About Author allows Reflected XSS. This issue affects About Author: from n/a through 1.6.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en weblizar About Author permite XSS reflejado. Este problema afecta a \"Acerca del autor\": desde n/d hasta la versi\u00f3n 1.6.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30827.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30827.json index af452454ccc..22841fc4af6 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30827.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30827.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.4.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Saleswonder Team Tobias WP2LEADS permite XSS reflejado. Este problema afecta a WP2LEADS desde n/d hasta la versi\u00f3n 3.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30834.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30834.json index 2785818bac1..df25e02800f 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30834.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30834.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal vulnerability in Bit Apps Bit Assist allows Path Traversal. This issue affects Bit Assist: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path Traversal en Bit Apps Bit Assist permite el Path Traversal. Este problema afecta a Bit Assist desde n/d hasta la versi\u00f3n 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30837.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30837.json index 47ed61a0135..83014db6df1 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30837.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30837.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cristiano Zanca WooCommerce Fattureincloud allows Reflected XSS. This issue affects WooCommerce Fattureincloud: from n/a through 2.6.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Cristiano Zanca WooCommerce Fattureincloud que permite XSS reflejado. Este problema afecta a WooCommerce Fattureincloud desde n/d hasta la versi\u00f3n 2.6.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30840.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30840.json index 54b33eb9887..0efb3a4e3a8 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30840.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30840.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michel - xiligroup dev xili-dictionary allows Reflected XSS. This issue affects xili-dictionary: from n/a through 2.12.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Michel - xiligroup dev xili-dictionary permite XSS reflejado. Este problema afecta a xili-dictionary desde n/d hasta la versi\u00f3n 2.12.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30848.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30848.json index 98deb320ac6..e77d46ec7ce 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30848.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30848.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Hostel allows Reflected XSS. This issue affects Hostel: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bob Hostel permite XSS reflejado. Este problema afecta a Hostel desde n/d hasta la versi\u00f3n 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30849.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30849.json index b4231550fe9..01bfacf0f67 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30849.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30849.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Essential Real Estate allows PHP Local File Inclusion. This issue affects Essential Real Estate: from n/a through 5.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') en g5theme Essential Real Estate permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a Essential Real Estate desde n/d hasta la versi\u00f3n 5.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30869.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30869.json index fdf9c01ec28..5cf1dae8de2 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30869.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30869.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Parakoos Image Wall allows Reflected XSS. This issue affects Image Wall: from n/a through 3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Parakoos Image Wall permite XSS reflejado. Este problema afecta a Image Wall desde n/d hasta la versi\u00f3n 3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30870.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30870.json index 944f61e857c..166c2456525 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30870.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30870.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Travel Engine WP Travel Engine allows PHP Local File Inclusion. This issue affects WP Travel Engine: from n/a through 6.3.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control incorrecto del nombre de archivo para la instrucci\u00f3n Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos PHP') en WP Travel Engine. WP Travel Engine permite la inclusi\u00f3n local de archivos PHP. Este problema afecta a WP Travel Engine desde n/d hasta la versi\u00f3n 6.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30876.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30876.json index 3583bdea265..1aa5183ecb1 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30876.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30876.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ads by WPQuads Ads by WPQuads allows SQL Injection. This issue affects Ads by WPQuads: from n/a through 2.0.87.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Ads by WPQuads Ads by WPQuads permite la inyecci\u00f3n SQL. Este problema afecta a Ads by WPQuads desde n/d hasta la versi\u00f3n 2.0.87.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30878.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30878.json index b5c4ce9f546..aba53dbbf04 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30878.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30878.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk allows Path Traversal. This issue affects JS Help Desk: from n/a through 2.9.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido('Path Traversal') en JoomSky JS Help Desk permite el Path Traversal. Este problema afecta a JS Help Desk desde n/d hasta la versi\u00f3n 2.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30880.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30880.json index 6c914b10e92..3a07f740ccb 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30880.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30880.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in JoomSky JS Help Desk allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Help Desk: from n/a through 2.9.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en JoomSky JS Help Desk permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a JS Help Desk desde n/d hasta la versi\u00f3n 2.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30882.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30882.json index 26c65e48753..add5da3c305 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30882.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk allows Path Traversal. This issue affects JS Help Desk: from n/a through 2.9.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en JoomSky JS Help Desk permite el Path Traversal. Este problema afecta a JS Help Desk desde n/d hasta la versi\u00f3n 2.9.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-308xx/CVE-2025-30886.json b/CVE-2025/CVE-2025-308xx/CVE-2025-30886.json index 9f55279430f..3247bbdedd8 100644 --- a/CVE-2025/CVE-2025-308xx/CVE-2025-30886.json +++ b/CVE-2025/CVE-2025-308xx/CVE-2025-30886.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk allows SQL Injection. This issue affects JS Help Desk: from n/a through 2.9.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en JoomSky JS Help Desk permite la inyecci\u00f3n SQL. Este problema afecta a JS Help Desk desde n/d hasta la versi\u00f3n 2.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30901.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30901.json index 080ec0685f9..eb903ddb266 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30901.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30901.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2." + }, + { + "lang": "es", + "value": "Control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') en JoomSky JS Help Desk permite la inclusi\u00f3n local de archivos PHP. Este problema afecta a JS Help Desk desde n/d hasta la versi\u00f3n 2.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30902.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30902.json index 7a28a154936..053c37394e6 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30902.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ATL Software SRL AEC Kiosque allows Reflected XSS. This issue affects AEC Kiosque: from n/a through 1.9.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ATL Software SRL AEC Kiosque permite XSS reflejado. Este problema afecta a AEC Kiosque desde n/d hasta la versi\u00f3n 1.9.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30910.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30910.json index 544e0b063bc..d3022c31dd1 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30910.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager allows Path Traversal. This issue affects CM Download Manager: from n/a through 2.9.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en CreativeMindsSolutions CM Download Manager permite el Path Traversal. Este problema afecta a CM Download Manager desde n/d hasta la versi\u00f3n 2.9.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30911.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30911.json index 4ea26af44ac..9b9363fab58 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30911.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30911.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Rometheme RomethemeKit For Elementor allows Command Injection. This issue affects RomethemeKit For Elementor: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo (inyecci\u00f3n de c\u00f3digo) en Rometheme RomethemeKit For Elementor permite la inyecci\u00f3n de comandos. Este problema afecta a RomethemeKit para Elementor desde n/d hasta la versi\u00f3n 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30917.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30917.json index e206b5d8f53..0993572f51f 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30917.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30917.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Wham SKU Generator for WooCommerce allows Reflected XSS. This issue affects SKU Generator for WooCommerce: from n/a through 1.6.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Wham SKU Generator for WooCommerce permite XSS reflejado. Este problema afecta al generador de SKU para WooCommerce desde n/d hasta la versi\u00f3n 1.6.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30924.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30924.json index 62203da4e8c..f4e51c38693 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30924.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30924.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in primersoftware Primer MyData for Woocommerce allows Reflected XSS. This issue affects Primer MyData for Woocommerce: from n/a through n/a." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en primersoftware Primer MyData for Woocommerce permite XSS reflejado. Este problema afecta a Primer MyData para Woocommerce: de n/d a n/d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30926.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30926.json index 641983f36bb..ba6f11b7dec 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30926.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30926.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in KingAddons.com King Addons for Elementor. This issue affects King Addons for Elementor: from n/a through 24.12.58." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en KingAddons.com, King Addons para Elementor. Este problema afecta a King Addons para Elementor desde n/d hasta el 24/12/58." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30961.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30961.json index 055eeb36a54..13683e2864d 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30961.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30961.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tinuzz Trackserver allows DOM-Based XSS.This issue affects Trackserver: from n/a through 5.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en tinuzz Trackserver permite XSS basado en DOM. Este problema afecta a Trackserver: desde n/a hasta 5.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30963.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30963.json index 9d1c3156c22..aac18913979 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30963.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30963.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetSmartFilters allows DOM-Based XSS.This issue affects JetSmartFilters: from n/a through 3.6.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Crocoblock JetSmartFilters permite XSS basado en DOM. Este problema afecta a JetSmartFilters: desde n/a hasta 3.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30971.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30971.json index 242be553168..eb013ccdcbf 100644 --- a/CVE-2025/CVE-2025-309xx/CVE-2025-30971.json +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30971.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xavi Ivars XV Random Quotes allows SQL Injection. This issue affects XV Random Quotes: from n/a through 1.40." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Xavi Ivars XV Random Quotes permite la inyecci\u00f3n SQL. Este problema afecta a XV Random Quotes desde n/d hasta la versi\u00f3n 1.40." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3000.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3000.json index 1746aef245a..5f9f1d38c56 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3000.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3000.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PyTorch 2.6.0. Esta afecta a la funci\u00f3n torch.jit.script. La manipulaci\u00f3n provoca corrupci\u00f3n de memoria. Es posible lanzar el ataque contra el host local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3001.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3001.json index acb0452db55..5924bd10657 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3001.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PyTorch 2.6.0. Esta vulnerabilidad afecta a la funci\u00f3n torch.lstm_cell. Su manipulaci\u00f3n provoca corrupci\u00f3n de memoria. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3002.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3002.json index 7029c4b1ba4..4cf52f4caf0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3002.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320. This issue affects some unknown processing of the file /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. The manipulation of the argument type_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Digital China DCME-520 hasta la versi\u00f3n 20250320. Este problema afecta a un procesamiento desconocido del archivo /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. La manipulaci\u00f3n del argumento type_name provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3003.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3003.json index 175230a8b42..92b000c567b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3003.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3003.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 3. Affected is an unknown function of the file /CDGServer3/UserAjax. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 3. Se ve afectada una funci\u00f3n desconocida del archivo /CDGServer3/UserAjax. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3004.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3004.json index 768c6b9b2ee..ce24a610e35 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3004.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3004.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /search. The manipulation of the argument keywords leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Sayski ForestBlog hasta el 21/03/2025, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search. La manipulaci\u00f3n de las palabras clave del argumento provoca cross-site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3005.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3005.json index 53f61338daf..b56fef66614 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3005.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this issue is some unknown functionality of the component Friend Link Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Sayski ForestBlog hasta el 21/03/2025, clasificada como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del componente Friend Link Handler. Esta manipulaci\u00f3n provoca cross-site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3006.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3006.json index f9e6abff759..b104b4b40ab 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3006.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /edit-category.php?id=8. The manipulation of the argument Category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul e-Diary Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /edit-category.php?id=8. La manipulaci\u00f3n del argumento \"Categor\u00eda\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3007.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3007.json index c97f150f42b..1f383bbf19d 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3007.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Novastar CX40 up to 2.44.0. It has been rated as critical. This issue affects the function getopt of the file /usr/nova/bin/netconfig of the component NetFilter Utility. The manipulation of the argument cmd/netmask/pipeout/nettask leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Novastar CX40 hasta la versi\u00f3n 2.44.0. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n getopt del archivo /usr/nova/bin/netconfig del componente NetFilter Utility. La manipulaci\u00f3n del argumento cmd/netmask/pipeout/nettask provoca un desbordamiento del b\u00fafer basado en la pila. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3008.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3008.json index c6dea58a6fd..bef5374685e 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3008.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Novastar CX40 up to 2.44.0. Affected is the function system/popen of the file /usr/nova/bin/netconfig of the component NetFilter Utility. The manipulation leads to command injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Novastar CX40 (hasta la versi\u00f3n 2.44.0). La funci\u00f3n system/popen del archivo /usr/nova/bin/netconfig del componente NetFilter Utility se ve afectada. La manipulaci\u00f3n provoca la inyecci\u00f3n de comandos. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta vulnerabilidad, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json index 6b2908ae1bb..7b8168e3812 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Jinher Network OA C6. Affected by this vulnerability is an unknown functionality of the file /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Jinher Network OA C6. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json index 1a13bb58105..cf231df7821 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Khronos Group glslang 15.1.0. Este problema afecta a la funci\u00f3n glslang::TIntermediate::isConversionAllowed del archivo glslang/MachineIndependent/Intermediate.cpp. Esta manipulaci\u00f3n provoca la desreferenciaci\u00f3n de punteros nulos. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json index fde75cee68f..77f3624b1c9 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Open Asset Import Library Assimp 5.4.3. Esta afecta a la funci\u00f3n Assimp::ASEImporter::BuildUniqueRepresentation del archivo code/AssetLib/ASE/ASELoader.cpp del componente ASE File Handler. La manipulaci\u00f3n del argumento mIndices provoca una lectura fuera de los l\u00edmites. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 6.0 puede solucionar este problema. El parche se llama 7c705fde418d68cca4e8eff56be01b2617b0d6fe. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json index a47ca48f147..0a024b7c963 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Open Asset Import Library Assimp 5.4.3. Esta vulnerabilidad afecta a la funci\u00f3n Assimp::MDLImporter::ParseTextureColorData del archivo code/AssetLib/MDL/MDLMaterialLoader.cpp del componente MDL File Handler. La manipulaci\u00f3n del argumento mWidth/mHeight provoca el consumo de recursos. El ataque puede iniciarse remotamente. Actualizar a la versi\u00f3n 6.0 puede solucionar este problema. El parche se llama 5d2a7482312db2e866439a8c05a07ce1e718bed1. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3017.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3017.json index dea84eafa03..dff4bfe474f 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3017.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3017.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in TA-Lib up to 0.6.4. This issue affects the function setInputBuffer of the file src/tools/ta_regtest/ta_test_func/test_minmax.c of the component ta_regtest. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5879180e9070ec35d52948f2f57519713256a0f1. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en TA-Lib hasta la versi\u00f3n 0.6.4. Este problema afecta a la funci\u00f3n setInputBuffer del archivo src/tools/ta_regtest/ta_test_func/test_minmax.c del componente ta_regtest. La manipulaci\u00f3n provoca escritura fuera de los l\u00edmites. Es posible lanzar el ataque en el host local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El identificador del parche es 5879180e9070ec35d52948f2f57519713256a0f1. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3021.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3021.json index 133ef55867e..f64f6b484ed 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3021.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal vulnerability in e-solutions e-management. This vulnerability could allow an attacker to access confidential files outside the expected scope via the \u2018file\u2019 parameter in the /downloadReport.php endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path Traversal en e-solutions e-management. Esta vulnerabilidad podr\u00eda permitir a un atacante acceder a archivos confidenciales fuera del alcance previsto mediante el par\u00e1metro 'file' en el endpoint /downloadReport.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3022.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3022.json index 65371486c95..14340014525 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3022.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3022.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Os command injection vulnerability in e-solutions e-management. This vulnerability allows an attacker to execute arbitrary commands on the server via the \u2018client\u2019 parameter in the /data/apache/e-management/api/api3.php endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de comandos OS en e-solutions e-management. Esta vulnerabilidad permite a un atacante ejecutar comandos arbitrarios en el servidor mediante el par\u00e1metro 'client' en el endpoint /data/apache/e-management/api/api3.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3026.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3026.json index dd97ef6330d..7466b79bf6b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3026.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability exists in the EJBCA service, version 8.0 Enterprise. Not tested in higher versions. By modifying the \u2018Host\u2019 header in an HTTP request, it is possible to manipulate the generated links and thus redirect the client to a different base URL. In this way, an attacker could insert his own server for the client to send HTTP requests, provided he succeeds in exploiting it." + }, + { + "lang": "es", + "value": "La vulnerabilidad existe en el servicio EJBCA, versi\u00f3n 8.0 Enterprise. No se ha probado en versiones superiores. Al modificar el encabezado \"Host\" en una solicitud HTTP, es posible manipular los enlaces generados y, por lo tanto, redirigir al cliente a una URL base diferente. De esta forma, un atacante podr\u00eda insertar su propio servidor para que el cliente env\u00ede solicitudes HTTP, si logra explotarlo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3027.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3027.json index e4728a3e935..c124646dfe0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3027.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability exists in the EJBCA service, version 8.0 Enterprise. By making a small change to the PATH of the URL associated with the service, the server fails to find the requested file and redirects to an external page. This vulnerability could allow users to be redirected to potentially malicious external sites, which can be exploited for phishing or other social engineering attacks." + }, + { + "lang": "es", + "value": "La vulnerabilidad existe en el servicio EJBCA, versi\u00f3n 8.0 Enterprise. Al realizar un peque\u00f1o cambio en la ruta de la URL asociada al servicio, el servidor no encuentra el archivo solicitado y redirige a una p\u00e1gina externa. Esta vulnerabilidad podr\u00eda permitir que los usuarios sean redirigidos a sitios externos potencialmente maliciosos, que pueden explotarse para phishing u otros ataques de ingenier\u00eda social." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3036.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3036.json index 3000f4b14a4..b5ff4a07e19 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3036.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in yzk2356911358 StudentServlet-JSP cc0cdce25fbe43b6c58b60a77a2c85f52d2102f5/d4d7a0643f1dae908a4831206f2714b21820f991. This affects an unknown part of the component Student Management Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en yzk2356911358 StudentServlet-JSP cc0cdce25fbe43b6c58b60a77a2c85f52d2102f5/d4d7a0643f1dae908a4831206f2714b21820f991. Esta vulnerabilidad afecta a una parte desconocida del componente Student Management Handler. La manipulaci\u00f3n del argumento \"Name\" provoca cross-site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una distribuci\u00f3n continua. Por lo tanto, no se dispone de informaci\u00f3n sobre las versiones afectadas ni sobre las actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3037.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3037.json index 333191b83ba..0ed95a5d345 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3037.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3037.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in yzk2356911358 StudentServlet-JSP cc0cdce25fbe43b6c58b60a77a2c85f52d2102f5/d4d7a0643f1dae908a4831206f2714b21820f991 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en yzk2356911358 StudentServlet-JSP cc0cdce25fbe43b6c58b60a77a2c85f52d2102f5/d4d7a0643f1dae908a4831206f2714b21820f991, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n provoca Cross-Site Request Forgery. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3038.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3038.json index e9678c0c6a2..3e1ec33693c 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3038.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3038.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Payroll Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /view_account.php. The manipulation of the argument salary_rate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /view_account.php. La manipulaci\u00f3n del argumento salary_rate provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3039.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3039.json index a16a0637d4e..a23dc4be50b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3039.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Payroll Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /add_employee.php. The manipulation of the argument lname/fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /add_employee.php. La manipulaci\u00f3n del argumento lname/fname provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3040.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3040.json index 0610ed8c1c0..af8196f7c88 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3040.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Project Worlds Online Time Table Generator 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_student.php. The manipulation of the argument pic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Project Worlds Online Time Table Generator 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/add_student.php. La manipulaci\u00f3n del argumento \"pic\" permite la carga sin restricciones. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json index 1dc564d1e94..1f4905d2d6b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file /admin/updatestudent.php. The manipulation of the argument pic leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Project Worlds Online Time Table Generator 1.0. Esta afecta a una parte desconocida del archivo /admin/updatestudent.php. La manipulaci\u00f3n del argumento \"pic\" permite la carga sin restricciones. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json index 03a04ca4753..1d5aa564ef4 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Project Worlds Online Time Table Generator 1.0. This vulnerability affects unknown code of the file /student/updateprofile.php. The manipulation of the argument pic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en Project Worlds Online Time Table Generator 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /student/updateprofile.php. La manipulaci\u00f3n del argumento \"pic\" permite la carga sin restricciones. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3043.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3043.json index 14aa06cd89b..b39a4686de5 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3043.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in GuoMinJim PersonManage 1.0. This issue affects the function preHandle of the file /login/. The manipulation of the argument Request leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en GuoMinJim PersonManage 1.0. Este problema afecta a la funci\u00f3n preHandle del archivo /login/. La manipulaci\u00f3n del argumento Request provoca un path traversal. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de versiones continuas para garantizar una entrega continua. Por lo tanto, no se dispone de informaci\u00f3n sobre las versiones afectadas ni sobre las actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3045.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3045.json index 1b6983a59e5..fa908947f7b 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3045.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in oretnom23/SourceCodester Apartment Visitor Management System 1.0. Affected is an unknown function of the file /remove-apartment.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en oretnom23/SourceCodester Apartment Visitor Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /remove-apartment.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3047.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3047.json index db166baf800..1ec5a9b7826 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3047.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3047.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. \n\nUsers should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes." + }, + { + "lang": "es", + "value": "Al ejecutar el proceso de compilaci\u00f3n de la Interfaz de L\u00ednea de Comandos del Modelo de Aplicaci\u00f3n Sin Servidor de AWS (SAM CLI) con Docker y con enlaces simb\u00f3licos en los archivos de compilaci\u00f3n, el entorno del contenedor permite al usuario acceder a archivos privilegiados en el host aprovechando los permisos elevados otorgados a la herramienta. Un usuario podr\u00eda aprovechar los permisos elevados para acceder a archivos restringidos mediante enlaces simb\u00f3licos y copiarlos a una ubicaci\u00f3n m\u00e1s permisiva en el contenedor. Los usuarios deben actualizar a la versi\u00f3n 1.133.0 o posterior y asegurarse de que cualquier c\u00f3digo bifurcado o derivado est\u00e9 parcheado para incorporar las nuevas correcciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3048.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3048.json index a82722e493f..e1a1145edca 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3048.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3048.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "After completing a build with AWS Serverless Application Model Command Line Interface (SAM CLI) which include symlinks, the content of those symlinks are copied to the cache of the local workspace as regular files or directories. As a result, a user who does not have access to those symlinks outside of the Docker container would now have access via the local workspace.\n\nUsers should upgrade to version 1.134.0 and ensure any forked or derivative code is patched to incorporate the new fixes. After upgrading, users must re-build their applications using the sam build --use-container to update the symlinks." + }, + { + "lang": "es", + "value": "Tras completar una compilaci\u00f3n con la Interfaz de L\u00ednea de Comandos del Modelo de Aplicaci\u00f3n sin Servidor de AWS (SAM CLI) que incluye enlaces simb\u00f3licos, el contenido de estos se copia a la cach\u00e9 del espacio de trabajo local como archivos o directorios normales. Como resultado, un usuario que no tenga acceso a estos enlaces simb\u00f3licos fuera del contenedor Docker ahora podr\u00e1 acceder a trav\u00e9s del espacio de trabajo local. Los usuarios deben actualizar a la versi\u00f3n 1.134.0 y asegurarse de que cualquier c\u00f3digo bifurcado o derivado est\u00e9 parcheado para incorporar las nuevas correcciones. Tras la actualizaci\u00f3n, los usuarios deben reconstruir sus aplicaciones utilizando sam build --use-container para actualizar los enlaces simb\u00f3licos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3051.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3051.json index 4dacda59001..de57caabca7 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3051.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3051.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.\n\nIf an attacker can place a malicious file in current working directory, it may be\u00a0loaded instead of the intended file, potentially leading to arbitrary\u00a0code execution.\n\nLinux::Statm::Tiny uses Mite to produce the affected code section due to\u00a0CVE-2025-30672" + }, + { + "lang": "es", + "value": "Linux::Statm::Tiny para Perl anterior a la versi\u00f3n 0.0701 permite cargar c\u00f3digo no confiable del directorio de trabajo actual ('.') de forma similar a CVE-2016-1238. Si un atacante coloca un archivo malicioso en el directorio de trabajo actual, este podr\u00eda cargarse en lugar del archivo deseado, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Linux::Statm::Tiny utiliza Mite para generar la secci\u00f3n de c\u00f3digo afectada debido a CVE-2025-30672." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3057.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3057.json index 5f8350ea592..5fa316b9a25 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3057.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3057.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Drupal core permite Cross-Site Scripting (XSS). Este problema afecta al n\u00facleo de Drupal: desde 8.0.0 antes de 10.3.13, desde 10.4.0 antes de 10.4.3, desde 11.0.0 antes de 11.0.12, desde 11.1.0 antes de 11.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3059.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3059.json index 60292259f71..de7f7f09def 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3059.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3059.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vulnerability in Drupal Profile Private.This issue affects Profile Private: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Profile Private. Este problema afecta al perfil privado: *.*." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3061.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3061.json index e945dc069f9..871dc779ec0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3061.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3061.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3061", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-03-31T23:15:30.537", - "lastModified": "2025-04-01T20:26:11.547", + "lastModified": "2025-04-04T21:15:49.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad en Drupal Material Admin. Este problema afecta a Material Admin: *.*." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-006", diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3062.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3062.json index 89552ac2c90..4c0e5f205ca 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3062.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3062.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vulnerability in Drupal Drupal Admin LTE theme.This issue affects Drupal Admin LTE theme: *.*." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Drupal Drupal Admin LTE theme. Este problema afecta al tema LTE de Drupal Admin: *.*." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3063.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3063.json index f336a2a1ef2..52556dde113 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3063.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_callback_update_sa_option() function in versions 2.0 to 2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento Shopper Approved Reviews para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos, lo que puede provocar una escalada de privilegios debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n ajax_callback_update_sa_option() en las versiones 2.0 a 2.1. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto puede aprovecharse para actualizar el rol predeterminado de registro a administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3072.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3072.json index f64cf94a951..959ae1da7ef 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3072.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3072.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n incorrecta en las pesta\u00f1as personalizadas de Google Chrome anterior a la versi\u00f3n 135.0.7049.52 permit\u00eda que un atacante remoto, al convencer a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario, realizara una suplantaci\u00f3n de la misma mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Baja)" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3073.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3073.json index e416f89ffd5..c26985c31a0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3073.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n incorrecta del autocompletado en Google Chrome anterior a la versi\u00f3n 135.0.7049.52 permit\u00eda que un atacante remoto, al convencer a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario, realizara una suplantaci\u00f3n de la misma mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Baja)" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3074.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3074.json index 949067c5368..723689b1f08 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3074.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n incorrecta en Descargas de Google Chrome anterior a la versi\u00f3n 135.0.7049.52 permit\u00eda a un atacante remoto suplantar la interfaz de usuario mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Baja)" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3082.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3082.json index c945dea9588..5c637ae08af 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3082.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4." + }, + { + "lang": "es", + "value": "Un usuario autorizado a acceder a una vista podr\u00eda modificar la intercalaci\u00f3n prevista, lo que le permitir\u00eda acceder a una vista diferente o no prevista de los datos subyacentes. Este problema afecta a MongoDB Server v5.0 (versi\u00f3n anterior a la 5.0.31), MongoDB Server v6.0 (versi\u00f3n anterior a la 6.0.20), MongoDB Server v7.0 (versi\u00f3n anterior a la 7.0.14) y MongoDB Server v7.3 (versi\u00f3n anterior a la 7.3.4)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json index e34e3e937e7..0ae80a000fb 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, \u00a0MongoDB v6.0 versions prior to\u00a06.0.20 and MongoDB v7.0 versions prior to 7.0.16" + }, + { + "lang": "es", + "value": "Los mensajes de protocolo de conexi\u00f3n MongoDB manipulados espec\u00edficamente pueden provocar el bloqueo de MongoDB durante la validaci\u00f3n de comandos. Esto puede ocurrir sin usar una conexi\u00f3n autenticada. Este problema afecta a MongoDB v5.0 anteriores a la 5.0.31, MongoDB v6.0 anteriores a la 6.0.20 y MongoDB v7.0 anteriores a la 7.0.16." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json index fa4ac49490e..591de7b3e71 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4" + }, + { + "lang": "es", + "value": "Al ejecutar comandos con ciertos argumentos definidos, es posible que explain no los valide antes de usarlos. Esto puede provocar fallos en los servidores del enrutador. Esto afecta a MongoDB Server v5.0 anterior a la 5.0.31, MongoDB Server v6.0 anterior a la 6.0.20, MongoDB Server v7.0 anterior a la 7.0.16 y MongoDB Server v8.0 anterior a la 8.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json index 59d4d3cc533..058485ba011 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled" + }, + { + "lang": "es", + "value": "Un servidor MongoDB, en condiciones espec\u00edficas, que se ejecuta en Linux con la comprobaci\u00f3n del estado de revocaci\u00f3n de TLS y CRL habilitada, no comprueba el estado de revocaci\u00f3n de los certificados intermedios en la cadena de certificados del par. En casos de MONGODB-X509, que no est\u00e1 habilitado por defecto, esto puede provocar una autenticaci\u00f3n incorrecta. Este problema tambi\u00e9n puede afectar la autenticaci\u00f3n dentro del cl\u00faster. Este problema afecta a MongoDB Server v5.0 anteriores a la 5.0.31, MongoDB Server v6.0 anteriores a la 6.0.20, MongoDB Server v7.0 anteriores a la 7.0.16 y MongoDB Server v8.0 anteriores a la 8.0.4. Configuraci\u00f3n requerida: MongoDB Server debe ejecutarse en sistemas operativos Linux y la comprobaci\u00f3n del estado de revocaci\u00f3n de CRL debe estar habilitada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3096.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3096.json index 4fb12a0fe18..6ccfc550ac8 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3096.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Clinic\u2019s Patient Management System versions 2.0 suffers from a SQL injection vulnerability in the login page." + }, + { + "lang": "es", + "value": "Clinic\u2019s Patient Management System versions 2.0 sufre una vulnerabilidad de inyecci\u00f3n SQL en la p\u00e1gina de inicio de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3097.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3097.json index c2b19a24385..546fb0636dd 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3097.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The wp Time Machine plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.0. This is due to missing or incorrect nonce validation on the 'wpTimeMachineCore.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento wp Time Machine para WordPress es vulnerable a Cross-Site Request Forgery (SRS) en todas las versiones hasta la 3.4.0 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'wpTimeMachineCore.php'. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3098.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3098.json index aa1b12aab28..eb74dda33a2 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3098.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Video Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.0.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Video URL para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.0.0.3 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar al usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3099.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3099.json index 06698123c4c..33fa08bdee9 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3099.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3099.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Advanced Search by My Solr Server plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation on the 'MySolrServerSettings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Advanced Search by My Solr Server para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.0.5 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina \"MySolrServerSettings\". Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n e inyecten scripts web maliciosos mediante una solicitud falsificada, ya que pueden enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31001.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31001.json index 656767bbef0..f3252b79a9d 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31001.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Debug Messages Revealing Unnecessary Information vulnerability in TLA Media GTM Kit allows Retrieve Embedded Sensitive Data. This issue affects GTM Kit: from n/a through 2.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de mensajes de depuraci\u00f3n que revelan informaci\u00f3n innecesaria en TLA Media GTM Kit que permite recuperar datos confidenciales incrustados. Este problema afecta a GTM Kit desde n/d hasta la versi\u00f3n 2.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json index f2281e14b91..4c70620a7b0 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Bogdan Bendziukov Squeeze allows Using Malicious Files. This issue affects Squeeze: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Squeeze de Bogdan Bendziukov permite el uso de archivos maliciosos. Este problema afecta a Squeeze desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json index 4b93b2aaab5..ac37aae6ca3 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n sensible del sistema a una vulnerabilidad de esfera de control no autorizada en Bogdan Bendziukov Squeeze permite recuperar datos sensibles incrustados. Este problema afecta a Squeeze desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json index 50e7f6bbe09..2437a87411f 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Croover.inc Rich Table of Contents allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Rich Table of Contents: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Croover.inc Rich Table of Contents permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la tabla de contenido enriquecida desde n/d hasta la versi\u00f3n 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json index 70972cc4663..9d38121b030 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Uzair Easyfonts allows Cross Site Request Forgery. This issue affects Easyfonts: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Uzair Easyfonts permite Cross-Site Request Forgery. Este problema afecta a Easyfonts desde la versi\u00f3n n/d hasta la 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json index 760fe7a8d7e..457a4bea5c4 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YouTube Embed Plugin Support YouTube Embed allows Stored XSS. This issue affects YouTube Embed: from n/a through 5.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en YouTube Embed Plugin Support YouTube permite XSS almacenado. Este problema afecta a YouTube Embed desde n/d hasta la versi\u00f3n 5.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json index b31031eb9d6..36f0ac611e1 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Jan Boddez IndieBlocks allows Server Side Request Forgery. This issue affects IndieBlocks: from n/a through 0.13.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Jan Boddez IndieBlocks permite Server-Side Request Forgery. Este problema afecta a IndieBlocks desde n/d hasta la versi\u00f3n 0.13.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json index 2feb26ae295..21ed2509463 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Cross Site Request Forgery. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ReichertBrothers SimplyRETS Real Estate IDX permite Cross-Site Request Forgery. Este problema afecta al IDX inmobiliario SimplyRETS desde n/d hasta la versi\u00f3n 3.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json index 914ba011ef1..c195410be88 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Phil Age Gate allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Age Gate: from n/a through 3.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Phil Age Gate permite acceder a funcionalidades no restringidas correctamente por las ACL. Este problema afecta a Age Gate desde n/d hasta la versi\u00f3n 3.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json index 3eb179300b8..79e5df6d2ec 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robert Noakes Nav Menu Manager allows Stored XSS. This issue affects Nav Menu Manager: from n/a through 3.2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Robert Noakes Nav Menu Manager permite XSS almacenado. Este problema afecta al Administrador de Men\u00fas de Navegaci\u00f3n desde la versi\u00f3n n/d hasta la 3.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json index 1bf0a105316..0533702c6f3 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webliberty Simple Spoiler allows Stored XSS. This issue affects Simple Spoiler: from n/a through 1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Webliberty Simple Spoiler que permite XSS almacenado. Este problema afecta a Simple Spoiler desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json index aafd9fd2acb..a0785389f50 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Purab Seo Meta Tags allows Cross Site Request Forgery. This issue affects Seo Meta Tags: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Purab Seo Meta Tags permite Cross-Site Request Forgery. Este problema afecta a las metaetiquetas SEO desde la versi\u00f3n n/d hasta la 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31024.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31024.json index 01e86470b0f..6d082a78ddc 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31024.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in randyjensen RJ Quickcharts allows SQL Injection. This issue affects RJ Quickcharts: from n/a through 0.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en randyjensen RJ Quickcharts permite la inyecci\u00f3n SQL. Este problema afecta a RJ Quickcharts desde n/d hasta la versi\u00f3n 0.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json index ad2fc18384e..86a3d968ef1 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Austin Comment Validation Reloaded allows Stored XSS. This issue affects Comment Validation Reloaded: from n/a through 0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Austin Comment Validation Reloaded permite XSS almacenado. Este problema afecta a Comment Validation Reloaded desde n/d hasta la versi\u00f3n 0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31031.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31031.json index c5e9dff9e69..fd0d902ca87 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31031.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Astoundify Job Colors for WP Job Manager allows Stored XSS.This issue affects Job Colors for WP Job Manager: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Astoundify Job Colors para WP Job Manager permite XSS almacenado. Este problema afecta a Job Colors para WP Job Manager: desde n/d hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json index 71416f0733a..e669131d048 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Pagopar - Grupo M S.A. Pagopar – WooCommerce Gateway allows Stored XSS. This issue affects Pagopar – WooCommerce Gateway: from n/a through 2.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Pagopar - Grupo M S.A. Pagopar \u2013 WooCommerce Gateway permite XSS almacenado. Este problema afecta a Pagopar - WooCommerce Gateway desde n/d hasta la versi\u00f3n 2.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json index c0c808a1734..fe81e748ebe 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Adam Nowak Buddypress Humanity allows Cross Site Request Forgery. This issue affects Buddypress Humanity: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Adam Nowak Buddypress Humanity que permite Cross-Site Request Forgery. Este problema afecta a Buddypress Humanity desde n/d hasta la versi\u00f3n 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json index 631baa44864..4f08f63fd14 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in AboZain Albanna Customize Login Page allows Cross Site Request Forgery. This issue affects Customize Login Page: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en AboZain Albanna Customize Login Page permite Cross-Site Request Forgery. Este problema afecta a la p\u00e1gina de inicio de sesi\u00f3n personalizada desde la versi\u00f3n n/d hasta la 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json index 94ec1b9dda1..86852135209 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Benjamin Chris WP Editor.md – The Perfect WordPress Markdown Editor allows Stored XSS. This issue affects WP Editor.md – The Perfect WordPress Markdown Editor: from n/a through 10.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Benjamin Chris WP Editor.md \u2013 The Perfect WordPress Markdown Editor permite XSS almacenado. Este problema afecta a WP Editor.md (El editor de Markdown perfecto para WordPress): desde n/d hasta la versi\u00f3n 10.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json index 0ae94e700b3..2bb5baed92f 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPSolr free WPSolr allows Privilege Escalation. This issue affects WPSolr: from n/a through 24.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPSolr free WPSolr permite la escalada de privilegios. Este problema afecta a WPSolr desde la versi\u00f3n n/d hasta la 24.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json index 654497d2277..c577bc1c71f 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Essential Marketer Essential Breadcrumbs allows Privilege Escalation. This issue affects Essential Breadcrumbs: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en Essential Marketer Essential Breadcrumbs permite la escalada de privilegios. Este problema afecta a Essential Breadcrumbs desde la versi\u00f3n n/d hasta la 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json index 27dcb695b62..fa8c17bcede 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in rtakao Sandwich Adsense allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Sandwich Adsense: from n/a through 4.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en rtakao Sandwich Adsense permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sandwich Adsense desde n/d hasta la versi\u00f3n 4.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31073.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31073.json index e75bca28ad5..ed40bce5715 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31073.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Compete Themes Unlimited allows Stored XSS. This issue affects Unlimited: from n/a through 1.45." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Compete Themes Unlimited permite XSS almacenado. Este problema afecta a Unlimited desde n/d hasta la versi\u00f3n 1.45." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31074.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31074.json index e586d6cb20f..f479f2b4906 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31074.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in MDJM MDJM Event Management allows Object Injection. This issue affects MDJM Event Management: from n/a through 1.7.5.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en MDJM MDJM Event Management permite la inyecci\u00f3n de objetos. Este problema afecta a MDJM Event Management desde n/d hasta la versi\u00f3n 1.7.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31075.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31075.json index 4c212419d2c..9e24ed6c30e 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31075.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in videowhisper MicroPayments allows Stored XSS. This issue affects MicroPayments: from n/a through 2.9.29." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en videowhisper MicroPayments permite XSS almacenado. Este problema afecta a MicroPayments desde n/d hasta la versi\u00f3n 2.9.29." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31076.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31076.json index 1f0ebff43e3..0460ef892a8 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31076.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31076.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP allows Server Side Request Forgery. This issue affects WP Compress for MainWP: from n/a through 6.30.03." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en WP Compress WP Compress for MainWP permite Server-Side Request Forgery. Este problema afecta a WP Compress para MainWP desde n/d hasta la versi\u00f3n 6.30.03." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31077.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31077.json index 538fbf103ab..9ff9a5962d3 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31077.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31077.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ultimate Blocks Ultimate Blocks allows DOM-Based XSS. This issue affects Ultimate Blocks: from n/a through 3.2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ultimate Blocks Ultimate Blocks permite XSS basado en DOM. Este problema afecta a Ultimate Blocks desde n/d hasta la versi\u00f3n 3.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31079.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31079.json index e38f7795410..7052ffd7343 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31079.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31079.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in usermaven Usermaven allows Cross Site Request Forgery. This issue affects Usermaven: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en usermaven Usermaven permite Cross-Site Request Forgery. Este problema afecta a Usermaven desde la versi\u00f3n n/d hasta la 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31083.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31083.json index bff1dced9b9..f43d3e305c5 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31083.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31083.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZEEN101 Leaky Paywall allows Stored XSS. This issue affects Leaky Paywall: from n/a through 4.21.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ZEEN101 Leaky Paywall que permite XSS almacenado. Este problema afecta a Leaky Paywall desde n/d hasta la versi\u00f3n 4.21.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31087.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31087.json index 2d2aebaa18d..2cec28c1355 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31087.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31087.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in silverplugins217 Multiple Shipping And Billing Address For Woocommerce allows Object Injection. This issue affects Multiple Shipping And Billing Address For Woocommerce: from n/a through 1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en silverplugins217 Multiple Shipping And Billing Address For Woocommerce permite la inyecci\u00f3n de objetos. Este problema afecta a M\u00faltiples direcciones de env\u00edo y facturaci\u00f3n para WooCommerce: desde n/d hasta la versi\u00f3n 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31088.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31088.json index f1a33a70d12..b3426d5109a 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31088.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31088.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs Paid Member Subscriptions allows Stored XSS. This issue affects Paid Member Subscriptions: from n/a through 2.14.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Cozmoslabs Paid Member Subscriptions permite XSS almacenado. Este problema afecta a las suscripciones de miembros de pago desde la versi\u00f3n n/d hasta la 2.14.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31090.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31090.json index 34c95944b33..48e23ef9cd8 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31090.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in alordiel Dropdown Multisite selector allows Stored XSS. This issue affects Dropdown Multisite selector: from n/a through n/a." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-Site Scripting') en alordiel Dropdown Multisite selector permite XSS almacenado. Este problema afecta al selector multisitio desplegable: de n/d a n/d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31092.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31092.json index 19506b1ac19..147a3ede007 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31092.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ninja Team Click to Chat \u2013 WP Support All-in-One Floating Widget allows Stored XSS. This issue affects Click to Chat \u2013 WP Support All-in-One Floating Widget: from n/a through 2.3.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ninja Team Click to Chat \u2013 WP Support All-in-One Floating Widget permite XSS almacenado. Este problema afecta al widget flotante todo en uno Click to Chat de WP Support: desde n/d hasta la versi\u00f3n 2.3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31093.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31093.json index 8e934604e8a..58704501726 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31093.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31093.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in redpixelstudios RPS Include Content allows DOM-Based XSS. This issue affects RPS Include Content: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en redpixelstudios RPS Include Content, que permite XSS basado en DOM. Este problema afecta al contenido incluido de RPS desde n/d hasta la versi\u00f3n 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31094.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31094.json index f5fa9a2f5c9..b2a4102bfae 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31094.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in teastudio.pl WP Posts Carousel allows Stored XSS. This issue affects WP Posts Carousel: from n/a through 1.3.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en teastudio.pl WP Posts Carousel que permite XSS almacenado. Este problema afecta al carrusel de publicaciones de WP desde n/d hasta la versi\u00f3n 1.3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31095.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31095.json index 0bcc60dbea7..d3a442bcb42 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31095.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in ho3einie Material Dashboard allows Authentication Bypass. This issue affects Material Dashboard: from n/a through 1.4.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en ho3einie Material Dashboard permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a Material Dashboard desde n/d hasta la versi\u00f3n 1.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31096.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31096.json index 70e3a4f5b6b..a2b65cda668 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31096.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPXPO PostX allows DOM-Based XSS. This issue affects PostX: from n/a through 4.1.25." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPXPO PostX permite XSS basado en DOM. Este problema afecta a PostX desde n/d hasta la versi\u00f3n 4.1.25." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31099.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31099.json index db1f936a25f..7c9182108e5 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31099.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31099.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bestwebsoft Slider by BestWebSoft allows SQL Injection. This issue affects Slider by BestWebSoft: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en bestwebsoft Slider by BestWebSoft permite la inyecci\u00f3n SQL. Este problema afecta a Slider by BestWebSoft desde n/d hasta la versi\u00f3n 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31101.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31101.json index a900ff607d8..05b878b5167 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31101.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31101.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vault Group Pty Ltd VaultRE Contact Form 7 allows Stored XSS.This issue affects VaultRE Contact Form 7: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Vault Group Pty Ltd VaultRE Contact Form 7 permite XSS almacenado. Este problema afecta a VaultRE Contact Form 7: desde n/d hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31102.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31102.json index 655fea2899f..5eb2d17c7c2 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31102.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31102.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Hostel allows Reflected XSS. This issue affects Hostel: from n/a through 1.1.5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bob Hostel permite XSS reflejado. Este problema afecta a Hostel desde n/d hasta la versi\u00f3n 1.1.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31116.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31116.json index c76d576dd8b..082bc209a8f 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31116.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31116.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2." + }, + { + "lang": "es", + "value": "Mobile Security Framework (MobSF) es un framework de pruebas de penetraci\u00f3n, an\u00e1lisis de malware y evaluaci\u00f3n de seguridad capaz de realizar an\u00e1lisis est\u00e1ticos y din\u00e1micos. La mitigaci\u00f3n de CVE-2024-29190 en valid_host() utiliza socket.gethostbyname(), vulnerable al abuso de SSRF mediante la t\u00e9cnica de revinculaci\u00f3n de DNS. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 4.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31117.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31117.json index dd36f9a894d..1e448649cb2 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31117.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31117.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1." + }, + { + "lang": "es", + "value": "OpenEMR es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para la gesti\u00f3n de historiales m\u00e9dicos electr\u00f3nicos y consultorios m\u00e9dicos. Se identific\u00f3 una vulnerabilidad de Out-of-Band Server-Side Request Forgery (OOB SSRF) en OpenEMR, que permite a un atacante forzar al servidor a realizar solicitudes no autorizadas a recursos externos o internos. Este ataque no devuelve una respuesta directa, pero puede explotarse mediante interacciones DNS o HTTP para exfiltrar informaci\u00f3n confidencial. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 7.0.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31121.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31121.json index 8202a770327..e256d86f458 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31121.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31121.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 7.0.3.1, the Patient Image feature in OpenEMR is vulnerable to cross-site scripting attacks via the EXIF title in an image. This vulnerability is fixed in 7.0.3.1." + }, + { + "lang": "es", + "value": "OpenEMR es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para la gesti\u00f3n de historiales m\u00e9dicos electr\u00f3nicos y consultas m\u00e9dicas. En versiones anteriores a la versi\u00f3n 7.0.3.1, la funci\u00f3n \"Imagen del Paciente\" de OpenEMR era vulnerable a ataques de cross-site scripting mediante el t\u00edtulo EXIF de una imagen. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 7.0.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31122.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31122.json index 4c7dd9768c5..9557e6a446c 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31122.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "scratch-coding-hut.github.io is the website for Coding Hut. In 1.0-beta3 and earlier, the login link can be used to login to any account by changing the username in the username field." + }, + { + "lang": "es", + "value": "scratch-coding-hut.github.io es el sitio web de Coding Hut. En la versi\u00f3n 1.0-beta3 y anteriores, se puede usar el enlace de inicio de sesi\u00f3n para acceder a cualquier cuenta cambiando el nombre de usuario en el campo correspondiente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json index 64105d9f895..114bb247b53 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9." + }, + { + "lang": "es", + "value": "Zitadel es un software de infraestructura de identidad de c\u00f3digo abierto. Exist\u00eda una vulnerabilidad que permit\u00eda usar claves caducadas para recuperar tokens. En concreto, ZITADEL no verificaba correctamente la fecha de caducidad de la clave JWT al usarla para concesiones de autorizaci\u00f3n. Esto permit\u00eda a un atacante con una clave caducada obtener tokens de acceso v\u00e1lidos. Esta vulnerabilidad no afecta el uso del perfil JWT para la autenticaci\u00f3n de cliente OAuth 2.0 en los endpoints de token e introspecci\u00f3n, que rechazan correctamente las claves caducadas. Esta vulnerabilidad se ha corregido en las versiones 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6 y 2.63.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json index 662c3dd762e..7562d9e47a1 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9." + }, + { + "lang": "es", + "value": "Zitadel es un software de infraestructura de identidad de c\u00f3digo abierto. Los administradores de ZITADEL pueden habilitar la configuraci\u00f3n \"Ignorar nombres de usuario desconocidos\", que ayuda a mitigar los ataques que intentan adivinar o enumerar nombres de usuario. Si se habilita, ZITADEL mostrar\u00e1 la solicitud de contrase\u00f1a incluso si el usuario no existe e informar\u00e1 \"Nombre de usuario o contrase\u00f1a no v\u00e1lidos\". Si bien la configuraci\u00f3n se respet\u00f3 correctamente durante el inicio de sesi\u00f3n, el nombre de usuario se normaliz\u00f3, lo que revel\u00f3 su existencia. Esta vulnerabilidad est\u00e1 corregida en las versiones 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6 y 2.63.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31125.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31125.json index 1508fe45bfd..0ff88555901 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31125.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31125.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11." + }, + { + "lang": "es", + "value": "Vite es un framework de herramientas frontend para JavaScript. Vite expone el contenido de archivos no permitidos mediante ?inline&import o ?raw?import. Solo las aplicaciones que exponen expl\u00edcitamente el servidor de desarrollo de Vite a la red (mediante la opci\u00f3n de configuraci\u00f3n --host o server.host) se ven afectadas. Esta vulnerabilidad est\u00e1 corregida en las versiones 6.2.4, 6.1.3, 6.0.13, 5.4.16 y 4.5.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31128.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31128.json index 236e8ea3fe6..5684fddeeff 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31128.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31128.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "gifplayer is a customizable jquery plugin to play and stop animated gifs. gifplayer contains a cross-site scripting (XSS) vulnerability. This vulnerability is fixed in 0.3.7." + }, + { + "lang": "es", + "value": "gifplayer es un complemento de jQuery personalizable para reproducir y detener GIFs animados. Contiene una vulnerabilidad de cross-site scripting (XSS). Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.3.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31129.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31129.json index ae64a1eef48..e63c545c820 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31129.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31129.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x)." + }, + { + "lang": "es", + "value": "Jooby es un framework web para Java y Kotlin. El m\u00f3dulo io.jooby.internal.pac4j.SessionStoreImpl#get de pac4j deserializa datos no confiables. Esta vulnerabilidad se corrigi\u00f3 en las versiones 2.17.0 (2.x) y 3.7.0 (3.x)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31131.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31131.json index e43da1f6312..913fa9d53c5 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31131.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31131.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2." + }, + { + "lang": "es", + "value": "YesWiki es un sistema wiki escrito en PHP. El par\u00e1metro squelette es vulnerable a ataques de Path Traversal, lo que permite el acceso de lectura a archivos arbitrarios en el servidor. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 4.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31132.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31132.json index 458de4e13cd..6902ff3708b 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31132.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31132.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Raven is an open-source messaging platform. A vulnerability allowed any logged in user to execute code via an API endpoint. This vulnerability is fixed in 2.1.10." + }, + { + "lang": "es", + "value": "Raven es una plataforma de mensajer\u00eda de c\u00f3digo abierto. Una vulnerabilidad permit\u00eda a cualquier usuario conectado ejecutar c\u00f3digo a trav\u00e9s de un endpoint API. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 2.1.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31135.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31135.json index c80dca404de..a83b563c0e7 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31135.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31135.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Go-Guerrilla SMTP Daemon is a lightweight SMTP server written in Go. Prior to 1.6.7, when ProxyOn is enabled, the PROXY command will be accepted multiple times, with later invocations overriding earlier ones. The proxy protocol only supports one initial PROXY header; anything after that is considered part of the exchange between client and server, so the client is free to send further PROXY commands with whatever data it pleases. go-guerrilla will treat these as coming from the reverse proxy, allowing a client to spoof its IP address. This vulnerability is fixed in 1.6.7." + }, + { + "lang": "es", + "value": "Go-Guerrilla SMTP Daemon es un servidor SMTP ligero escrito en Go. Antes de la versi\u00f3n 1.6.7, al habilitar ProxyOn, el comando PROXY se aceptaba varias veces, y las invocaciones posteriores anulaban las anteriores. El protocolo proxy solo admite una cabecera PROXY inicial; cualquier acci\u00f3n posterior se considera parte del intercambio entre el cliente y el servidor, por lo que el cliente puede enviar m\u00e1s comandos PROXY con los datos que desee. Go-Guerrilla los tratar\u00e1 como si provinieran del proxy inverso, lo que permite al cliente falsificar su direcci\u00f3n IP. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.6.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31137.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31137.json index 46c182582a6..c21741b4feb 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31137.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31137.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "React Router is a multi-strategy router for React bridging the gap from React 18 to React 19. There is a vulnerability in Remix/React Router that affects all Remix 2 and React Router 7 consumers using the Express adapter. Basically, this vulnerability allows anyone to spoof the URL used in an incoming Request by putting a URL pathname in the port section of a URL that is part of a Host or X-Forwarded-Host header sent to a Remix/React Router request handler. This issue has been patched and released in Remix 2.16.3 and React Router 7.4.1." + }, + { + "lang": "es", + "value": "React Router es un enrutador multiestrategia para React que conecta React 18 con React 19. Existe una vulnerabilidad en Remix/React Router que afecta a todos los consumidores de Remix 2 y React Router 7 que usan el adaptador Express. Esta vulnerabilidad permite falsificar la URL utilizada en una solicitud entrante al incluir una ruta de URL en la secci\u00f3n de puerto de una URL que forma parte de un encabezado Host o X-Forwarded-Host enviado a un controlador de solicitudes de Remix/React Router. Este problema se ha corregido y publicado en Remix 2.16.3 y React Router 7.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31160.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31160.json index 59159d9829a..23d40b6a013 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31160.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31160.json @@ -2,7 +2,7 @@ "id": "CVE-2025-31160", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-26T21:15:23.323", - "lastModified": "2025-03-31T13:15:46.050", + "lastModified": "2025-04-07T01:15:42.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -91,6 +91,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/29/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31176.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31176.json index d0704804f12..424b98831ee 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31176.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31176.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in gnuplot. The plot3d_points() function may lead to a segmentation fault and cause a system crash." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en gnuplot. La funci\u00f3n plot3d_points() puede generar un error de segmentaci\u00f3n y provocar un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31178.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31178.json index 0564f0c88c4..1555925c363 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31178.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31178.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in gnuplot. The GetAnnotateString() function may lead to a segmentation fault and cause a system crash." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en gnuplot. La funci\u00f3n GetAnnotateString() puede generar un error de segmentaci\u00f3n y provocar un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31179.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31179.json index 5709411f03e..ea070206480 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31179.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31179.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in gnuplot. The xstrftime() function may lead to a segmentation fault, causing a system crash." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en gnuplot. La funci\u00f3n xstrftime() puede generar un error de segmentaci\u00f3n, lo que provoca un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31180.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31180.json index ba939c1b6d8..e35446e7938 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31180.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31180.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in gnuplot. The CANVAS_text() function may lead to a segmentation fault and cause a system crash." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en gnuplot. La funci\u00f3n CANVAS_text() puede generar un error de segmentaci\u00f3n y provocar un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31181.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31181.json index 7b67ba275b1..0f1eaae84a3 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31181.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31181.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in gnuplot. The X11_graphics() function may lead to a segmentation fault and cause a system crash." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en gnuplot. La funci\u00f3n X11_graphics() puede generar un error de segmentaci\u00f3n y provocar un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31335.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31335.json index 29a9e24082d..e1f763e4e46 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31335.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31335.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The OpenSAML C++ library before 3.3.1 allows forging of signed SAML messages via parameter manipulation (when using SAML bindings that rely on non-XML signatures)." + }, + { + "lang": "es", + "value": "OpenSAML C++ library anterior a la versi\u00f3n 3.3.1 permite la falsificaci\u00f3n de mensajes SAML firmados a trav\u00e9s de la manipulaci\u00f3n de par\u00e1metros (cuando se utilizan enlaces SAML que dependen de firmas que no son XML)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json index 2721a05d8cc..de956d0329f 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled allows Stored XSS. This issue affects Scheduled: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en bhoogterp Scheduled permite XSS almacenado. Este problema afecta a Scheduled desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31376.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31376.json index 32b32cb6590..ae386fd8e31 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31376.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31376.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Mayeenul Islam NanoSupport allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects NanoSupport: from n/a through 0.6.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Mayeenul Islam NanoSupport permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a NanoSupport: desde n/a hasta 0.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json index b78e628f48c..f9a3fc78660 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Asaquzzaman mishu Woo Product Feed For Marketing Channels allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Woo Product Feed For Marketing Channels: from n/a through 1.9.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Asaquzzaman mishu Woo Product Feed For Marketing Channels permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Woo Product Feed para canales de marketing desde n/d hasta la versi\u00f3n 1.9.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json index 1da4cbc0c8a..38c4bea5640 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in theode Language Field allows Stored XSS. This issue affects Language Field: from n/a through 0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en theode Language Field permite XSS almacenado. Este problema afecta al campo de idioma desde n/d hasta la versi\u00f3n 0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json index de4e127c93f..e6b0538ee89 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in FrescoChat Live Chat allows Stored XSS. This issue affects FrescoChat Live Chat: from n/a through 3.2.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en FrescoChat Live Chat permite XSS almacenado. Este problema afecta a FrescoChat Live Chat desde n/d hasta la versi\u00f3n 3.2.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json index cd953d4b068..e41dfc1154f 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Site Table of Contents allows Stored XSS. This issue affects Site Table of Contents: from n/a through 0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Site Table of Contents permite XSS almacenado. Este problema afecta a la tabla de contenido del sitio desde n/d hasta la versi\u00f3n 0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31386.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31386.json index 4dbdacc0772..4411811c606 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31386.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Simplepress Simple:Press allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple:Press: from n/a through 6.10.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Simplepress Simple:Press permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Simple:Press: desde n/a hasta 6.10.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json index abf460a6379..f65fcdb2391 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in doa The World allows Stored XSS. This issue affects The World: from n/a through 0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en doa The World permite XSS almacenado. Este problema afecta a The World desde n/d hasta la versi\u00f3n 0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json index 51a4f7a3ccf..4eb6b247005 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bdoga Social Crowd allows Stored XSS. This issue affects Social Crowd: from n/a through 0.9.6.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en bdoga Social Crowd permite XSS almacenado. Este problema afecta a Social Crowd desde n/d hasta la versi\u00f3n 0.9.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json index 8845f07e352..d36c030b1e4 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in regen Script Compressor allows Stored XSS. This issue affects Script Compressor: from n/a through 1.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en regen Script Compressor permite XSS almacenado. Este problema afecta a Script Compressor desde la versi\u00f3n n/d hasta la 1.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json index 2fdf0aa011b..167d7d3cb9d 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shameem Reza Smart Product Gallery Slider allows Cross Site Request Forgery. This issue affects Smart Product Gallery Slider: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Shameem Reza Smart Product Gallery Slider permite Cross-Site Request Forgery. Este problema afecta al control deslizante de la galer\u00eda de productos inteligentes desde n/d hasta la versi\u00f3n 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json index 58c903347bd..bd18b63c391 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in vfvalent Social Bookmarking RELOADED allows Stored XSS. This issue affects Social Bookmarking RELOADED: from n/a through 3.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en vfvalent Social Bookmarking RELOADED permite XSS almacenado. Este problema afecta a Social Bookmarking RELOADED desde n/d hasta la versi\u00f3n 3.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json index 03a28f6fdc9..fc63576a550 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kailey (trepmal) More Mime Type Filters allows Stored XSS. This issue affects More Mime Type Filters: from n/a through 0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kailey (trepmal) More Mime Type Filters permite XSS almacenado. Este problema afecta a More MIME Type Filters desde n/d hasta la versi\u00f3n 0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json index 08aa2733809..bbcda470dba 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in a.ankit Easy Custom CSS allows Stored XSS. This issue affects Easy Custom CSS: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en a.ankit Easy Custom CSS permite XSS almacenado. Este problema afecta a Easy Custom CSS desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json index 503e94e8684..d2a4e662587 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chandan Garg CG Scroll To Top allows Stored XSS. This issue affects CG Scroll To Top: from n/a through 3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Chandan Garg CG Scroll To Top permite XSS almacenado. Este problema afecta a CG Scroll To Top desde n/d hasta la versi\u00f3n 3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json index 5ce64a7b17e..8cd86029463 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in icyleaf WS Audio Player allows Stored XSS. This issue affects WS Audio Player: from n/a through 1.1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en icyleaf WS Audio Player permite XSS almacenado. Este problema afecta al reproductor de audio WS desde la versi\u00f3n n/d hasta la 1.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json index 5e4793c9549..675c296a2d2 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in mmetrodw MMX – Make Me Christmas allows Stored XSS. This issue affects MMX – Make Me Christmas: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en mmetrodw MMX \u2013 Make Me Christmas permite XSS almacenado. Este problema afecta a MMX \u00abMake Me Christmas\u00bb desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json index c56a486ad50..907beba3efc 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in NewsBoard Plugin NewsBoard Post and RSS Scroller allows Stored XSS. This issue affects NewsBoard Post and RSS Scroller: from n/a through 1.2.12." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en NewsBoard Plugin NewsBoard Post and RSS Scroller permite XSS almacenado. Este problema afecta a NewsBoard Post y RSS Scroller desde n/d hasta la versi\u00f3n 1.2.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json index 8788074a936..a6f8f19475b 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wladyslaw Madejczyk AF Tell a Friend allows Stored XSS. This issue affects AF Tell a Friend: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Wladyslaw Madejczyk AF Tell a Friend permite XSS almacenado. Este problema afecta al servicio de preguntas frecuentes desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31406.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31406.json index 49fcedbccdd..67c209dba9f 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31406.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31406.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Subscriber Broken Access Control in ELEX WooCommerce Request a Quote <= 2.3.3 versions." + }, + { + "lang": "es", + "value": "Control de acceso roto para suscriptores en ELEX WooCommerce Request a Quote <= versiones 2.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json index dc551d57d81..ceb1ea38841 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Zoho Flow allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zoho Flow: from n/a through 2.13.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Zoho Flow permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Zoho Flow: desde n/d hasta 2.13.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31409.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31409.json index f36b7c79e85..afffd327591 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31409.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31409.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bridge Core allows Stored XSS. This issue affects Bridge Core: from n/a through n/a." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Bridge Core permite XSS almacenado. Este problema afecta a Bridge Core: desde n/d hasta n/d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31410.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31410.json index 3bf4f2d738a..cbcd96be8d1 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31410.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31410.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ashish Ajani WP Church Donation allows Cross Site Request Forgery.This issue affects WP Church Donation: from n/a through 1.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ashish Ajani WP Church Donation permite Cross-Site Request Forgery. Este problema afecta a WP Church Donation: desde n/d hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31415.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31415.json index ca79131e399..7f417ba1469 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31415.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31415.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in YayCommerce YayExtra allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects YayExtra: from n/a through 1.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en YayCommerce YayExtra permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a YayExtra desde la versi\u00f3n n/d hasta la 1.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31419.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31419.json index cd6b9089235..553b3d2123d 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31419.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31419.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeix Churel allows DOM-Based XSS.This issue affects Churel: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themeix Churel permite XSS basado en DOM. Este problema afecta a Churel: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31432.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31432.json index 99596c12bc1..386bd0e1051 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31432.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31432.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Chop Chop Pop-Up Chop Chop allows PHP Local File Inclusion. This issue affects Pop-Up Chop Chop: from n/a through 2.1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control incorrecto del nombre de archivo para la instrucci\u00f3n Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos en PHP') en Chop Chop Pop-Up Chop Chop, que permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a la ventana emergente Chop Chop Chop desde n/d hasta la versi\u00f3n 2.1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31433.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31433.json index ea4ec751639..047e19ecb9f 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31433.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31433.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Miguel Sirvent Magic Embeds allows Stored XSS. This issue affects Magic Embeds: from n/a through 3.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Miguel Sirvent Magic Embeds permite XSS almacenado. Este problema afecta a Magic Embeds desde n/d hasta la versi\u00f3n 3.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31434.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31434.json index 4286fa3b06b..5a64ea7e984 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31434.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31434.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adrian Tobey FormLift for Infusionsoft Web Forms allows Stored XSS. This issue affects FormLift for Infusionsoft Web Forms: from n/a through 7.5.19." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Adrian Tobey FormLift for Infusionsoft Web Forms permite XSS almacenado. Este problema afecta a FormLift para formularios web de Infusionsoft desde n/d hasta la versi\u00f3n 7.5.19." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31435.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31435.json index 19a6c29e848..e3c89d920b4 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31435.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31435.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Efficient Scripts Microblog Poster allows Stored XSS. This issue affects Microblog Poster: from n/a through 2.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Efficient Scripts Microblog Poster permite XSS almacenado. Este problema afecta al p\u00f3ster de microblog desde n/d hasta la versi\u00f3n 2.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31437.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31437.json index 8b4e287d155..234e28e9340 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31437.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31437.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Miller WP-OGP allows Stored XSS. This issue affects WP-OGP: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en David Miller WP-OGP permite XSS almacenado. Este problema afecta a WP-OGP desde n/d hasta la versi\u00f3n 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31438.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31438.json index fe955b6c6c3..e380d48305f 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31438.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31438.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Benoit De Boeck WP Supersized allows Cross Site Request Forgery. This issue affects WP Supersized: from n/a through 3.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Benoit De Boeck WP Supersized permite Cross-Site Request Forgery. Este problema afecta a WP Supersized desde n/d hasta la versi\u00f3n 3.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31439.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31439.json index db4a6342adb..6b4e99df166 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31439.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31439.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in tobias_.MerZ Browser Caching with .htaccess allows Cross Site Request Forgery. This issue affects Browser Caching with .htaccess: from 1.2.1 through n/a." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en tobias_.MerZ Browser Caching with .htaccess permite Cross-Site Request Forgery. Este problema afecta al almacenamiento en cach\u00e9 del navegador con .htaccess desde la versi\u00f3n 1.2.1 hasta n/d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31440.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31440.json index 629bab7f161..2faace16742 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31440.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31440.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Team Terms of Use allows Stored XSS. This issue affects Terms of Use: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Strategy11 Team Terms of Use permite XSS almacenado. Este problema afecta a los T\u00e9rminos de uso desde la versi\u00f3n n/d hasta la 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31443.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31443.json index 386e6ee790e..a1c568b179e 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31443.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Krzysztof Furtak KK I Like It allows Stored XSS. This issue affects KK I Like It: from n/a through 1.7.5.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Krzysztof Furtak KK I Like It permite XSS almacenado. Este problema afecta a KK I Like It desde n/d hasta la versi\u00f3n 1.7.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31444.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31444.json index 25e8cbf6572..b0d20fec847 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31444.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31444.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in youtag ShowTime Slideshow allows Stored XSS. This issue affects ShowTime Slideshow: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en youtag ShowTime Slideshow permite XSS almacenado. Este problema afecta a ShowTime Slideshow desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31447.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31447.json index 792abb62c4d..c0d9c9ae1d0 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31447.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31447.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in nertworks NertWorks All in One Social Share Tools allows Cross Site Request Forgery. This issue affects NertWorks All in One Social Share Tools: from n/a through 1.26." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en nertworks NertWorks All in One Social Share Tools permite Cross-Site Request Forgery. Este problema afecta a NertWorks All in One Social Share Tools desde n/d hasta la versi\u00f3n 1.26." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31448.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31448.json index 65e86c806d9..fadb6d65cd8 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31448.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31448.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in misteraon Simple Trackback Disabler allows Cross Site Request Forgery. This issue affects Simple Trackback Disabler: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en misteraon Simple Trackback Disabler permite Cross-Site Request Forgery. Este problema afecta al deshabilitador de trackback simple desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31449.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31449.json index acf1da86188..2cb28f53900 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31449.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31449.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in EricH The Visitor Counter allows Stored XSS. This issue affects The Visitor Counter: from n/a through 1.4.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en EricH The Visitor Counter, permite XSS almacenado. Este problema afecta a The Visitor Counter desde n/d hasta la versi\u00f3n 1.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31450.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31450.json index add720d6978..8e5aa3daab4 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31450.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31450.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in phantom.omaga Toggle Box allows Stored XSS. This issue affects Toggle Box: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en phantom.omaga Toggle Box que permite XSS almacenado. Este problema afecta a Toggle Box desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31451.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31451.json index d70ec62a6d7..66c7238bda0 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31451.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31451.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kevinweber wBounce allows Stored XSS. This issue affects wBounce: from n/a through 1.8.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en kevinweber wBounce permite XSS almacenado. Este problema afecta a wBounce desde n/d hasta la versi\u00f3n 1.8.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31452.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31452.json index 4f4ac07aa9f..88af5a78888 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31452.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31452.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mindshare Labs, Inc. WP Ultimate Search allows Stored XSS. This issue affects WP Ultimate Search: from n/a through 2.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mindshare Labs, Inc. WP Ultimate Search permite XSS almacenado. Este problema afecta a WP Ultimate Search desde n/d hasta la versi\u00f3n 2.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31453.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31453.json index 70c9e6c3f9a..844c78eb26d 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31453.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31453.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stian Andreassen YouTube SimpleGallery allows Stored XSS. This issue affects YouTube SimpleGallery: from n/a through 2.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Stian Andreassen YouTube SimpleGallery permite XSS almacenado. Este problema afecta a YouTube SimpleGallery desde n/d hasta la versi\u00f3n 2.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31456.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31456.json index 1e9e55add51..7ee39d53b83 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31456.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31456.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bsndev Ultimate Security Checker allows Cross Site Request Forgery. This issue affects Ultimate Security Checker: from n/a through 4.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en bsndev Ultimate Security Checker permite Cross-Site Request Forgery. Este problema afecta a Ultimate Security Checker desde la versi\u00f3n n/d hasta la 4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31457.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31457.json index 9e125e40953..7925dca2076 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31457.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31457.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aur\u00e9lien LWS LWS SMS allows Cross Site Request Forgery. This issue affects LWS SMS: from n/a through 2.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Aur\u00e9lien LWS SMS. Este problema afecta a LWS SMS desde la versi\u00f3n n/d hasta la 2.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31458.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31458.json index bb75c9ae88e..9163a4b578a 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31458.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31458.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in forsgren Video Embedder allows Stored XSS. This issue affects Video Embedder: from n/a through 1.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en forsgren Video Embedder permite XSS almacenado. Este problema afecta al incrustador de v\u00eddeo desde la versi\u00f3n n/d hasta la 1.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31459.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31459.json index cff48146754..414c41ab53a 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31459.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31459.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in PasqualePuzio Login Alert allows Stored XSS. This issue affects Login Alert: from n/a through 0.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en PasqualePuzio Login Alert permite XSS almacenado. Este problema afecta a Login Alert desde n/d hasta la versi\u00f3n 0.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31460.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31460.json index 554ef66925d..be2a6bea0d4 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31460.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31460.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in danielmuldernl OmniLeads Scripts and Tags Manager allows Stored XSS. This issue affects OmniLeads Scripts and Tags Manager: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en danielmuldernl OmniLeads Scripts and Tags Manager permite XSS almacenado. Este problema afecta al administrador de scripts y etiquetas de OmniLeads desde la versi\u00f3n n/d hasta la 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31463.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31463.json index ad479de205a..aba16cd1b68 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31463.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31463.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Preetinder Singh TGG WP Optimizer allows Stored XSS. This issue affects TGG WP Optimizer: from n/a through 1.22." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Preetinder Singh TGG WP Optimizer permite XSS almacenado. Este problema afecta a TGG WP Optimizer desde n/d hasta la versi\u00f3n 1.22." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31464.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31464.json index fc5a0674784..d5cfecca951 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31464.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31464.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nazmur Rahman Text Selection Color allows Stored XSS. This issue affects Text Selection Color: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nazmur Rahman Text Selection Color permite XSS almacenado. Este problema afecta a Color de selecci\u00f3n de texto: desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31465.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31465.json index b388437dd84..0e1e1dd273c 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31465.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31465.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in cornershop Better Section Navigation Widget allows Stored XSS. This issue affects Better Section Navigation Widget: from n/a through 1.6.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Neutralizaci\u00f3n Incorrecta de Etiquetas HTML Relacionadas con Scripts en una P\u00e1gina Web (XSS B\u00e1sico) en cornershop Better Section Navigation Widget permite XSS Almacenado. Este problema afecta al Widget de Navegaci\u00f3n de Mejor Secci\u00f3n desde n/d hasta la versi\u00f3n 1.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31466.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31466.json index bde0ea1c154..121f5a758f5 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31466.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31466.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Falcon Solutions Duplicate Page and Post allows Blind SQL Injection. This issue affects Duplicate Page and Post: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Falcon Solutions Duplicate Page and Post permite la inyecci\u00f3n SQL ciega. Este problema afecta a p\u00e1ginas y publicaciones duplicadas desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31469.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31469.json index 7825a532996..a7690a14d07 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31469.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31469.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in webrangers Clear Sucuri Cache allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Clear Sucuri Cache: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en webrangers Clear Sucuri Cache permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Clear Sucuri Cache desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31470.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31470.json index cf3f0be35f4..07b0775687f 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31470.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31470.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FancyThemes Page Takeover allows Stored XSS. This issue affects Page Takeover: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FancyThemes Page Takeover permite XSS almacenado. Este problema afecta a Page Takeover desde n/d hasta la versi\u00f3n 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31471.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31471.json index ba773f3a6c9..e964f0ca219 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31471.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31471.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Falcon Solutions Duplicate Page and Post allows Stored XSS. This issue affects Duplicate Page and Post: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Falcon Solutions Duplicate Page and Post permite XSS almacenado. Este problema afecta a p\u00e1ginas y publicaciones duplicadas desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31472.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31472.json index 8650c01e5f4..13fd0086410 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31472.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31472.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michele Marri Flatty allows Stored XSS. This issue affects Flatty: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Michele Marri Flatty permite XSS almacenado. Este problema afecta a Flatty desde n/d hasta la versi\u00f3n 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31473.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31473.json index 8ff6337e2c0..d593ecb523d 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31473.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31473.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in matthewprice1178 WP Database Optimizer allows Stored XSS. This issue affects WP Database Optimizer: from n/a through 1.2.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en matthewprice1178 WP Database Optimizer permite XSS almacenado. Este problema afecta a WP Database Optimizer desde n/d hasta la versi\u00f3n 1.2.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31474.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31474.json index cde3a3ce331..c969a0a3e46 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31474.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31474.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in matthewprice1178 WP Database Optimizer allows Cross Site Request Forgery. This issue affects WP Database Optimizer: from n/a through 1.2.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en matthewprice1178. WP Database Optimizer permite Cross-Site Request Forgery. Este problema afecta a WP Database Optimizer desde n/d hasta la versi\u00f3n 1.2.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json index 65f276ea0b3..799e9ee5e57 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5." + }, + { + "lang": "es", + "value": "c-ares es una librer\u00eda de resoluci\u00f3n as\u00edncrona. Desde la versi\u00f3n 1.32.3 hasta la 1.34.4, existe un m\u00e9todo de use-after-free en read_answers() cuando process_answer() puede volver a poner en cola una consulta debido a un fallo de cookie DNS, a que el servidor ascendente no soporta correctamente EDNS o, posiblemente, en consultas TCP si el servidor remoto cerr\u00f3 la conexi\u00f3n inmediatamente despu\u00e9s de una respuesta. Si hubiera un problema al intentar enviar esa nueva transacci\u00f3n, se cerrar\u00eda el identificador de conexi\u00f3n, pero read_answers() segu\u00eda esperando que este estuviera disponible para, posiblemente, retirar otras respuestas de la cola. En teor\u00eda, un atacante remoto podr\u00eda activar esto inundando el objetivo con paquetes ICMP UNREACHABLE si tambi\u00e9n controla el servidor de nombres ascendente y puede devolver un resultado con una de esas condiciones; esto no se ha probado. De lo contrario, solo un atacante local podr\u00eda modificar el comportamiento del sistema para que send()/write() devuelva una condici\u00f3n de fallo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.34.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31526.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31526.json index 7dea337e360..1aac24da3f5 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31526.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31526.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eleopard Behance Portfolio Manager allows SQL Injection. This issue affects Behance Portfolio Manager: from n/a through 1.7.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en eleopard Behance Portfolio Manager permite la inyecci\u00f3n SQL. Este problema afecta a Behance Portfolio Manager desde n/d hasta la versi\u00f3n 1.7.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31527.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31527.json index ec7ff07af34..1a7f2b78a42 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31527.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31527.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Kishan WP Link Preview allows Server Side Request Forgery. This issue affects WP Link Preview: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Kishan WP Link Preview permite Server-Side Request Forgery. Este problema afecta a WP Link Preview desde n/d hasta la versi\u00f3n 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31528.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31528.json index 273f4f93494..5d039dbf98f 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31528.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31528.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in wokamoto StaticPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects StaticPress: from n/a through 0.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Wokamoto StaticPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a StaticPress desde la versi\u00f3n n/d hasta la 0.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31529.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31529.json index b85e43d6a74..a942938c584 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31529.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31529.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Rashid Slider Path for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Slider Path for Elementor: from n/a through 3.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Rashid Slider Path para Elementor permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Slider Path para Elementor desde la versi\u00f3n n/d hasta la 3.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31530.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31530.json index e22e9ba5c93..6c782050e70 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31530.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31530.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in smackcoders Google SEO Pressor Snippet allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Google SEO Pressor Snippet: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en smackcoders Google SEO Pressor Snippet permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al fragmento de Google SEO Pressor desde la versi\u00f3n n/d hasta la 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31532.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31532.json index d0a5e7e7a95..15344d1b98f 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31532.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31532.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team AtomChat AtomChat allows Stored XSS. This issue affects AtomChat: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Team AtomChat AtomChat permite XSS almacenado. Este problema afecta a AtomChat desde n/d hasta la versi\u00f3n 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31533.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31533.json index 44abdd05007..41565f3b9f3 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31533.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31533.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Salesmate.io Salesmate Add-On for Gravity Forms allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Salesmate Add-On for Gravity Forms: from n/a through 2.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Salesmate.io Salesmate Add-On for Gravity Forms permite acceder a funcionalidades no restringidas correctamente por las ACL. Este problema afecta al complemento Salesmate para Gravity Forms desde n/d hasta la versi\u00f3n 2.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31535.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31535.json index 0fbe5e53857..0dcd8f04e23 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31535.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31535.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PressTigers Simple Owl Carousel allows DOM-Based XSS. This issue affects Simple Owl Carousel: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PressTigers Simple Owl Carousel que permite XSS basado en DOM. Este problema afecta a Simple Owl Carousel desde n/d hasta la versi\u00f3n 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31538.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31538.json index 61d6ea132bd..f943abf9e16 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31538.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31538.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in checklistcom Checklist allows Stored XSS. This issue affects Checklist: from n/a through 1.1.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en checklistcom Checklist permite XSS almacenado. Este problema afecta a Checklist desde n/d hasta la versi\u00f3n 1.1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31539.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31539.json index fe86135868b..ad8d31f7def 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31539.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31539.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Blocksera Cryptocurrency Widgets Pack allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cryptocurrency Widgets Pack: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Blocksera Cryptocurrency Widgets Pack permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al paquete de widgets de criptomonedas desde la versi\u00f3n n/d hasta la 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31540.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31540.json index a8356a6c9c6..dedb39d61cf 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31540.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in acmemediakits ACME Divi Modules allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ACME Divi Modules: from n/a through 1.3.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en acmemediakits ACME Divi Modules permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los m\u00f3dulos ACME Divi desde la versi\u00f3n n/d hasta la 1.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31542.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31542.json index 05c3c4c20b2..c6677bfc869 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31542.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31542.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wphocus My auctions allegro allows Blind SQL Injection. This issue affects My auctions allegro: from n/a through 3.6.20." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en wphocus My auctions allegro permite la inyecci\u00f3n SQL ciega. Este problema afecta a My auctions allegro desde n/d hasta la versi\u00f3n 3.6.20." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31543.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31543.json index 12475633bce..2c67b406f1d 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31543.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31543.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twice Commerce Twice Commerce allows DOM-Based XSS. This issue affects Twice Commerce: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Twice Commerce Twice Commerce permite XSS basado en DOM. Este problema afecta a Twice Commerce desde n/d hasta la versi\u00f3n 1.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31544.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31544.json index 3c6ec2caa08..f496c9282a0 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31544.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31544.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP Messiah Swiss Toolkit For WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Swiss Toolkit For WP: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WP Messiah Swiss Toolkit para WP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Swiss Toolkit para WP desde n/d hasta la versi\u00f3n 1.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31545.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31545.json index 49e546672a1..a012aa47dbd 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31545.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31545.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP Messiah Safe Ai Malware Protection for WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Safe Ai Malware Protection for WP: from n/a through 1.0.20." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WP Messiah Safe Ai Malware Protection para WP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Safe Ai Malware Protection para WP desde n/d hasta la versi\u00f3n 1.0.20." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31546.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31546.json index f8d07beea37..7ad9091936a 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31546.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31546.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP Messiah Swiss Toolkit For WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Swiss Toolkit For WP: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WP Messiah Swiss Toolkit para WP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Swiss Toolkit para WP desde n/d hasta la versi\u00f3n 1.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31547.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31547.json index aeda8bb680c..bcb9a1e0953 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31547.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31547.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aphotrax Uptime Robot Plugin for WordPress allows SQL Injection. This issue affects Uptime Robot Plugin for WordPress: from n/a through 2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Aphotrax Uptime Robot Plugin para WordPress permite la inyecci\u00f3n SQL. Este problema afecta al plugin Uptime Robot para WordPress desde n/d hasta la versi\u00f3n 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31549.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31549.json index ccdd78bf2a7..e3726de1bf8 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31549.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31549.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Agency Dominion Inc. Fusion allows DOM-Based XSS. This issue affects Fusion: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Agency Dominion Inc. Fusion permite XSS basado en DOM. Este problema afecta a Fusion desde n/d hasta la versi\u00f3n 1.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31555.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31555.json index c1e113d2325..b4e62e0d527 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31555.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31555.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ContentMX ContentMX Content Publisher allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ContentMX Content Publisher: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en ContentMX ContentMX Content Publisher permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ContentMX Content Publisher desde n/d hasta la versi\u00f3n 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31556.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31556.json index 9f7699a5c1f..7b91b4f951c 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31556.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31556.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IDX Broker IMPress for IDX Broker allows Stored XSS. This issue affects IMPress for IDX Broker: from n/a through 3.2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en IDX Broker IMPress for IDX Broker permite XSS almacenado. Este problema afecta a IMPress para IDX Broker desde n/d hasta la versi\u00f3n 3.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31557.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31557.json index 44e71795eb1..6a61353ecc7 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31557.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31557.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MiKa OSM \u2013 OpenStreetMap allows DOM-Based XSS. This issue affects OSM \u2013 OpenStreetMap: from n/a through 6.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en MiKa OSM \u2013 OpenStreetMap permite XSS basado en DOM. Este problema afecta a OSM \u2013 OpenStreetMap desde n/d hasta la versi\u00f3n 6.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31559.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31559.json index 646238c22b4..60edd44b493 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31559.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31559.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Caspio Bridge Custom Database Applications by Caspio allows DOM-Based XSS. This issue affects Custom Database Applications by Caspio: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Caspio Bridge Custom Database Applications by Caspio permite XSS basado en DOM. Este problema afecta a las aplicaciones de bases de datos personalizadas de Caspio desde n/d hasta la versi\u00f3n 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31560.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31560.json index bad1547b514..4be51de03b6 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31560.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31560.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-01T21:15:50.060", "lastModified": "2025-04-02T14:58:07.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31562.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31562.json index 71800174373..4668e968755 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31562.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31562.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aphotrax Uptime Robot Plugin for WordPress allows DOM-Based XSS. This issue affects Uptime Robot Plugin for WordPress: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Aphotrax Uptime Robot Plugin para WordPress permite XSS basado en DOM. Este problema afecta al plugin Uptime Robot para WordPress desde la versi\u00f3n n/d hasta la 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31566.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31566.json index b53961c5afd..69c7aa511ca 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31566.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31566.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in riosisgroup Rio Video Gallery allows Stored XSS. This issue affects Rio Video Gallery: from n/a through 2.3.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en riosisgroup Rio Video Gallery permite XSS almacenado. Este problema afecta a Rio Video Gallery desde n/d hasta la versi\u00f3n 2.3.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31567.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31567.json index c29b4af7ccd..366818820cd 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31567.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31567.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows Stored XSS. This issue affects Themesflat Addons For Elementor: from n/a through 2.2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themesflat Themesflat Addons For Elementor permite XSS almacenado. Este problema afecta a Themesflat, complementos para Elementor, desde n/d hasta la versi\u00f3n 2.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31569.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31569.json index 28b67e643ba..50c33a2c911 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31569.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31569.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in wp-buy wordpress related Posts with thumbnails allows Stored XSS. This issue affects wordpress related Posts with thumbnails: from n/a through 3.0.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en wp-buy wordpress related Posts with thumbnails permite XSS almacenado. Este problema afecta a las publicaciones con miniaturas de WordPress desde la versi\u00f3n n/d hasta la 3.0.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31570.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31570.json index 7497cc39a89..65ba1abf83f 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31570.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31570.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in wp-buy Related Posts Widget with Thumbnails allows Stored XSS. This issue affects Related Posts Widget with Thumbnails: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en wp-buy Related Posts Widget with Thumbnails permite XSS almacenado. Este problema afecta al widget de publicaciones relacionadas con miniaturas desde n/d hasta la versi\u00f3n 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31572.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31572.json index 10b3e1cb140..9b146bfbdb5 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31572.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31572.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in v20202020 Multi Days Events and Multi Events in One Day Calendar allows Cross Site Request Forgery. This issue affects Multi Days Events and Multi Events in One Day Calendar: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en v20202020 Multi Days Events and Multi Events in One Day Calendar permite Cross-Site Request Forgery. Este problema afecta a los eventos de varios d\u00edas y eventos m\u00faltiples en un calendario diario desde n/d hasta la versi\u00f3n 1.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31574.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31574.json index 3325bb83e10..cc2e8c1de00 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31574.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31574.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoftHopper Custom Content Scrollbar allows Stored XSS. This issue affects Custom Content Scrollbar: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SoftHopper Custom Content Scrollbar permite XSS almacenado. Este problema afecta a la barra de desplazamiento de contenido personalizado desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31575.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31575.json index 4f73a4a4f7b..f92e5656cbe 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31575.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31575.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vasilis Triantafyllou Flag Icons allows Stored XSS. This issue affects Flag Icons: from n/a through 2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en Vasilis Triantafyllou Flag Icons permite XSS almacenado. Este problema afecta a los iconos de bandera desde la versi\u00f3n n/d hasta la 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31576.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31576.json index 51f9a97e253..a981769cbe5 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31576.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31576.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PostmarkApp Email Integrator: from n/a through 2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Gagan Deep Singh PostmarkApp Email Integrator, permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al integrador de correo electr\u00f3nico de PostmarkApp desde la versi\u00f3n n/d hasta la 2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31577.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31577.json index 08726bfb35c..7a6e71b8d4a 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31577.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31577.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in appointify Appointify allows Upload a Web Shell to a Web Server. This issue affects Appointify: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en appointify Appointify permite cargar un shell web a un servidor web. Este problema afecta a Appointify desde n/d hasta la versi\u00f3n 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31583.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31583.json index 47e91c77f8a..774b3e9faed 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31583.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31583.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ashish Ajani WP Copy Media URL allows Stored XSS. This issue affects WP Copy Media URL: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ashish Ajani WP Copy Media URL permite XSS almacenado. Este problema afecta a WP Copy Media URL desde n/d hasta la versi\u00f3n 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31584.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31584.json index 294d327c03b..36215e39eaf 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31584.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31584.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in elfsight Elfsight Testimonials Slider allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elfsight Testimonials Slider: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en elfsight Elfsight Testimonials Slider permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al control deslizante de testimonios de Elfsight desde la versi\u00f3n n/d hasta la 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31585.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31585.json index f7863aa4357..67ed63aac40 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31585.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31585.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in leadfox Leadfox for WordPress allows Cross Site Request Forgery. This issue affects Leadfox for WordPress: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en leadfox Leadfox for WordPress permite Cross-Site Request Forgery. Este problema afecta a Leadfox para WordPress desde la versi\u00f3n n/d hasta la 2.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31586.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31586.json index cd3ba6942bd..4eb33b32318 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31586.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31586.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhozyLab Gallery \u2013 Photo Albums Plugin allows Stored XSS. This issue affects Gallery \u2013 Photo Albums Plugin: from n/a through 1.3.170." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en GhozyLab Gallery \u2013 Photo Albums Plugin que permite XSS almacenado. Este problema afecta al complemento Galer\u00eda \u2013 \u00c1lbumes de fotos desde la versi\u00f3n n/d hasta la 1.3.170." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31587.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31587.json index 14cb3549a5d..f0c745a1f2c 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31587.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31587.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Testimonials Slider allows Stored XSS. This issue affects Elfsight Testimonials Slider: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en elfsight Elfsight Testimonials Slider permite XSS almacenado. Este problema afecta a Elfsight Testimonials Slider desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31588.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31588.json index b662e91bdbd..2c2cc3c8e70 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31588.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31588.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in elfsight Elfsight Testimonials Slider allows Cross Site Request Forgery. This issue affects Elfsight Testimonials Slider: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en elfsight Elfsight Testimonials Slider permite Cross-Site Request Forgery. Este problema afecta a Elfsight Testimonials Slider desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31589.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31589.json index 6d599ca87a8..5a6ac452c25 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31589.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kibru Demeke Ethiopian Calendar allows Stored XSS. This issue affects Ethiopian Calendar: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kibru Demeke Ethiopian Calendar permite XSS almacenado. Este problema afecta al Calendario Et\u00edope desde n/d hasta la versi\u00f3n 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31590.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31590.json index 2a14677493e..d222160cedb 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31590.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31590.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Denra.com WP Date and Time Shortcode allows Stored XSS. This issue affects WP Date and Time Shortcode: from n/a through 2.6.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Denra.com WP Date and Time Shortcode que permite XSS almacenado. Este problema afecta al shortcode de fecha y hora de WP desde n/d hasta la versi\u00f3n 2.6.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31591.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31591.json index 57052c19ed0..eb534153ff6 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31591.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31591.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in promoz73 Exit Popup Free allows Stored XSS. This issue affects Exit Popup Free: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en promoz73 Exit Popup Free permite XSS almacenado. Este problema afecta a Exit Popup Free desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31592.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31592.json index e7af9a3d77c..5059eeac66c 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31592.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31592.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paolo Melchiorre Send E-mail allows Stored XSS. This issue affects Send E-mail: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Paolo Melchiorre Send E-mail permite XSS almacenado. Este problema afecta a Send E-mail desde la versi\u00f3n n/d hasta la 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31593.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31593.json index dd64fde84d0..1b43504b542 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31593.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31593.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OpenMenu OpenMenu permite XSS almacenado. Este problema afecta a OpenMenu desde n/d hasta la versi\u00f3n 3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31595.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31595.json index 853e592c7e6..e6bb362627e 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31595.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31595.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdiscover Timeline Event History allows Stored XSS. This issue affects Timeline Event History: from n/a through 3.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpdiscover Timeline Event History permite XSS almacenado. Este problema afecta al historial de eventos de la l\u00ednea de tiempo desde n/d hasta la versi\u00f3n 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31596.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31596.json index ccacc4e5a37..38285ee434f 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31596.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31596.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Chatwee Chat by Chatwee allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Chat by Chatwee: from n/a through 2.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Chatwee Chat by Chatwee permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Chat by Chatwee desde la versi\u00f3n n/d hasta la 2.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31597.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31597.json index a6e74034cae..4c87c5624bf 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31597.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31597.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in crazycric Ultimate Live Cricket WordPress Lite allows Stored XSS. This issue affects Ultimate Live Cricket WordPress Lite: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en crazycric Ultimate Live Cricket WordPress Lite permite XSS almacenado. Este problema afecta a Ultimate Live Cricket WordPress Lite desde n/d hasta la versi\u00f3n 1.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-315xx/CVE-2025-31598.json b/CVE-2025/CVE-2025-315xx/CVE-2025-31598.json index e9a9dc91394..f0ef2e97b2c 100644 --- a/CVE-2025/CVE-2025-315xx/CVE-2025-31598.json +++ b/CVE-2025/CVE-2025-315xx/CVE-2025-31598.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Quantity Dynamic Pricing & Bulk Discounts for WooCommerce allows Stored XSS. This issue affects Quantity Dynamic Pricing & Bulk Discounts for WooCommerce: from n/a through 4.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPFactory Quantity Dynamic Pricing & Bulk Discounts para WooCommerce permite XSS almacenado. Este problema afecta a Quantity Dynamic Pricing & Bulk Discounts para WooCommerce desde n/d hasta la versi\u00f3n 4.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31600.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31600.json index 3294676f5cf..8eab7c87a10 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31600.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31600.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in designnbuy DesignO allows Cross Site Request Forgery. This issue affects DesignO: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en designnbuy DesignO permite Cross Site Request Forgery. Este problema afecta a DesignO desde la versi\u00f3n n/a hasta la 2.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31601.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31601.json index 8d44f2a5d0e..100866dff1a 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31601.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31601.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in appointy Appointy Appointment Scheduler allows Cross Site Request Forgery. This issue affects Appointy Appointment Scheduler: from n/a through 4.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en appointy Appointy Appointment Scheduler permite Cross-Site Request Forgery. Este problema afecta al programador de citas Appointy desde la versi\u00f3n n/d hasta la 4.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31602.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31602.json index 32c4ac474e9..8965c9efe84 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31602.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in apimofficiel Apimo Connector allows Cross Site Request Forgery. This issue affects Apimo Connector: from n/a through 2.6.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en apimofficiel Apimo Connector permite Cross-Site Request Forgery. Este problema afecta al conector Apimo desde la versi\u00f3n n/d hasta la 2.6.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31603.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31603.json index 31ce17186fd..df692743350 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31603.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31603.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in moshensky CF7 Spreadsheets allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CF7 Spreadsheets: from n/a through 2.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en moshensky CF7 Spreadsheets permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a las hojas de c\u00e1lculo CF7 desde la versi\u00f3n n/d hasta la 2.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31604.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31604.json index a19d7daff5f..7d2481dbe1b 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31604.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31604.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Cal.com Cal.com allows Stored XSS. This issue affects Cal.com: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en Cal.com. Cal.com permite XSS almacenado. Este problema afecta a Cal.com desde la versi\u00f3n n/d hasta la 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31605.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31605.json index 5e73106329c..c4de69cf7ce 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31605.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31605.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WeblineIndia Welcome Popup allows Stored XSS. This issue affects Welcome Popup: from n/a through 1.0.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WeblineIndia Welcome Popup permite XSS almacenado. Este problema afecta a la ventana emergente de bienvenida desde n/d hasta la versi\u00f3n 1.0.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31606.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31606.json index 19c1426d337..29303b5e582 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31606.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31606.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in softpulseinfotech SP Blog Designer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SP Blog Designer: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en softpulseinfotech SP Blog Designer permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SP Blog Designer desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31607.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31607.json index 3c43f1c03bf..26a814f81bd 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31607.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in flomei Simple-Audioplayer allows Stored XSS. This issue affects Simple-Audioplayer: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en flomei Simple-Audioplayer que permite XSS almacenado. Este problema afecta a Simple-Audioplayer desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31608.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31608.json index f77154ba937..d2a695dcfe3 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31608.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31608.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reDim GmbH CookieHint WP allows Stored XSS. This issue affects CookieHint WP: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en reDim GmbH CookieHint WP permite XSS almacenado. Este problema afecta a CookieHint WP desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31609.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31609.json index ec6150f6cbf..926b2767269 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31609.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31609.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Arni Cinco WPCargo Track & Trace allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WPCargo Track & Trace: from n/a through 7.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Arni Cinco WPCargo Track & Trace permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WPCargo Track & Trace desde la versi\u00f3n n/d hasta la 7.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31610.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31610.json index 5eb342d8911..fa7a90abd32 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31610.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31610.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gingerplugins Notification Bar, Sticky Notification Bar, Sticky Welcome Bar for any theme allows Stored XSS. This issue affects Notification Bar, Sticky Notification Bar, Sticky Welcome Bar for any theme: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en gingerplugins Notification Bar, Sticky Notification Bar, Sticky Welcome Bar for any theme permite XSS almacenado. Este problema afecta a las barras de notificaciones, las barras de notificaciones fijas y las barras de bienvenida fijas de cualquier tema, desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31611.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31611.json index 1b997213870..9bbd5a0e692 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31611.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31611.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Shaharia Azam Auto Post After Image Upload allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Auto Post After Image Upload: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Shaharia Azam Auto Post After Image Upload permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Auto Post After Image Upload desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31613.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31613.json index d38c19f3787..0a69e754032 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31613.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31613.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aboobacker. AB Google Map Travel allows Cross Site Request Forgery. This issue affects AB Google Map Travel : from n/a through 4.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Aboobacker. AB Google Map Travel permite Cross-Site Request Forgery. Este problema afecta a AB Google Map Travel desde n/d hasta la versi\u00f3n 4.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31614.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31614.json index 2baac33d5d6..f1408210727 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31614.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31614.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hiroprot Terms Before Download allows Stored XSS. This issue affects Terms Before Download: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en hiroprot Terms Before Download que permite XSS almacenado. Este problema afecta a T\u00e9rminos antes de la descarga: desde n/d hasta la versi\u00f3n 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31615.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31615.json index 5095b2feecb..a5478168027 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31615.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31615.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in owenr88 Simple Contact Forms allows Stored XSS. This issue affects Simple Contact Forms: from n/a through 1.6.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en owenr88 Simple Contact Forms permite XSS almacenado. Este problema afecta a Simple Contact Forms desde n/d hasta la versi\u00f3n 1.6.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31616.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31616.json index d813db71027..36a3fe5f172 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31616.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31616.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in AdminGeekZ Varnish WordPress allows Cross Site Request Forgery. This issue affects Varnish WordPress: from n/a through 1.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en AdminGeekZ Varnish WordPress permite Cross-Site Request Forgery. Este problema afecta a Varnish WordPress desde la versi\u00f3n n/d hasta la 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31617.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31617.json index 740f9205ebe..c687fba47da 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31617.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31617.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Cross Site Request Forgery. This issue affects PostmarkApp Email Integrator: from n/a through 2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Gagan Deep Singh PostmarkApp Email Integrator permite Cross-Site Request Forgery. Este problema afecta al integrador de correo electr\u00f3nico PostmarkApp desde n/d hasta la versi\u00f3n 2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31618.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31618.json index 21259230cb6..486f375ff91 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31618.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31618.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Jaap Jansma Connector to CiviCRM with CiviMcRestFace allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Connector to CiviCRM with CiviMcRestFace: from n/a through 1.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Jaap Jansma Connector to CiviCRM with CiviMcRestFace permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al conector para CiviCRM con CiviMcRestFace desde n/d hasta la versi\u00f3n 1.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31620.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31620.json index 3eba3fdddf6..ca134e1226f 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31620.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31620.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in carperfer CoverManager allows Stored XSS. This issue affects CoverManager: from n/a through 0.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en carperfer CoverManager permite XSS almacenado. Este problema afecta a CoverManager desde n/d hasta la versi\u00f3n 0.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31621.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31621.json index b5f28f20c48..a9ba08fced8 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31621.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31621.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in davidpaulsson byBrick Accordion allows Stored XSS. This issue affects byBrick Accordion: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en davidpaulsson byBrick Accordion permite XSS almacenado. Este problema afecta a byBrick Accordion desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31623.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31623.json index ec859fa3a00..5904003bf92 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31623.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31623.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in richtexteditor Rich Text Editor allows Stored XSS. This issue affects Rich Text Editor: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en richtexteditor Rich Text Editor permite XSS almacenado. Este problema afecta al editor de texto enriquecido desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31624.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31624.json index 6e06f2a6131..bce8d9e6672 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31624.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LABCAT Processing Projects allows DOM-Based XSS. This issue affects Processing Projects: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb) en LABCAT Processing Projects permite XSS basado en DOM. Este problema afecta a los proyectos de procesamiento desde n/d hasta la versi\u00f3n 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31625.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31625.json index efa3760c95b..482ec8fb74f 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31625.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31625.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ramanparashar Useinfluence allows Stored XSS. This issue affects Useinfluence: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ramanparashar Useinfluence que permite XSS almacenado. Este problema afecta a Useinfluence desde n/d hasta la versi\u00f3n 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31627.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31627.json index decf4f4b771..0ae14ac6de6 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31627.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31627.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Lingren Media Library Assistant allows Stored XSS. This issue affects Media Library Assistant: from n/a through 3.24." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en David Lingren Media Library Assistant permite XSS almacenado. Este problema afecta al Asistente de la Biblioteca Multimedia desde n/d hasta la versi\u00f3n 3.24." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31629.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31629.json index 8fd3fad6f2f..c839f140793 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31629.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31629.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jacob Allred Infusionsoft Web Form JavaScript allows Stored XSS. This issue affects Infusionsoft Web Form JavaScript: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jacob Allred Infusionsoft Web Form JavaScript permite XSS almacenado. Este problema afecta a Infusionsoft Web Form JavaScript desde n/d hasta la versi\u00f3n 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json index 71e25219b5b..2541a709fef 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.\nThis issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.\nUsers are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache POI. El problema afecta al an\u00e1lisis de archivos con formato OOXML como xlsx, docx y pptx. Estos formatos de archivo son b\u00e1sicamente archivos zip y es posible que usuarios maliciosos agreguen entradas zip con nombres duplicados (incluida la ruta) al archivo zip. En este caso, los productos que lean el archivo afectado podr\u00edan leer datos diferentes, ya que se selecciona una de las entradas zip con el nombre duplicado en lugar de otra, pero otros productos podr\u00edan elegir una entrada zip diferente. Este problema afecta a Apache POI poi-ooxml anterior a la versi\u00f3n 5.4.0. poi-ooxml 5.4.0 tiene una comprobaci\u00f3n que genera una excepci\u00f3n si se encuentran entradas zip con nombres de archivo duplicados en el archivo de entrada. Se recomienda a los usuarios actualizar a la versi\u00f3n poi-ooxml 5.4.0, que soluciona el problema. Consulte https://poi.apache.org/security.html para obtener recomendaciones sobre c\u00f3mo usar las bibliotecas de POI de forma segura." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31673.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31673.json index 30e63d8e6bd..71d28dbfe36 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31673.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Drupal core allows Forceful Browsing.This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal Drupal core permite la navegaci\u00f3n forzada. Este problema afecta al n\u00facleo de Drupal: desde 8.0.0 antes de 10.3.13, desde 10.4.0 antes de 10.4.3, desde 11.0.0 antes de 11.0.12, desde 11.1.0 antes de 11.1.3." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31675.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31675.json index fc540ab58bc..4b68bd2cec1 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31675.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31675.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.14, from 10.4.0 before 10.4.5, from 11.0.0 before 11.0.13, from 11.1.0 before 11.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Drupal core permite Cross-Site Scripting (XSS). Este problema afecta al n\u00facleo de Drupal: desde la versi\u00f3n 8.0.0 hasta la 10.3.14, desde la versi\u00f3n 10.4.0 hasta la 10.4.5, desde la versi\u00f3n 11.0.0 hasta la 11.0.13, desde la versi\u00f3n 11.1.0 hasta la 11.1.5." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json index 8ad6427dba0..d683bf00588 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Weak Authentication vulnerability in Drupal Email TFA allows Brute Force.This issue affects Email TFA: from 0.0.0 before 2.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autenticaci\u00f3n d\u00e9bil en Drupal Email TFA permite la fuerza bruta. Este problema afecta a Email TFA: desde 0.0.0 antes de 2.0.3." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json index c01fdd3e532..88373bb2ae4 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal AI (Artificial Intelligence) allows Cross Site Request Forgery.This issue affects AI (Artificial Intelligence): from 1.0.0 before 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal AI (Inteligencia Artificial) permite Cross-Site Request Forgery. Este problema afecta a AI (Inteligencia Artificial): desde 1.0.0 antes de 1.0.2." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json index 67345859793..022f85c0d91 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31678.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal AI (Artificial Intelligence) allows Forceful Browsing.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal AI (Inteligencia Artificial) permite la navegaci\u00f3n forzada. Este problema afecta a AI (Inteligencia Artificial): desde 0.0.0 antes de 1.0.3." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json index c416147cfc8..ba033d4d0a5 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31679.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Ignition Error Pages allows Cross-Site Scripting (XSS).This issue affects Ignition Error Pages: from 0.0.0 before 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Ignition Error Pages permite Cross-Site Scripting (XSS). Este problema afecta a Ignition Error Pages: desde la versi\u00f3n 0.0.0 hasta la 1.0.4." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31680.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31680.json index 68ce9fb6d01..1a4117db52d 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31680.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31680.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Matomo Analytics allows Cross Site Request Forgery.This issue affects Matomo Analytics: from 0.0.0 before 1.24.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal Matomo Analytics permite Cross-Site Request Forgery. Este problema afecta a Matomo Analytics: desde la versi\u00f3n 0.0.0 hasta la 1.24.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31681.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31681.json index ea7de79349e..f7e4d62ed99 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31681.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31681.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal Authenticator Login allows Forceful Browsing.This issue affects Authenticator Login: from 0.0.0 before 2.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal Authenticator Login permite la navegaci\u00f3n forzada. Este problema afecta al inicio de sesi\u00f3n del autenticador: desde la versi\u00f3n 0.0.0 hasta la 2.0.6." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31682.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31682.json index e3fa04d8ede..7583ffa9106 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31682.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31682.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Google Tag allows Cross-Site Scripting (XSS).This issue affects Google Tag: from 0.0.0 before 1.8.0, from 2.0.0 before 2.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Google Tag permite Cross-Site Scripting (XSS). Este problema afecta a Google Tag: desde la versi\u00f3n 0.0.0 hasta la 1.8.0, desde la versi\u00f3n 2.0.0 hasta la 2.0.8." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31683.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31683.json index 16573a259f0..c11d1c5a13d 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31683.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31683.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Google Tag allows Cross Site Request Forgery.This issue affects Google Tag: from 0.0.0 before 1.8.0, from 2.0.0 before 2.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal Google Tag permite Cross-Site Request Forgery. Este problema afecta a Google Tag: desde la versi\u00f3n 0.0.0 hasta la 1.8.0, desde la versi\u00f3n 2.0.0 hasta la 2.0.8." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31684.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31684.json index f4868d42dac..acc2f4bfd62 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31684.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31684.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal OAuth2 Client allows Cross Site Request Forgery.This issue affects OAuth2 Client: from 0.0.0 before 4.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal OAuth2 Client permite Cross-Site Request Forgery. Este problema afecta al cliente OAuth2: desde la versi\u00f3n 0.0.0 hasta la 4.1.3." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31685.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31685.json index 1b2259ece6d..d75240a26a8 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31685.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31685.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 0.0.0 before 12.3.11, from 12.4.0 before 12.4.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal Open Social permite la navegaci\u00f3n forzada. Este problema afecta a Open Social: desde la versi\u00f3n 0.0.0 hasta la 12.3.11, desde la versi\u00f3n 12.4.0 hasta la 12.4.10." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31686.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31686.json index 56f12f98595..89756d85650 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31686.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31686.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 0.0.0 before 12.3.11, from 12.4.0 before 12.4.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal Open Social permite la navegaci\u00f3n forzada. Este problema afecta a Open Social: desde la versi\u00f3n 0.0.0 hasta la 12.3.11, desde la versi\u00f3n 12.4.0 hasta la 12.4.10." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31687.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31687.json index 95cb1f20f69..14006698311 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31687.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31687.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal SpamSpan filter allows Cross-Site Scripting (XSS).This issue affects SpamSpan filter: from 0.0.0 before 3.2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal SpamSpan filter permite Cross-Site Scripting (XSS). Este problema afecta al filtro SpamSpan: desde la versi\u00f3n 0.0.0 hasta la 3.2.1." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31688.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31688.json index 3a32f5c59f0..6bed78669fd 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31688.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31688.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Configuration Split allows Cross Site Request Forgery.This issue affects Configuration Split: from 0.0.0 before 1.10.0, from 2.0.0 before 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal Configuration Split permite Cross-Site Request Forgery. Este problema afecta a Configuration Split: desde la versi\u00f3n 0.0.0 hasta la 1.10.0, desde la versi\u00f3n 2.0.0 hasta la 2.0.2." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31689.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31689.json index acd14b3da51..3ed89d4e8c4 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31689.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31689.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal General Data Protection Regulation allows Cross Site Request Forgery.This issue affects General Data Protection Regulation: from 0.0.0 before 3.0.1, from 3.1.0 before 3.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal General Data Protection Regulation permite Cross-Site Request Forgery. Este problema afecta al Reglamento General de Protecci\u00f3n de Datos: desde la versi\u00f3n 0.0.0 hasta la 3.0.1, desde la versi\u00f3n 3.1.0 hasta la 3.1.2." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31690.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31690.json index 692816154fa..305959b5612 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31690.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31690.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Cache Utility allows Cross Site Request Forgery.This issue affects Cache Utility: from 0.0.0 before 1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal Cache Utility permite Cross-Site Request Forgery. Este problema afecta a Cache Utility: desde la versi\u00f3n 0.0.0 hasta la 1.2.1." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31691.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31691.json index 43f697aa749..bbc372009f1 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31691.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31691.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Drupal OAuth2 Server allows Forceful Browsing.This issue affects OAuth2 Server: from 0.0.0 before 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Drupal OAuth2 Server permite la navegaci\u00f3n forzada. Este problema afecta al servidor OAuth2: desde la versi\u00f3n 0.0.0 hasta la 2.1.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31694.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31694.json index 7f1f6af9f2c..f649ece4b85 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31694.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31694.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Authorization vulnerability in Drupal Two-factor Authentication (TFA) allows Forceful Browsing.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.10.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal Two-factor Authentication (TFA) permite una navegaci\u00f3n forzada. Este problema afecta a la autenticaci\u00f3n de dos factores (TFA): desde la versi\u00f3n 0.0.0 hasta la 1.10.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31695.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31695.json index 181537cd56b..b968eac26b0 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31695.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31695.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Link field display mode formatter allows Cross-Site Scripting (XSS).This issue affects Link field display mode formatter: from 0.0.0 before 1.6.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Link field display mode formatter permite Cross-Site Scripting (XSS). Este problema afecta al formateador del modo de visualizaci\u00f3n del campo de enlace: desde la versi\u00f3n 0.0.0 hasta la 1.6.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31696.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31696.json index ad3da92f3ce..108f10ba4ee 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31696.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31696.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal RapiDoc OAS Field Formatter allows Cross-Site Scripting (XSS).This issue affects RapiDoc OAS Field Formatter: from 0.0.0 before 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal RapiDoc OAS Field Formatter permite Cross-Site Scripting (XSS). Este problema afecta a RapiDoc OAS Field Formatter: desde la versi\u00f3n 0.0.0 hasta la 1.0.1." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31697.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31697.json index 846028b7783..12ed935f61b 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31697.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31697.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Formatter Suite allows Cross-Site Scripting (XSS).This issue affects Formatter Suite: from 0.0.0 before 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Formatter Suite permite Cross-Site Scripting (XSS). Este problema afecta a Formatter Suite: desde la versi\u00f3n 0.0.0 hasta la 2.1.0." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31730.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31730.json index b649170cfa9..e6002fc628c 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31730.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31730.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DigitalCourt Marketer Addons allows Stored XSS. This issue affects Marketer Addons: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DigitalCourt Marketer Addons permite XSS almacenado. Este problema afecta a los complementos de Marketer desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31731.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31731.json index 015ab96f268..6cc44734d26 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31731.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31731.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Philip John Author Bio Shortcode allows Stored XSS. This issue affects Author Bio Shortcode: from n/a through 2.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Philip John Author Bio Shortcode que permite XSS almacenado. Este problema afecta al c\u00f3digo corto de la biograf\u00eda del autor: desde n/d hasta la versi\u00f3n 2.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31732.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31732.json index c3535ef03ba..254485268d1 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31732.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31732.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in gb-plugins GB Gallery Slideshow allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GB Gallery Slideshow: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en gb-plugins GB Gallery Slideshow permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a GB Gallery Slideshow desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31733.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31733.json index cda8ebc7058..b7da3388763 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31733.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31733.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boot Div WP Sitemap allows Stored XSS. This issue affects WP Sitemap: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Boot Div WP Sitemap permite XSS almacenado. Este problema afecta a WP Sitemap desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31734.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31734.json index 0e11f8b51b6..9f2a6aa02e6 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31734.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31734.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Simple Post Expiration allows DOM-Based XSS. This issue affects Simple Post Expiration: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Syed Balkhi Simple Post Expiration permite XSS basado en DOM. Este problema afecta a la expiraci\u00f3n de publicaci\u00f3n simple desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31735.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31735.json index b3ff77d0440..0e548ea8bfa 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31735.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31735.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress allows Stored XSS. This issue affects Footnotes for WordPress: from n/a through 2016.1230." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en C. Johnson Footnotes for WordPress permite XSS almacenado. Este problema afecta a Footnotes para WordPress desde n/d hasta 2016.1230." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31737.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31737.json index dc8cdc42e94..0e596f8119f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31737.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31737.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dxladner Client Showcase allows Stored XSS. This issue affects Client Showcase: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en dxladner Client Showcase permite XSS almacenado. Este problema afecta a Client Showcase desde n/d hasta la versi\u00f3n 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31738.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31738.json index dd1de7bdfcf..280ef57071a 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31738.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31738.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yazamodeveloper LeadQuizzes allows Stored XSS. This issue affects LeadQuizzes: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en yazamodeveloper LeadQuizzes permite XSS almacenado. Este problema afecta a LeadQuizzes desde n/d hasta la versi\u00f3n 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31740.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31740.json index 132e2954aa6..a31d720633b 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31740.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aThemeArt News, Magazine and Blog Elements allows Stored XSS. This issue affects News, Magazine and Blog Elements: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en aThemeArt News, Magazine and Blog Elements permite XSS almacenado. Este problema afecta a los elementos de noticias, revistas y blogs desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31741.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31741.json index d537b56fc48..f41237cb3f6 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31741.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31741.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Filtr8 Easy Magazine allows DOM-Based XSS. This issue affects Easy Magazine: from n/a through 2.1.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Filtr8 Easy Magazine permite XSS basado en DOM. Este problema afecta a Easy Magazine desde n/d hasta la versi\u00f3n 2.1.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31742.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31742.json index eae66d9a455..4a26945b15f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31742.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31742.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action allows Stored XSS. This issue affects Dima Take Action: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PixelDima Dima Take Action permite XSS almacenado. Este problema afecta a Dima Take Action desde n/d hasta la versi\u00f3n 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31743.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31743.json index 4f90aed6266..3040040386e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31743.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpszaki Lightweight and Responsive Youtube Embed allows Stored XSS. This issue affects Lightweight and Responsive Youtube Embed: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpszaki Lightweight and Responsive Youtube Embed permite XSS almacenado. Este problema afecta a la incrustaci\u00f3n ligera y adaptable de YouTube desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31744.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31744.json index 5e9639e3d4b..9fabee13796 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31744.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpszaki Lightweight and Responsive Youtube Embed allows Stored XSS. This issue affects Lightweight and Responsive Youtube Embed: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpszaki Lightweight and Responsive Youtube Embed permite XSS almacenado. Este problema afecta a la incrustaci\u00f3n ligera y adaptable de YouTube desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31745.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31745.json index 7dcf60065e6..5a6b378714e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31745.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31745.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arni Cinco Subscription Form for Feedblitz allows Stored XSS. This issue affects Subscription Form for Feedblitz: from n/a through 1.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Arni Cinco Subscription Form for Feedblitz permite XSS almacenado. Este problema afecta al formulario de suscripci\u00f3n para Feedblitz desde n/d hasta la versi\u00f3n 1.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31747.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31747.json index 541f72b351d..53816c75c1e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31747.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31747.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in milan.latinovic WP Chrono allows DOM-Based XSS. This issue affects WP Chrono: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en milan.latinovic. WP Chrono permite XSS basado en DOM. Este problema afecta a WP Chrono desde n/d hasta la versi\u00f3n 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31748.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31748.json index c4de142be70..1a9fe2bb5a9 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31748.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31748.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpopal Opal Portfolio allows Stored XSS. This issue affects Opal Portfolio: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpopal Opal Portfolio permite XSS almacenado. Este problema afecta a Opal Portfolio desde n/d hasta la versi\u00f3n 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31749.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31749.json index 8e8a5f3f3c6..dd893a0bd2e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31749.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31749.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPelite HMH Footer Builder For Elementor allows Stored XSS. This issue affects HMH Footer Builder For Elementor: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPelite HMH Footer Builder para Elementor permite XSS almacenado. Este problema afecta a HMH Footer Builder para Elementor desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31750.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31750.json index 4a1c3aa2415..e502c707d9b 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31750.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31750.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in doit Breaking News WP allows Stored XSS. This issue affects Breaking News WP: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en doit Breaking News WP permite XSS almacenado. Este problema afecta a Breaking News WP desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31751.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31751.json index f9c076ac8be..c163605f358 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31751.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31751.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in doit Breaking News WP allows Cross Site Request Forgery. This issue affects Breaking News WP: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en doit Breaking News WP permite Cross-Site Request Forgery. Este problema afecta a Breaking News WP desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31752.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31752.json index 2af37ed53f2..20097e6e563 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31752.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31752.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in termel Bulk Fields Editor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bulk Fields Editor: from n/a through 1.8.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en termel Bulk Fields Editor permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al editor de campos masivos desde la versi\u00f3n n/d hasta la 1.8.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31754.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31754.json index a4396ce97ce..a5cb4e092b1 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31754.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31754.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DobsonDev DobsonDev Shortcodes allows Stored XSS. This issue affects DobsonDev Shortcodes: from n/a through 2.1.12." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DobsonDev DobsonDev Shortcodes permite XSS almacenado. Este problema afecta a los shortcodes de DobsonDev desde la versi\u00f3n n/d hasta la 2.1.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31755.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31755.json index 6aabce4c28a..0c94b434d95 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31755.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31755.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in josselynj pCloud Backup allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects pCloud Backup: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en josselynj pCloud Backup permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a pCloud Backup desde la versi\u00f3n n/d hasta la 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31756.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31756.json index 7326bae72b6..83dbc00ed4e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31756.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31756.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in tuyennv TZ PlusGallery allows Cross Site Request Forgery. This issue affects TZ PlusGallery: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en tuyennv TZ PlusGallery permite Cross-Site Request Forgery. Este problema afecta a TZ PlusGallery desde n/d hasta la versi\u00f3n 1.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31757.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31757.json index fc572ca3bb8..364a33fca10 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31757.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31757.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in BinaryCarpenter Free Woocommerce Product Table View allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Free Woocommerce Product Table View: from n/a through 1.78." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en BinaryCarpenter Free Woocommerce Product Table View permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la vista de tabla de productos gratuita de WooCommerce desde n/d hasta la versi\u00f3n 1.78." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31759.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31759.json index 9945c70db34..ca0044ac9d6 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31759.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31759.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BooSpot Boo Recipes allows Stored XSS. This issue affects Boo Recipes: from n/a through 2.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BooSpot Boo Recipes permite XSS almacenado. Este problema afecta a Boo Recipes desde la versi\u00f3n n/d hasta la 2.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31760.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31760.json index c16c9934592..158cc025b7b 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31760.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31760.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in snapwidget SnapWidget Social Photo Feed Widget allows DOM-Based XSS. This issue affects SnapWidget Social Photo Feed Widget: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en snapwidget SnapWidget Social Photo Feed Widget permite XSS basado en DOM. Este problema afecta al widget de fotos sociales de SnapWidget desde n/d hasta la versi\u00f3n 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31761.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31761.json index 836fdbc045e..bbd0db50734 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31761.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31761.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DEJAN Hypotext allows Stored XSS. This issue affects Hypotext: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb) en DEJAN Hypotext permite XSS almacenado. Este problema afecta a Hypotext desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31762.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31762.json index ba672910e70..c4f07455bdf 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31762.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31762.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in andreyazimov Sheet2Site allows Stored XSS. This issue affects Sheet2Site: from n/a through 1.0.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en andreyazimov Sheet2Site permite XSS almacenado. Este problema afecta a Sheet2Site desde n/d hasta la versi\u00f3n 1.0.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31763.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31763.json index f547f231007..0cd5bb56674 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31763.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31763.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Preliot Cache control by Cacholong allows Cross Site Request Forgery. This issue affects Cache control by Cacholong: from n/a through 5.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Preliot Cache control by Cacholong permite Cross-Site Request Forgery. Este problema afecta al control de cach\u00e9 de Cacholong desde n/d hasta la versi\u00f3n 5.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31764.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31764.json index 8d7dd8692d7..45ad042c48f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31764.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31764.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Preliot Cache control by Cacholong allows Stored XSS. This issue affects Cache control by Cacholong: from n/a through 5.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Preliot Cache control by Cacholong permite XSS almacenado. Este problema afecta al control de cach\u00e9 de Cacholong desde n/d hasta la versi\u00f3n 5.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31765.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31765.json index f849419adbe..ac3afcbf421 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31765.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31765.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in themeqx GDPR Cookie Notice allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GDPR Cookie Notice: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en themeqx GDPR Cookie Notice permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Aviso de Cookies del RGPD desde n/d hasta la versi\u00f3n 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31766.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31766.json index 5eae67c1f7c..84353049104 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31766.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31766.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PhotoShelter PhotoShelter for Photographers Blog Feed Plugin allows Stored XSS. This issue affects PhotoShelter for Photographers Blog Feed Plugin: from n/a through 1.5.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PhotoShelter PhotoShelter for Photographers Blog Feed Plugin permite XSS almacenado. Este problema afecta al plugin PhotoShelter para fot\u00f3grafos, desde n/d hasta la versi\u00f3n 1.5.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31767.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31767.json index 7fd7efc4bdf..d74e1becc86 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31767.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31767.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Post Custom Templates Lite allows Stored XSS. This issue affects Post Custom Templates Lite: from n/a through 1.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OTWthemes Post Custom Templates Lite permite XSS almacenado. Este problema afecta a Post Custom Templates Lite desde n/d hasta la versi\u00f3n 1.14." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31769.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31769.json index 0c3de5069f2..d1e117e847c 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31769.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31769.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in NiteoThemes CLP \u2013 Custom Login Page by NiteoThemes allows Cross Site Request Forgery. This issue affects CLP \u2013 Custom Login Page by NiteoThemes: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en NiteoThemes CLP \u2013 Custom Login Page by NiteoThemes permite Cross-Site Request Forgery. Este problema afecta a CLP \u2013 P\u00e1gina de inicio de sesi\u00f3n personalizada de NiteoThemes desde n/d hasta la versi\u00f3n 1.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31770.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31770.json index d530d36430d..bda7ed37d35 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31770.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31770.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Content Manager Light allows Stored XSS. This issue affects Content Manager Light: from n/a through 3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OTWthemes Content Manager Light permite XSS almacenado. Este problema afecta a Content Manager Light desde n/d hasta la versi\u00f3n 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31771.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31771.json index 58ca2fd49b2..805b6b63ae7 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31771.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31771.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sultan Nasir Uddin Team Members for Elementor Page Builder allows Stored XSS. This issue affects Team Members for Elementor Page Builder: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Sultan Nasir Uddin Team Members for Elementor Page Builder permite XSS almacenado. Este problema afecta a los miembros del equipo de Elementor Page Builder desde n/d hasta la versi\u00f3n 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31772.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31772.json index 71574361bce..abd06bbecf3 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31772.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31772.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Astoundify WP Modal Popup with Cookie Integration allows Stored XSS. This issue affects WP Modal Popup with Cookie Integration: from n/a through 2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Astoundify WP Modal Popup with Cookie Integration permite XSS almacenado. Este problema afecta a WP Modal Popup con integraci\u00f3n de cookies desde n/d hasta la versi\u00f3n 2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31773.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31773.json index 1b93a8219d9..5b11177ab7d 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31773.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31773.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in cedcommerce Ship Per Product allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Ship Per Product: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en cedcommerce Ship Per Product permite acceder a funcionalidades no restringidas correctamente por las ACL. Este problema afecta al env\u00edo por producto desde n/d hasta la versi\u00f3n 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31774.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31774.json index 664d53945d9..b3b1d59aa0a 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31774.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31774.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WebProtect.ai Astra Security Suite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Astra Security Suite: from n/a through 0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WebProtect.ai Astra Security Suite permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Astra Security Suite desde la versi\u00f3n n/d hasta la 0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31775.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31775.json index 4c95e252e25..653c280db71 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31775.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31775.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in smackcoders Google SEO Pressor Snippet allows Cross Site Request Forgery. This issue affects Google SEO Pressor Snippet: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en smackcoders Google SEO Pressor Snippet permite Cross-Site Request Forgery. Este problema afecta a Google SEO Pressor Snippet: desde n/d hasta la versi\u00f3n 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31776.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31776.json index 3bb43faaa76..37360a69c35 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31776.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31776.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aphotrax Uptime Robot Plugin for WordPress allows Cross Site Request Forgery. This issue affects Uptime Robot Plugin for WordPress: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Aphotrax Uptime Robot Plugin for WordPress permite Cross-Site Request Forgery. Este problema afecta al plugin Uptime Robot para WordPress desde la versi\u00f3n n/d hasta la 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31777.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31777.json index b5a2c9169b8..e9b843fb61e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31777.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in BeastThemes Clockinator Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Clockinator Lite: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en BeastThemes Clockinator Lite permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Clockinator Lite desde la versi\u00f3n n/d hasta la 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31778.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31778.json index bd456c71650..d3f3874a30a 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31778.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31778.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in raphaelheide Donate Me allows Reflected XSS. This issue affects Donate Me: from n/a through 1.2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en raphaelheide Donate Me permite XSS reflejado. Este problema afecta a Donate Me desde n/d hasta la versi\u00f3n 1.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31779.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31779.json index aa3a3bac935..7a1f8ae5475 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31779.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jonathan Daggerhart Query Wrangler allows Cross Site Request Forgery. This issue affects Query Wrangler: from n/a through 1.5.53." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Jonathan Daggerhart Query Wrangler permite Cross-Site Request Forgery. Este problema afecta a Query Wrangler desde n/d hasta la versi\u00f3n 1.5.53." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31780.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31780.json index 92ff38aa801..fd3e57b8c3b 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31780.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Andy Stratton Append Content allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Append Content: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Andy Stratton Append Content permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Append Content desde n/d hasta la versi\u00f3n 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31781.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31781.json index ae0d9182a25..e41761dd23f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31781.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ahmadshyk Gift Cards for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gift Cards for WooCommerce: from n/a through 1.5.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en ahmadshyk Gift Cards for WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a las Tarjetas de Regalo para WooCommerce desde la versi\u00f3n n/d hasta la 1.5.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31782.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31782.json index 408346a3766..5059a452b60 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31782.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31782.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in pupunzi mb.YTPlayer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects mb.YTPlayer: from n/a through 3.3.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en pupunzi mb.YTPlayer permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a mb.YTPlayer desde la versi\u00f3n n/d hasta la 3.3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31783.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31783.json index e4cd8f57bd4..6bfe956a4e5 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31783.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31783.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leartes.NET Leartes TRY Exchange Rates allows Stored XSS. This issue affects Leartes TRY Exchange Rates: from n/a through 2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Leartes.NET Leartes TRY Exchange Rates permite XSS almacenado. Este problema afecta a las tasas de cambio de Leartes TRY desde n/d hasta la versi\u00f3n 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31784.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31784.json index 2911261259c..28388ac8097 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31784.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31784.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rudy Susanto Embed Extended \u2013 Embed Maps, Videos, Websites, Source Codes, and more allows Cross Site Request Forgery. This issue affects Embed Extended \u2013 Embed Maps, Videos, Websites, Source Codes, and more: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Rudy Susanto Embed Extended \u2013 Embed Maps, Videos, Websites, Source Codes, and more permite Cross-Site Request Forgery. Este problema afecta a Embed Extended (mapas, v\u00eddeos, sitios web, c\u00f3digo fuente y m\u00e1s): desde n/d hasta la versi\u00f3n 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31785.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31785.json index 86e9f7b661e..c2bc0c6c458 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31785.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31785.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Clearbit Clearbit Reveal allows Cross Site Request Forgery. This issue affects Clearbit Reveal: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Clearbit Clearbit Reveal permite Cross-Site Request Forgery. Este problema afecta a Clearbit Reveal desde n/d hasta la versi\u00f3n 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31786.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31786.json index ebcdbc735ea..2f88dd68e4f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31786.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31786.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Travis Simple Icons allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple Icons: from n/a through 2.8.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Travis Simple Icons permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Simple Icons desde la versi\u00f3n n/d hasta la 2.8.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31787.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31787.json index be46d66f229..bee3c48a396 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31787.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31787.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Brady Vercher Cue allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cue: from n/a through 2.4.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Brady Vercher Cue permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Cue desde la versi\u00f3n n/d hasta la 2.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31788.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31788.json index 013a0157076..7df39f54b1e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31788.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31788.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in smackcoders AIO Performance Profiler, Monitor, Optimize, Compress & Debug allows Retrieve Embedded Sensitive Data. This issue affects AIO Performance Profiler, Monitor, Optimize, Compress & Debug: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en smackcoders AIO Performance Profiler, Monitor, Optimize, Compress & Debug permite recuperar datos confidenciales incrustados. Este problema afecta a AIO Performance Profiler, Monitor, Optimize, Compress & Debug desde n/d hasta la versi\u00f3n 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31790.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31790.json index 3659ced06ca..cbe1df5e4f9 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31790.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31790.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Binsaifullah Posten allows DOM-Based XSS. This issue affects Posten: from n/a through 0.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Binsaifullah Posten permite XSS basado en DOM. Este problema afecta a Posten desde la versi\u00f3n n/d hasta la 0.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31791.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31791.json index 50ca40cb143..91936208dc4 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31791.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31791.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Oliver Boyers Pin Generator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Pin Generator: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Oliver Boyers Pin Generator permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al generador de PIN desde n/d hasta la versi\u00f3n 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31792.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31792.json index 9f129311937..6c66530c264 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31792.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Forms allows Stored XSS. This issue affects Piotnet Forms: from n/a through 1.0.30." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en piotnetdotcom Piotnet Forms que permite XSS almacenado. Este problema afecta a Piotnet Forms desde n/d hasta la versi\u00f3n 1.0.30." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31793.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31793.json index 0ac68333655..44214a4543e 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31793.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Forms allows Stored XSS. This issue affects Piotnet Forms: from n/a through 1.0.30." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en piotnetdotcom Piotnet Forms que permite XSS almacenado. Este problema afecta a Piotnet Forms desde n/d hasta la versi\u00f3n 1.0.30." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31796.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31796.json index c3ed3312543..34c8f87e98c 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31796.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31796.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in TheInnovs Team ElementsCSS Addons for Elementor allows Server Side Request Forgery. This issue affects ElementsCSS Addons for Elementor: from n/a through 1.0.8.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en TheInnovs Team ElementsCSS Addons for Elementor permite Server-Side Request Forgery. Este problema afecta a los complementos ElementsCSS para Elementor desde la versi\u00f3n n/d hasta la 1.0.8.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31797.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31797.json index 9bc3ec8d4bd..2c08d75d7f2 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31797.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31797.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Sprout Clients allows Stored XSS. This issue affects Sprout Clients: from n/a through 3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BoldGrid Sprout Clients permite XSS almacenado. Este problema afecta a los clientes Sprout desde la versi\u00f3n n/d hasta la 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31798.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31798.json index c4649d7884e..ec0b551bff8 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31798.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31798.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in publitio Publitio allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Publitio: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en publitio Publitio permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Publitio desde la versi\u00f3n n/d hasta la 2.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31799.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31799.json index ec85ee03b6b..72612d7fed9 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31799.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31799.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in publitio Publitio allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Publitio: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en publitio Publitio permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Publitio desde la versi\u00f3n n/d hasta la 2.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31801.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31801.json index d6ab2c794ea..d79694f7d70 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31801.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31801.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maksym Marko MX Time Zone Clocks allows Reflected XSS. This issue affects MX Time Zone Clocks: from n/a through 5.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Maksym Marko MX Time Zone Clocks permite XSS reflejado. Este problema afecta a los relojes de zona horaria MX desde n/d hasta la versi\u00f3n 5.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31802.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31802.json index 53e756fc916..cd89ed8c924 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31802.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31802.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Shiptimize Shiptimize for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Shiptimize for WooCommerce: from n/a through 3.1.86." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Shiptimize Shiptimize for WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Shiptimize para WooCommerce desde la versi\u00f3n n/d hasta la 3.1.86." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31803.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31803.json index 45e9206557a..e4af70d62b7 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31803.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31803.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Neteuro Turisbook Booking System allows Stored XSS. This issue affects Turisbook Booking System: from n/a through 1.3.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Neteuro Turisbook Booking System permite XSS almacenado. Este problema afecta al sistema de reservas Turisbook desde n/d hasta la versi\u00f3n 1.3.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31804.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31804.json index f49f5fd7da5..7b80a53d6a3 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31804.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31804.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DraftPress Team Follow Us Badges allows Stored XSS. This issue affects Follow Us Badges: from n/a through 3.1.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DraftPress Team Follow Us Badges permite XSS almacenado. Este problema afecta a las insignias de \"S\u00edguenos\": desde n/d hasta la versi\u00f3n 3.1.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31805.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31805.json index 1d290ba7c27..c90e828c228 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31805.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31805.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExpressTech Systems Gutena Kit \u2013 Gutenberg Blocks and Templates allows Stored XSS. This issue affects Gutena Kit \u2013 Gutenberg Blocks and Templates: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ExpressTech Systems Gutena Kit \u2013 Gutenberg Blocks and Templates permite XSS almacenado. Este problema afecta a Gutena Kit \u2013 Gutenberg Blocks and Templates desde n/d hasta la versi\u00f3n 2.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31806.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31806.json index e7f8dc821d0..63107c6ed19 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31806.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31806.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uSystems Webling allows Stored XSS. This issue affects Webling: from n/a through 3.9.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en uSystems Webling permite XSS almacenado. Este problema afecta a Webling desde n/d hasta la versi\u00f3n 3.9.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31807.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31807.json index 1b63973cc34..ce674f3e3a9 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31807.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31807.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CloudRedux Product Notices for WooCommerce allows Cross Site Request Forgery. This issue affects Product Notices for WooCommerce: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en CloudRedux Product Notices for WooCommerce permite Cross-Site Request Forgery. Este problema afecta a los avisos de producto para WooCommerce desde la versi\u00f3n n/d hasta la 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31808.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31808.json index 3841cbf6398..f20bdceff53 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31808.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31808.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in IT Path Solutions SCSS WP Editor allows Cross Site Request Forgery. This issue affects SCSS WP Editor: from n/a through 1.1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en IT Path Solutions SCSS WP Editor permite Cross-Site Request Forgery. Este problema afecta al editor SCSS WP desde n/d hasta la versi\u00f3n 1.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31809.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31809.json index 1ffe45ec92a..7c8fb7c7aad 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31809.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31809.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Labinator Labinator Content Types Duplicator allows Cross Site Request Forgery. This issue affects Labinator Content Types Duplicator: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Labinator Labinator Content Types Duplicator permite Cross-Site Request Forgery. Este problema afecta a Labinator desde n/d hasta la versi\u00f3n 1.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31810.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31810.json index 74eb6a1f57e..da3dde703cb 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31810.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31810.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PickPlugins Question Answer allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Question Answer: from n/a through 1.2.70." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en PickPlugins Question Answer permite acceder a funcionalidades no restringidas correctamente por las ACL. Este problema afecta a la pregunta y respuesta desde n/d hasta la versi\u00f3n 1.2.70." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31811.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31811.json index 7c356742acc..1ef1af4d487 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31811.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31811.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in xtreeme Planyo online reservation system allows Stored XSS. This issue affects Planyo online reservation system: from n/a through 3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en xtreeme Planyo online reservation system permite XSS almacenado. Este problema afecta al sistema de reservas en l\u00ednea Planyo desde n/d hasta la versi\u00f3n 3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31812.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31812.json index e7e611beece..65420f42d5d 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31812.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31812.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tomas BuddyPress Members Only allows Stored XSS. This issue affects BuddyPress Members Only: from n/a through 3.5.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tomas BuddyPress Members Only permite XSS almacenado. Este problema afecta a BuddyPress Members Only desde n/d hasta la versi\u00f3n 3.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31813.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31813.json index 9ba14e9605e..928d27c113f 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31813.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31813.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Website366.com WPSHARE247 Elementor Addons allows Stored XSS. This issue affects WPSHARE247 Elementor Addons: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Website366.com WPSHARE247 Elementor Addons permite XSS almacenado. Este problema afecta a los complementos de Elementor de WPSHARE247 desde la versi\u00f3n n/d hasta la 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31814.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31814.json index c8a9c687e2a..6d18ec304f5 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31814.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31814.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in OwnerRez OwnerRez allows Cross Site Request Forgery. This issue affects OwnerRez: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en OwnerRez OwnerRez permite Cross-Site Request Forgery. Este problema afecta a OwnerRez desde n/d hasta la versi\u00f3n 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31815.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31815.json index e6c21640428..be7fe31560e 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31815.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in devscred Design Blocks allows Stored XSS. This issue affects Design Blocks: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en devscred Design Blocks permite XSS almacenado. Este problema afecta a los bloques de dise\u00f1o desde n/d hasta la versi\u00f3n 1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31816.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31816.json index 37727501ba3..1ad31ec5ce2 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31816.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31816.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in pietro Mobile App Canvas allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Mobile App Canvas: from n/a through 3.8.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Pietro Mobile App Canvas permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Mobile App Canvas desde la versi\u00f3n n/d hasta la 3.8.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31817.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31817.json index d1bb49229e5..9d5ccbc2383 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31817.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31817.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPWheels BlockWheels allows DOM-Based XSS. This issue affects BlockWheels: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPWheels BlockWheels permite XSS basado en DOM. Este problema afecta a BlockWheels desde n/d hasta la versi\u00f3n 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31818.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31818.json index 132fc55b27e..d6da8fec214 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31818.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31818.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ContentBot.ai ContentBot AI Writer allows Stored XSS. This issue affects ContentBot AI Writer: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ContentBot.ai. ContentBot AI Writer permite XSS almacenado. Este problema afecta a ContentBot AI Writer desde n/d hasta la versi\u00f3n 1.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31820.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31820.json index afc935a5e9d..66e1e973825 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31820.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31820.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in webdevstudios Automatic Featured Images from Videos allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Automatic Featured Images from Videos: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en webdevstudios Automatic Featured Images from Videos permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a las im\u00e1genes destacadas autom\u00e1ticas de los v\u00eddeos desde la versi\u00f3n n/d hasta la 1.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31821.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31821.json index 1f47fa24b20..3269605d827 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31821.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31821.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in formsintegrations Integration of Zoho CRM and Contact Form 7 allows Phishing. This issue affects Integration of Zoho CRM and Contact Form 7: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a sitios no confiables ('Redirecci\u00f3n abierta') en formsintegrations Integration of Zoho CRM and Contact Form 7 permite el phishing. Este problema afecta a la integraci\u00f3n de Zoho CRM y Contact Form 7 desde n/d hasta la versi\u00f3n 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31822.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31822.json index f195eee7f46..3efabfdc0d2 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31822.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31822.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Simple HTML Sitemap: from n/a through 3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Ashish Ajani WP Simple HTML Sitemap permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Simple HTML Sitemap desde la versi\u00f3n n/d hasta la 3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31823.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31823.json index bf5f0d6f7bf..676e731fbd4 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31823.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31823.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpoperations WPoperation Elementor Addons allows Stored XSS. This issue affects WPoperation Elementor Addons: from n/a through 1.1.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpoperations WPoperation Elementor Addons permite XSS almacenado. Este problema afecta a los complementos de WPoperation Elementor desde la versi\u00f3n n/d hasta la 1.1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31824.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31824.json index 1a603c9ca13..cdcc496e5cf 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31824.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31824.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Wombat Plugins WP Optin Wheel allows Server Side Request Forgery. This issue affects WP Optin Wheel: from n/a through 1.4.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Wombat Plugins WP Optin Wheel permite Server-Side Request Forgery. Este problema afecta a WP Optin Wheel desde n/d hasta la versi\u00f3n 1.4.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31826.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31826.json index 5e4561a6bfd..d56cc58cbc6 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31826.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31826.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Anzar Ahmed Ni WooCommerce Cost Of Goods allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ni WooCommerce Cost Of Goods: from n/a through 3.2.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Anzar Ahmed Ni WooCommerce Cost Of Goods permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ni WooCommerce Cost Of Goods desde n/d hasta la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json index 8d969ae156b..95d9764c7ab 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31828.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in alextselegidis Easy!Appointments allows Cross Site Request Forgery. This issue affects Easy!Appointments: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en alextselegidis Easy!Appointments permite Cross-Site Request Forgery. Este problema afecta a Easy!Appointments desde la versi\u00f3n n/d hasta la 1.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31829.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31829.json index 0f1c41fb073..9b47c89e276 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31829.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31829.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in devscred ShopCred allows DOM-Based XSS. This issue affects ShopCred: from n/a through 1.2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en devscred ShopCred permite XSS basado en DOM. Este problema afecta a ShopCred desde n/d hasta la versi\u00f3n 1.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31830.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31830.json index f10a36b5c33..01baad28e00 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31830.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31830.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Uriahs Victor Printus allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Printus: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Uriahs Victor Printus permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Printus desde la versi\u00f3n n/d hasta la 1.2.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31831.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31831.json index c727e9a7ce8..2a279ad1b85 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31831.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31831.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Team AtomChat AtomChat allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AtomChat: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Team AtomChat AtomChat permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a AtomChat desde n/d hasta la versi\u00f3n 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31832.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31832.json index b05a8cd89e9..3ea4c7a4df7 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31832.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31832.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Beee ACF City Selector allows Retrieve Embedded Sensitive Data. This issue affects ACF City Selector: from n/a through 1.16.0." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n sensible del sistema a una vulnerabilidad de esfera de control no autorizada en Beee ACF City Selector permite recuperar datos sensibles incrustados. Este problema afecta a ACF City Selector desde n/d hasta la versi\u00f3n 1.16.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31833.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31833.json index f6b14c40394..239a5698c1e 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31833.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31833.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in themeglow JobBoard Job listing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JobBoard Job listing: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n mediante clave controlada por el usuario en themeglow JobBoard Job listing permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la lista de trabajos de JobBoard desde n/d hasta la versi\u00f3n 1.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31834.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31834.json index 66418aa6699..eb8ac241985 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31834.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31834.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in themeglow JobBoard Job listing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JobBoard Job listing: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de falta de autorizaci\u00f3n en themeglow JobBoard Job listing permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la lista de trabajos de JobBoard desde n/d hasta la versi\u00f3n 1.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31835.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31835.json index 31961f8c65e..2fee10e05e0 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31835.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31835.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brice Capobianco WP Plugin Info Card allows DOM-Based XSS. This issue affects WP Plugin Info Card: from n/a through 5.2.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Brice Capobianco WP Plugin Info Card permite XSS basado en DOM. Este problema afecta a la tarjeta de informaci\u00f3n del plugin WP desde n/d hasta la versi\u00f3n 5.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31836.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31836.json index e2a2576ddce..2a87edf3489 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31836.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31836.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in matthewrubin Review Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Review Manager: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en matthewrubin Review Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Administrador de Revisi\u00f3n desde la versi\u00f3n n/d hasta la 2.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31837.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31837.json index 3c45f019c3c..b879821068e 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31837.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31837.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Codeus WP Proposals allows Stored XSS. This issue affects WP Proposals: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Codeus WP Proposals permite XSS almacenado. Este problema afecta a WP Proposals desde n/d hasta la versi\u00f3n 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31838.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31838.json index ff4f77d95a7..598e0a63a2c 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31838.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31838.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eventbee Eventbee RSVP Widget allows DOM-Based XSS. This issue affects Eventbee RSVP Widget: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en eventbee Eventbee RSVP Widget permite XSS basado en DOM. Este problema afecta al widget RSVP de Eventbee desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31839.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31839.json index 6d0a11151a4..c7df4db4b1b 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31839.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31839.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in digireturn DN Footer Contacts allows Cross Site Request Forgery. This issue affects DN Footer Contacts: from n/a through 1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en digireturn DN Footer Contacts permite Cross-Site Request Forgery. Este problema afecta a los contactos de pie de p\u00e1gina de DN desde n/d hasta la versi\u00f3n 1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31840.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31840.json index 1d24a77639f..752e289eb0a 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31840.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31840.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in digireturn Simple Fixed Notice allows Cross Site Request Forgery. This issue affects Simple Fixed Notice: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en digireturn Simple Fixed Notice permite Cross-Site Request Forgery. Este problema afecta a Simple Fixed Notice desde n/d hasta la versi\u00f3n 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31842.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31842.json index 6eda058c4e0..eaa575e71f9 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31842.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31842.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in viralloops Viral Loops WP Integration allows Retrieve Embedded Sensitive Data. This issue affects Viral Loops WP Integration: from n/a through 3.4.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en viralloops Viral Loops WP Integration que permite recuperar datos confidenciales incrustados. Este problema afecta a la integraci\u00f3n de Viral Loops WP desde n/d hasta la versi\u00f3n 3.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31843.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31843.json index 7edcf30e04f..44b20321d2a 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31843.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31843.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Wilson OpenAI Tools for WordPress & WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OpenAI Tools for WordPress & WooCommerce: from n/a through 2.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Wilson OpenAI Tools para WordPress y WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a OpenAI Tools para WordPress y WooCommerce desde la versi\u00f3n n/d hasta la 2.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31844.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31844.json index 6ed1a9790a0..7ae05c58af0 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31844.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31844.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Magical Blocks allows Stored XSS. This issue affects Magical Blocks: from n/a through 1.0.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb) en Noor Alam Magical Blocks permite XSS almacenado. Este problema afecta a Magical Blocks desde n/d hasta la versi\u00f3n 1.0.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31845.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31845.json index 93f61718a9c..29dc5ace4d6 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31845.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31845.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rohit Choudhary Theme Duplicator allows Cross Site Request Forgery. This issue affects Theme Duplicator: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Rohit Choudhary Theme Duplicator permite Cross-Site Request Forgery. Este problema afecta al duplicador de temas desde la versi\u00f3n n/d hasta la 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31846.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31846.json index 247bee38c39..963a25064ad 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31846.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31846.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Jeroen Schmit Theater for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Theater for WordPress: from n/a through 0.18.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Jeroen Schmit Theater para WordPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Theater para WordPress desde la versi\u00f3n n/d hasta la 0.18.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31847.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31847.json index ef52b440595..c3601c9fb09 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31847.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31847.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themelooks mFolio Lite allows DOM-Based XSS. This issue affects mFolio Lite: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en themelooks mFolio Lite permite XSS basado en DOM. Este problema afecta a mFolio Lite desde n/d hasta la versi\u00f3n 1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31848.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31848.json index 58f0dec29af..0753e63c6c7 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31848.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31848.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPFactory WordPress Adverts Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordPress Adverts Plugin: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WPFactory WordPress Adverts Plugin permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al plugin de anuncios de WordPress desde la versi\u00f3n n/d hasta la 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31849.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31849.json index def84a1d4c4..d97bc3d9857 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31849.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31849.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fbtemplates Nemesis All-in-One allows Stored XSS. This issue affects Nemesis All-in-One: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en fbtemplates Nemesis All-in-One permite XSS almacenado. Este problema afecta a Nemesis All-in-One desde n/d hasta la versi\u00f3n 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31850.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31850.json index 52d1a950079..e7f6a5ad6a9 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31850.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31850.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RedefiningTheWeb PDF Generator Addon for Elementor Page Builder allows Stored XSS. This issue affects PDF Generator Addon for Elementor Page Builder: from n/a through 1.7.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RedefiningTheWeb PDF Generator Addon for Elementor Page Builder permite XSS almacenado. Este problema afecta al complemento PDF Generator para Elementor Page Builder desde n/d hasta la versi\u00f3n 1.7.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31851.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31851.json index 7fad8eebf20..f8ebb16eb8d 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31851.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31851.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in markkinchin Beds24 Online Booking allows Stored XSS. This issue affects Beds24 Online Booking: from n/a through 2.0.26." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en markkinchin Beds24 Online Booking permite XSS almacenado. Este problema afecta a Beds24 Online Booking desde n/d hasta la versi\u00f3n 2.0.26." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31852.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31852.json index 3084f22a10e..b28efa49344 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31852.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31852.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in N-Media Bulk Product Sync allows Cross Site Request Forgery. This issue affects Bulk Product Sync: from n/a through 8.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en N-Media Bulk Product Sync permite Cross-Site Request Forgery. Este problema afecta a Bulk Product Sync desde la versi\u00f3n n/d hasta la 8.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31853.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31853.json index d57ec8c3eca..31ca48c24f3 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31853.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31853.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Erez Hadas-Sonnenschein Smartarget Popup allows Stored XSS. This issue affects Smartarget Popup: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Erez Hadas-Sonnenschein Smartarget Popup permite XSS almacenado. Este problema afecta a la ventana emergente Smartarget desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31854.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31854.json index ec6a56c011c..2e882af1449 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31854.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31854.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Sharaz Shahid Simple Sticky Add To Cart For WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple Sticky Add To Cart For WooCommerce: from n/a through 1.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Sharaz Shahid Simple Sticky Add To Cart For WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la funci\u00f3n \"Simple Sticky Add To Cart\" para WooCommerce desde n/d hasta la versi\u00f3n 1.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31855.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31855.json index 8f96dd850b0..e5ff041ad31 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31855.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31855.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in softnwords SMM API allows Stored XSS. This issue affects SMM API: from n/a through 6.0.27." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en softnwords SMM API que permite XSS almacenado. Este problema afecta a la API SMM desde n/d hasta la versi\u00f3n 6.0.27." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31856.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31856.json index dbdbe988bf6..71499060110 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31856.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31856.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in brainvireinfo Export All Post Meta allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Export All Post Meta: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en brainvireinfo Export All Post Meta permite acceder a funciones no restringidas correctamente por las ACL. Este problema afecta a la exportaci\u00f3n de metadatos de publicaciones desde n/d hasta la versi\u00f3n 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31857.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31857.json index 9217f02bdb6..6102f50b37e 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31857.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31857.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWax Directorist AddonsKit for Elementor allows Stored XSS. This issue affects Directorist AddonsKit for Elementor: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpWax Directorist AddonsKit para Elementor permite XSS almacenado. Este problema afecta a Directorist AddonsKit para Elementor desde n/d hasta la versi\u00f3n 1.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31859.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31859.json index 107fb83566f..a50d9fa2820 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31859.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31859.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Feedbucket Feedbucket \u2013 Website Feedback Tool allows Cross Site Request Forgery. This issue affects Feedbucket \u2013 Website Feedback Tool: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Feedbucket Feedbucket \u2013 Website Feedback Tool permite Cross-Site Request Forgery. Este problema afecta a Feedbucket, la herramienta de comentarios de sitios web, desde la versi\u00f3n n/d hasta la 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31860.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31860.json index 2a45aa01cd0..7a5206c9783 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31860.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31860.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPeka WP AdCenter allows Stored XSS. This issue affects WP AdCenter: from n/a through 2.5.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPeka WP AdCenter permite XSS almacenado. Este problema afecta a WP AdCenter desde n/d hasta la versi\u00f3n 2.5.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31861.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31861.json index a43d148fe5c..a1fe80d11c3 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31861.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31861.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPOrbit Support Perfect Font Awesome Integration allows Stored XSS. This issue affects Perfect Font Awesome Integration: from n/a through 2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPOrbit Support Perfect Font Awesome Integration permite XSS almacenado. Este problema afecta a Perfect Font Awesome Integration desde n/d hasta la versi\u00f3n 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31862.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31862.json index 2bcf8da0f00..4e7e5339d94 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31862.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31862.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PickPlugins Job Board Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Job Board Manager: from n/a through 2.1.60." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en PickPlugins Job Board Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Administrador de Bolsa de Trabajo desde la versi\u00f3n n/d hasta la 2.1.60." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31863.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31863.json index 734ccc4a39d..72715f92cea 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31863.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31863.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in inspry Agency Toolkit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Agency Toolkit: from n/a through 1.0.23." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en inspry Agency Toolkit permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Kit de herramientas de la Agencia desde la versi\u00f3n n/d hasta la 1.0.23." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31864.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31864.json index 7e5c658af81..05ab1c777cf 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31864.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31864.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Out the Box Beam me up Scotty \u2013 Back to Top Button allows Stored XSS. This issue affects Beam me up Scotty \u2013 Back to Top Button: from n/a through 1.0.23." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Out the Box Beam me up Scotty \u2013 Back to Top Button permite XSS almacenado. Este problema afecta a Beam me up Scotty \u2013 Bot\u00f3n Volver arriba: desde n/d hasta la versi\u00f3n 1.0.23." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31865.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31865.json index cae65e04a64..232c9702328 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31865.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31865.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in CartBoss SMS Abandoned Cart Recovery \u2726 CartBoss allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SMS Abandoned Cart Recovery \u2726 CartBoss: from n/a through 4.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en CartBoss SMS Abandoned Cart Recovery ? CartBoss permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a CartBoss SMS Abandoned Cart Recovery ? desde n/d hasta la versi\u00f3n 4.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31866.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31866.json index 2418addbb23..2866bb3149b 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31866.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31866.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Ship Depot ShipDepot for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ShipDepot for WooCommerce: from n/a through 1.2.19." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Ship Depot ShipDepot for WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ship Depot para WooCommerce desde la versi\u00f3n n/d hasta la 1.2.19." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31867.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31867.json index 2f771c93949..45a8d7fa299 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31867.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31867.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n mediante clave controlada por el usuario en JoomSky JS Job Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Administrador de tareas JS desde la versi\u00f3n n/d hasta la 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31868.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31868.json index 4dfec6c58a2..d8194af1ccd 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31868.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en JoomSky JS Job Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Administrador de tareas JS desde la versi\u00f3n n/d hasta la 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31869.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31869.json index 81812a59beb..d905cf31dc1 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31869.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31869.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows Stored XSS. This issue affects Black Widgets For Elementor: from n/a through 1.3.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Modernaweb Studio Black Widgets For Elementor permite XSS almacenado. Este problema afecta a Black Widgets para Elementor desde la versi\u00f3n n/d hasta la 1.3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31870.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31870.json index ae1ba0738c9..4e77c321be8 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31870.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31870.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in EXEIdeas International WP AutoKeyword allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP AutoKeyword: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en EXEIdeas International WP AutoKeyword permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP AutoKeyword desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31871.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31871.json index 517f68d343f..477fac5989d 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31871.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31871.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type allows Phishing. This issue affects WP Clone any post type: from n/a through 3.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a sitios no confiables ('Open Redirect') en Galaxy Weblinks WP Clone any post type permite el phishing. Este problema afecta a WP Clone desde la versi\u00f3n n/d hasta la 3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31872.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31872.json index c713197e5c9..2396626e5d0 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31872.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31872.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Galaxy Weblinks WP Clone any post type allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Clone any post type: from n/a through 3.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Galaxy Weblinks WP Clone any post type permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Clone desde la versi\u00f3n n/d hasta la 3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31873.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31873.json index a2a9f52fb14..45a95e06bfb 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31873.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31873.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sheetdb SheetDB allows Stored XSS. This issue affects SheetDB: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en sheetdb SheetDB permite XSS almacenado. Este problema afecta a SheetDB desde la versi\u00f3n n/d hasta la 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31874.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31874.json index 61e8061766a..b92126e295a 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31874.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31874.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay WebberZone Snippetz allows Stored XSS. This issue affects WebberZone Snippetz: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ajay WebberZone Snippetz permite XSS almacenado. Este problema afecta a WebberZone Snippetz desde n/d hasta la versi\u00f3n 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31875.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31875.json index 8bc028859ce..e8a8d45c6d0 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31875.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31875.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluginic FancyPost allows DOM-Based XSS. This issue affects FancyPost: from n/a through 6.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pluginic FancyPost permite XSS basado en DOM. Este problema afecta a FancyPost desde la versi\u00f3n n/d hasta la 6.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31877.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31877.json index ed4f4a0b029..c2468555f17 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31877.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31877.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Magnigenie RestroPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects RestroPress: from n/a through 3.1.8.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Magnigenie RestroPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a RestroPress desde la versi\u00f3n n/d hasta la 3.1.8.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31878.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31878.json index 04d82099c5b..9756e922a85 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31878.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31878.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Dmitry V. (CEO of \"UKR Solution\") UPC/EAN/GTIN Code Generator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects UPC/EAN/GTIN Code Generator: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Dmitry V. (CEO of \"UKR Solution\") UPC/EAN/GTIN Code Generator permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al generador de c\u00f3digos UPC/EAN/GTIN desde n/d hasta la versi\u00f3n 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31879.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31879.json index b11d6e354ad..977c89fa695 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31879.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31879.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Dmitry V. (CEO of \"UKR Solution\") Barcode Generator for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Dmitry V. (CEO of \"UKR Solution\") Barcode Generator for WooCommerce permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al generador de c\u00f3digos de barras para WooCommerce desde la versi\u00f3n n/d hasta la 2.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31880.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31880.json index 9bc60b7369c..da85ccf91c8 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31880.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31880.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stylemix Pearl allows Cross Site Request Forgery. This issue affects Pearl: from n/a through 1.3.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Stylemix Pearl permite Cross-Site Request Forgery. Este problema afecta a Pearl desde la versi\u00f3n n/d hasta la 1.3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31881.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31881.json index e8a95c04972..9cfa1142d9e 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31881.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31881.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Stylemix Pearl allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Pearl: from n/a through 1.3.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Stylemix Pearl permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Pearl desde la versi\u00f3n n/d hasta la 1.3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31882.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31882.json index f1d38a50e1e..0d47ff12cf7 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31882.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31882.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WPWebinarSystem WebinarPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WebinarPress desde n/d hasta la versi\u00f3n 1.33.27." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31883.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31883.json index f5792d25369..1d3bd78d202 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31883.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31883.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPWebinarSystem WebinarPress allows Stored XSS. This issue affects WebinarPress: from n/a through 1.33.27." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPWebinarSystem WebinarPress permite XSS almacenado. Este problema afecta a WebinarPress desde n/d hasta la versi\u00f3n 1.33.27." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31884.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31884.json index dc0f92929ba..b595eb8c728 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31884.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31884.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP CMS Ninja Norse Rune Oracle Plugin allows Stored XSS. This issue affects Norse Rune Oracle Plugin: from n/a through 1.4.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP CMS Ninja Norse Rune Oracle Plugin permite XSS almacenado. Este problema afecta al plugin de Oracle Norse Rune desde la versi\u00f3n n/d hasta la 1.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31885.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31885.json index 768bea0139f..088800cb090 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31885.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31885.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Floeter Hyperlink Group Block allows DOM-Based XSS. This issue affects Hyperlink Group Block: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Daniel Floeter Hyperlink Group Block permite XSS basado en DOM. Este problema afecta al bloque de grupo de hiperv\u00ednculos desde n/d hasta la versi\u00f3n 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31886.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31886.json index 36b063fddae..85f9099db7c 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31886.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31886.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Repuso Social proof testimonials and reviews by Repuso allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Social proof testimonials and reviews by Repuso: from n/a through 5.21." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Repuso Social proof testimonials and reviews by Repuso permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los testimonios y rese\u00f1as de Repuso sobre la prueba social desde la versi\u00f3n n/d hasta la versi\u00f3n 5.21." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31887.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31887.json index c1c5d1db4d3..3c37824c6e5 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31887.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in zookatron MyBookProgress by Stormhill Media allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MyBookProgress by Stormhill Media: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en zookatron MyBookProgress de Stormhill Media permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a MyBookProgress de Stormhill Media desde n/d hasta la versi\u00f3n 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31888.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31888.json index 384482b39ed..dbf27ecc4a2 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31888.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPExperts.io WP Multistore Locator allows Cross Site Request Forgery. This issue affects WP Multistore Locator: from n/a through 2.5.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPExperts.io. WP Multistore Locator permite Cross-Site Request Forgery. Este problema afecta a WP Multistore Locator desde n/d hasta la versi\u00f3n 2.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31890.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31890.json index 102b93d864a..c0d67697437 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31890.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31890.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mashi Simple Map No Api allows Stored XSS. This issue affects Simple Map No Api: from n/a through 1.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mashi Simple Map No Api permite XSS almacenado. Este problema afecta a Simple Map No Api desde n/d hasta la versi\u00f3n 1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31891.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31891.json index 0482a66c93f..c21bbef77a4 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31891.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31891.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gosign Gosign \u2013 Posts Slider Block allows Stored XSS. This issue affects Gosign \u2013 Posts Slider Block: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gosign Gosign \u2013 Posts Slider Block permite XSS almacenado. Este problema afecta a Gosign desde la versi\u00f3n n/d hasta la 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31892.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31892.json index 576f00fb1fe..97797551d4b 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31892.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31892.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum WP Crowdfunding allows Stored XSS. This issue affects WP Crowdfunding: from n/a through 2.1.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themeum WP Crowdfunding permite XSS almacenado. Este problema afecta a WP Crowdfunding desde n/d hasta la versi\u00f3n 2.1.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31894.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31894.json index b00c488a78e..53b49a65d4f 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31894.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31894.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infoway LLC Ebook Downloader allows Stored XSS. This issue affects Ebook Downloader: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Infoway LLC Ebook Downloader permite XSS almacenado. Este problema afecta al descargador de libros electr\u00f3nicos desde n/d hasta la versi\u00f3n 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31895.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31895.json index d13a4240820..975534eede5 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31895.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31895.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in paulrosen ABC Notation allows Stored XSS. This issue affects ABC Notation: from n/a through 6.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb) en paulrosen ABC Notation permite XSS almacenado. Este problema afecta a la notaci\u00f3n ABC desde n/d hasta la versi\u00f3n 6.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-318xx/CVE-2025-31897.json b/CVE-2025/CVE-2025-318xx/CVE-2025-31897.json index 1470b2bf74e..99c8c44dc14 100644 --- a/CVE-2025/CVE-2025-318xx/CVE-2025-31897.json +++ b/CVE-2025/CVE-2025-318xx/CVE-2025-31897.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arrow Plugins Arrow Custom Feed for Twitter allows Stored XSS. This issue affects Arrow Custom Feed for Twitter: from n/a through 1.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Arrow Plugins Arrow Custom Feed for Twitter permite XSS almacenado. Este problema afecta al feed personalizado de Arrow para Twitter desde n/d hasta la versi\u00f3n 1.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31904.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31904.json index e23bb3ffdc0..24ff60fc0fa 100644 --- a/CVE-2025/CVE-2025-319xx/CVE-2025-31904.json +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31904.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Infoway LLC Ebook Downloader allows Cross Site Request Forgery. This issue affects Ebook Downloader: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Infoway LLC Ebook Downloader permite Cross-Site Request Forgery. Este problema afecta al descargador de libros electr\u00f3nicos desde la versi\u00f3n n/d hasta la 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31906.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31906.json index 82e641a7e61..250a2d2ff8c 100644 --- a/CVE-2025/CVE-2025-319xx/CVE-2025-31906.json +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31906.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ProfitShare.ro WP Profitshare allows Stored XSS. This issue affects WP Profitshare: from n/a through 1.4.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en ProfitShare.ro. WP Profitshare permite XSS almacenado. Este problema afecta a WP Profitshare desde n/d hasta la versi\u00f3n 1.4.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31908.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31908.json index a7334730246..8c137cc0a57 100644 --- a/CVE-2025/CVE-2025-319xx/CVE-2025-31908.json +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup allows Stored XSS. This issue affects JSON Structuring Markup: from n/a through 0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sami Ahmed Siddiqui JSON Structuring Markup permite XSS almacenado. Este problema afecta al marcado de estructuraci\u00f3n JSON desde n/d hasta la versi\u00f3n 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31910.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31910.json index e6375de0c3b..ba67e78c6af 100644 --- a/CVE-2025/CVE-2025-319xx/CVE-2025-31910.json +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in reputeinfosystems BookingPress allows SQL Injection. This issue affects BookingPress: from n/a through 1.1.28." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en reputeinfosystems BookingPress permite la inyecci\u00f3n SQL. Este problema afecta a BookingPress desde n/d hasta la versi\u00f3n 1.1.28." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json index 740aee83b1b..b27241e12e7 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Code Execution via Malicious Files:\u00a0Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\n\nSandbox Bypass Vulnerability:\u00a0A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls." + }, + { + "lang": "es", + "value": "Ejecuci\u00f3n de c\u00f3digo mediante archivos maliciosos: Los atacantes pueden crear archivos especialmente manipulados con c\u00f3digo incrustado que puede ejecutarse sin la validaci\u00f3n de seguridad adecuada, lo que podr\u00eda comprometer el sistema. Vulnerabilidad de elusi\u00f3n de la zona de pruebas: Una falla en el mecanismo de seguridad TERR permite a los atacantes eludir las restricciones de la zona de pruebas, lo que permite la ejecuci\u00f3n de c\u00f3digo no confiable sin los controles adecuados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json index 6d44eae80e0..361656b7a60 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution" + }, + { + "lang": "es", + "value": "Vulnerabilidades de inyecci\u00f3n: Los atacantes pueden inyectar c\u00f3digo malicioso, lo que podr\u00eda permitirle controlar el sistema que ejecuta estas funciones. Adem\u00e1s, una validaci\u00f3n insuficiente de los nombres de archivo durante la carga puede permitir que los atacantes carguen y ejecuten archivos maliciosos, lo que provoca la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3123.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3123.json index 99027026a86..66f89fce1cc 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3123.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3123.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-02T23:15:17.360", "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json index 760a4bf5e9e..62a6792acb6 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal ECA: Event - Condition - Action allows Cross Site Request Forgery.This issue affects ECA: Event - Condition - Action: from 0.0.0 before 1.1.12, from 2.0.0 before 2.0.16, from 2.1.0 before 2.1.7, from 0.0.0 before 1.2.*." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Drupal ECA: Event - Condition - Action permite Cross-Site Request Forgery. Este problema afecta a ECA: Evento - Condici\u00f3n - Acci\u00f3n: desde 0.0.0 antes de 1.1.12, desde 2.0.0 antes de 2.0.16, desde 2.1.0 antes de 2.1.7, desde 0.0.0 antes de 1.2.*." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json index 2911c271a84..8d9481fc14a 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Identity Web is a library which contains a set of reusable classes used in conjunction with ASP.NET Core for integrating with the Microsoft identity platform (formerly Azure AD v2.0 endpoint) and AAD B2C. This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely. Service logs generated at the information level or credential descriptions containing local file paths with passwords, Base64 encoded values, or Client secret. Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status. To mitigate this vulnerability, update to Microsoft.Identity.Web 3.8.2 or Microsoft.Identity.Abstractions 9.0.0." + }, + { + "lang": "es", + "value": "Microsoft Identity Web es una librer\u00eda que contiene un conjunto de clases reutilizables que se utilizan junto con ASP.NET Core para la integraci\u00f3n con la plataforma de identidad de Microsoft (anteriormente, endpoint de Azure AD v2.0) y AAD B2C. Esta vulnerabilidad afecta a aplicaciones cliente confidenciales, como daemons, aplicaciones web y API web. En circunstancias espec\u00edficas, informaci\u00f3n confidencial, como secretos de cliente o detalles de certificados, puede quedar expuesta en los registros de servicio de estas aplicaciones. Los registros de servicio est\u00e1n dise\u00f1ados para gestionarse de forma segura. Los registros de servicio generados a nivel de informaci\u00f3n o descripciones de credenciales contienen rutas de archivos locales con contrase\u00f1as, valores codificados en Base64 o secretos de cliente. Adem\u00e1s, los registros de servicios que utilizan certificados codificados en Base64 o rutas de certificados con descripciones de credenciales de contrase\u00f1a tambi\u00e9n se ven afectados si los certificados no son v\u00e1lidos o han caducado, independientemente del nivel de registro. Tenga en cuenta que estas credenciales no se pueden utilizar debido a su estado no v\u00e1lido o caducado. Para mitigar esta vulnerabilidad, actualice a Microsoft.Identity.Web 3.8.2 o Microsoft.Identity.Abstractions 9.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json index 7ee5cd6daad..5ecbd59d57f 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cursor is a code editor built for programming with AI. In versions 0.45.0 through 0.48.6, the Cursor app introduced a regression affecting the set of file paths the Cursor Agent is permitted to modify automatically. Under specific conditions, the agent could be prompted, either directly by the user or via maliciously crafted context, to automatically write to files outside of the opened workspace. This behavior required deliberate prompting, making successful exploitation highly impractical in real-world scenarios. Furthermore, the edited file was still displayed in the UI as usual for user review, making it unlikely for the edit to go unnoticed by the user. This vulnerability is fixed in 0.48.7." + }, + { + "lang": "es", + "value": "Cursor es un editor de c\u00f3digo dise\u00f1ado para programar con IA. En las versiones 0.45.0 a 0.48.6, la aplicaci\u00f3n Cursor introdujo una regresi\u00f3n que afectaba al conjunto de rutas de archivo que el Agente Cursor pod\u00eda modificar autom\u00e1ticamente. En determinadas circunstancias, el agente pod\u00eda ser inducido, ya sea directamente por el usuario o mediante un contexto malicioso, a escribir autom\u00e1ticamente en archivos fuera del espacio de trabajo abierto. Este comportamiento requer\u00eda una incitaci\u00f3n deliberada, lo que hac\u00eda muy impracticable su explotaci\u00f3n en situaciones reales. Adem\u00e1s, el archivo editado segu\u00eda mostr\u00e1ndose en la interfaz de usuario como de costumbre para su revisi\u00f3n por parte del usuario, lo que imped\u00eda que la edici\u00f3n pasara desapercibida. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.48.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json index a724936e951..adca6be0542 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The crud-query-parser library parses query parameters from HTTP requests and converts them to database queries. Improper neutralization of the order/sort parameter in the TypeORM adapter, which allows SQL injection. You are impacted by this vulnerability if you are using the TypeORM adapter, ordering is enabled and you have not set-up a property filter. This vulnerability is fixed in 0.1.0." + }, + { + "lang": "es", + "value": "La librer\u00eda crud-query-parser analiza los par\u00e1metros de consulta de las solicitudes HTTP y los convierte en consultas de base de datos. Se ha producido una neutralizaci\u00f3n incorrecta del par\u00e1metro order/sort en el adaptador TypeORM, lo que permite la inyecci\u00f3n de SQL. Esta vulnerabilidad afecta a quienes utilizan el adaptador TypeORM, tienen la ordenaci\u00f3n habilitada y no han configurado un filtro de propiedades. Esta vulnerabilidad se ha corregido en la versi\u00f3n 0.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json index edd1f8ed2c1..9aebbe8e26e 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. The EXIF data format allows for defining excessively large data structures in relatively small payloads. Before v0.10.0, If you didn't trust the input images, this could be abused to construct denial-of-service attacks. v0.10.0 added LimitNumTags (default 5000) and LimitTagSize (default 10000) options." + }, + { + "lang": "es", + "value": "bep/imagemeta es una librer\u00eda de Go para leer metadatos de im\u00e1genes EXIF, IPTC y XMP de archivos JPEG, TIFF, PNG y WebP. El formato de datos EXIF permite definir estructuras de datos excesivamente grandes en payloads relativamente peque\u00f1os. Antes de la versi\u00f3n v0.10.0, si no se confiaba en las im\u00e1genes de entrada, esto pod\u00eda utilizarse para crear ataques de denegaci\u00f3n de servicio. La versi\u00f3n v0.10.0 a\u00f1adi\u00f3 las opciones LimitNumTags (5000 por defecto) y LimitTagSize (10000 por defecto)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json index e1a23296b4b..d6c17182ae4 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. The buffer created for parsing metadata for PNG and WebP images was only bounded by their input data type, which could lead to potentially large memory allocation, and unreasonably high for image metadata. Before v0.11.0, If you didn't trust the input images, this could be abused to construct denial-of-service attacks. v0.11.0 added a 10 MB upper limit." + }, + { + "lang": "es", + "value": "bep/imagemeta es una librer\u00eda de Go para leer metadatos de im\u00e1genes EXIF, IPTC y XMP de archivos JPEG, TIFF, PNG y WebP. El b\u00fafer creado para analizar metadatos de im\u00e1genes PNG y WebP solo estaba limitado por su tipo de dato de entrada, lo que pod\u00eda generar una gran asignaci\u00f3n de memoria y un consumo excesivo de metadatos de imagen. Antes de la versi\u00f3n v0.11.0, si no se confiaba en las im\u00e1genes de entrada, esto pod\u00eda utilizarse para realizar ataques de denegaci\u00f3n de servicio. La versi\u00f3n v0.11.0 a\u00f1adi\u00f3 un l\u00edmite superior de 10 MB." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json index 5dac6d5e62b..6b336d9a2b0 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Element Web is a Matrix web client built using the Matrix React SDK. Element Web, starting from version 1.11.16 up to version 1.11.96, can be configured to load Element Call from an external URL. Under certain conditions, the external page is able to get access to the media encryption keys used for an Element Call call. Version 1.11.97 fixes the problem." + }, + { + "lang": "es", + "value": "Element Web es un cliente web de Matrix desarrollado con el SDK de Matrix React. Element Web, desde la versi\u00f3n 1.11.16 hasta la 1.11.96, puede configurarse para cargar una llamada de Element desde una URL externa. En ciertas circunstancias, la p\u00e1gina externa puede acceder a las claves de cifrado de medios utilizadas para una llamada de Element. La versi\u00f3n 1.11.97 soluciona este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json index 59d09a9236d..a53c998d1e9 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a \u2019save\u2019 function in \u2019HAXCMSFile.php\u2019. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks \u2019.php\u2019, \u2019.sh\u2019, \u2019.js\u2019, and \u2019.css\u2019 files. The existing logic causes the system to \"fail open\" rather than \"fail closed.\" This vulnerability is fixed in 10.0.3." + }, + { + "lang": "es", + "value": "HAX CMS PHP le permite gestionar su universo de micrositios con un backend PHP. Varias funciones de carga de archivos dentro de la aplicaci\u00f3n HAX CMS PHP llaman a una funci\u00f3n de \"guardar\" en \"HAXCMSFile.php\". Esta funci\u00f3n de \"guardar\" utiliza una lista de denegados para impedir que se carguen al servidor tipos espec\u00edficos de archivo. Esta lista no es exhaustiva y solo bloquea los archivos \".php\", \".sh\", \".js\" y \".css\". La l\u00f3gica existente provoca que el sistema \"fallo abrir\" en lugar de \"fallo cerrar\". Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 10.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json index b2adf129bc3..92dfe461d46 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS. This issue affects Widgetize Pages Light: from n/a through 3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OTWthemes Widgetize Pages Light permite XSS reflejado. Este problema afecta a Widgetize Pages Light desde n/d hasta la versi\u00f3n 3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json index 4b12dfb0543..53c7a6fa6f6 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in maennchen1.de m1.DownloadList. This issue affects m1.DownloadList: from n/a through 0.21." + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n sensible del sistema a una esfera de control no autorizada en maennchen1.de m1.DownloadList. Este problema afecta a m1.DownloadList desde la versi\u00f3n n/d hasta la 0.21." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json index 56c01c61228..d1ee40ef916 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Broadstreet Broadstreet allows Stored XSS. This issue affects Broadstreet: from n/a through 1.51.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Broadstreet Broadstreet permite XSS almacenado. Este problema afecta a Broadstreet desde n/d hasta la versi\u00f3n 1.51.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32275.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32275.json index 7e0a3dc989d..265c0d836ab 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32275.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32275.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-10T08:15:20.847", "lastModified": "2025-04-11T15:39:52.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json index 1e4232002e3..0b16f95d0ad 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Shahjada Live Forms. This issue affects Live Forms: from n/a through 4.8.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Shahjada Live Forms. Este problema afecta a Live Forms desde n/d hasta la versi\u00f3n 4.8.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json index 88f8166ef83..5d88cd89047 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A url could be crafted to the DNN ImageHandler to render text from a querystring parameter. This text would display in the resulting image and a user that trusts the domain might think that the information is legitimate. This vulnerability is fixed in 9.13.4." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. Se pod\u00eda manipular una URL para el ImageHandler de DNN para representar el texto de un par\u00e1metro de cadena de consulta. Este texto se mostrar\u00eda en la imagen resultante y un usuario que confiara en el dominio podr\u00eda pensar que la informaci\u00f3n es leg\u00edtima. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json index 15f1449d419..2cf5a9e5415 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A bypass has been identified for the previously known vulnerability CVE-2017-0929, allowing unauthenticated attackers to execute arbitrary GET requests against target systems, including internal or adjacent networks. This vulnerability facilitates a semi-blind SSRF attack, allowing attackers to make the target server send requests to internal or external URLs without viewing the full responses. Potential impacts include internal network reconnaissance, bypassing firewalls. This vulnerability is fixed in 9.13.8." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. Se ha identificado una evasi\u00f3n para la vulnerabilidad CVE-2017-0929, previamente conocida, que permite a atacantes no autenticados ejecutar solicitudes GET arbitrarias contra los sistemas objetivo, incluyendo redes internas o adyacentes. Esta vulnerabilidad facilita un ataque SSRF semiciego, que permite a los atacantes hacer que el servidor objetivo env\u00ede solicitudes a URL internas o externas sin ver las respuestas completas. Los posibles impactos incluyen el reconocimiento de la red interna y la evasi\u00f3n de firewalls. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json index 3405e792eb6..cd5ba22eee8 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In limited configurations, registered users may be able to craft a request to enumerate/access some portal files they should not have access to. This vulnerability is fixed in 9.13.8." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. En configuraciones limitadas, los usuarios registrados podr\u00edan manipular una solicitud para enumerar o acceder a archivos del portal a los que no deber\u00edan tener acceso. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json index 1845f706c0f..90d48a0e6d8 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Possible denial of service with specially crafted information in the public registration form. This vulnerability is fixed in 9.13.8." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. Posible denegaci\u00f3n de servicio con informaci\u00f3n especialmente manipulada en el formulario de registro p\u00fablico. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json index d252f2032a2..675aeb87e6f 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8." + }, + { + "lang": "es", + "value": "BentoML es una librer\u00eda de Python para crear sistemas de servicios en l\u00ednea optimizados para aplicaciones de IA e inferencia de modelos. Antes de la versi\u00f3n 1.4.8, exist\u00eda una deserializaci\u00f3n insegura en el servidor de ejecuci\u00f3n de BentoML. Al configurar encabezados y par\u00e1metros espec\u00edficos en la solicitud POST, es posible ejecutar cualquier c\u00f3digo arbitrario no autorizado en el servidor, lo que permite a los atacantes tener acceso inicial y divulgaci\u00f3n de informaci\u00f3n en el servidor. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.4.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json index e6653dbdc51..8901501f551 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Shopware is an open source e-commerce software platform. Prior to 6.6.10.3 or 6.5.8.17, the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are Newsletter: Double Opt-in set to active, Newsletter: Double opt-in for registered customers set to disabled, and Log-in & sign-up: Double opt-in on sign-up set to disabled. With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to \u201cinstantly active\u201d. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17." + }, + { + "lang": "es", + "value": "Shopware es una plataforma de software de comercio electr\u00f3nico de c\u00f3digo abierto. En versiones anteriores a la 6.6.10.3 o la 6.5.8.17, la configuraci\u00f3n predeterminada del doble opt-in permit\u00eda suscripciones masivas no solicitadas a boletines informativos sin confirmaci\u00f3n. Las configuraciones predeterminadas son: Bolet\u00edn informativo: Doble opt-in activo, Bolet\u00edn informativo: Doble opt-in para clientes registrados deshabilitado, e Iniciar sesi\u00f3n y registrarse: Doble opt-in al registrarse deshabilitado. Con esta configuraci\u00f3n, cualquier persona puede registrar una cuenta en la tienda con cualquier direcci\u00f3n de correo electr\u00f3nico y marcar la casilla en la p\u00e1gina de la cuenta para suscribirse al bolet\u00edn informativo. El destinatario recibir\u00e1 dos correos electr\u00f3nicos confirmando el registro y la suscripci\u00f3n al bolet\u00edn; no es necesario hacer clic en ning\u00fan enlace de confirmaci\u00f3n. En el backend, el destinatario est\u00e1 configurado como \"activo al instante\". Esta vulnerabilidad se corrigi\u00f3 en la 6.6.10.3 o la 6.5.8.17." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json index a3239f3f241..0bdf4efbdba 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Koa is expressive middleware for Node.js using ES2017 async functions. In koa < 2.16.1 and < 3.0.0-alpha.5, passing untrusted user input to ctx.redirect() even after sanitizing it, may execute javascript code on the user who use the app. This issue is patched in 2.16.1 and 3.0.0-alpha.5." + }, + { + "lang": "es", + "value": "Koa es un middleware expresivo para Node.js que utiliza funciones as\u00edncronas de ES2017. En koa anteriores a la 2.16.1 y a la 3.0.0-alpha.5, pasar informaci\u00f3n de usuario no confiable a ctx.redirect(), incluso despu\u00e9s de depurarla, puede ejecutar c\u00f3digo JavaScript en el usuario que usa la aplicaci\u00f3n. Este problema se ha corregido en las versiones 2.16.1 y 3.0.0-alpha.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json index 64f3862ef98..15c2d1dc136 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1." + }, + { + "lang": "es", + "value": "Apollo Router Core es un enrutador gr\u00e1fico configurable y de alto rendimiento, escrito en Rust, para ejecutar un supergrafo federado que utiliza Apollo Federation 2. Una vulnerabilidad en el uso del compilador Apollo por parte del enrutador Apollo provoc\u00f3 que la validaci\u00f3n de consultas con fragmentos con nombre profundamente anidados y reutilizados fuera prohibitivamente costosa. Esto podr\u00eda provocar un consumo excesivo de recursos y denegaci\u00f3n de servicio. El uso del compilador Apollo por parte del enrutador Apollo se ha actualizado para que la l\u00f3gica de validaci\u00f3n procese cada fragmento con nombre solo una vez, evitando as\u00ed la navegaci\u00f3n redundante. Esto se ha solucionado en las versiones 1.61.2 y 2.1.1 de apollo-router." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json index 8ab73b54121..3f5ecc70677 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "XGrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to 0.1.18, Xgrammar includes a cache for compiled grammars to increase performance with repeated use of the same grammar. This cache is held in memory. Since the cache is unbounded, a system making use of xgrammar can be abused to fill up a host's memory and case a denial of service. For example, sending many small requests to an LLM inference server with unique JSON schemas would eventually cause this denial of service to occur. This vulnerability is fixed in 0.1.18." + }, + { + "lang": "es", + "value": "XGrammar es una librer\u00eda de c\u00f3digo abierto para la generaci\u00f3n estructurada eficiente, flexible y port\u00e1til. Antes de la versi\u00f3n 0.1.18, Xgrammar inclu\u00eda una cach\u00e9 para gram\u00e1ticas compiladas que mejoraba el rendimiento con el uso repetido de la misma gram\u00e1tica. Esta cach\u00e9 se almacena en memoria. Dado que la cach\u00e9 es ilimitada, un sistema que utiliza xgrammar puede ser utilizado de forma abusiva para saturar la memoria del host y provocar una denegaci\u00f3n de servicio. Por ejemplo, enviar muchas solicitudes peque\u00f1as a un servidor de inferencia LLM con esquemas JSON \u00fanicos podr\u00eda provocar esta denegaci\u00f3n de servicio. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.1.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json index 59075ac1d69..38b90577e77 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An XXE issue in the Director NBR component in NAKIVO Backup & Replication 10.3.x through 11.0.1 before 11.0.2 allows remote attackers fetch and parse the XML response." + }, + { + "lang": "es", + "value": "Un problema XXE en el componente Director NBR en NAKIVO Backup & Replication 10.3.x a 11.0.1 antes de 11.0.2 permite a atacantes remotos obtener y analizar la respuesta XML." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json index 55ac6ff7cfd..5542bff11a7 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in blueinstyle Advanced Tag Lists allows Stored XSS. This issue affects Advanced Tag Lists: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en blueinstyle Advanced Tag Lists permite XSS almacenado. Este problema afecta a las listas de etiquetas avanzadas desde n/d hasta la versi\u00f3n 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json index 4048d74dbd8..e9a85bf0109 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu allows Stored XSS. This issue affects WP-Easy Menu: from n/a through 0.41." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Jordi Salord WP-Easy Menu permite XSS almacenado. Este problema afecta a WP-Easy Menu desde n/d hasta la versi\u00f3n 0.41." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json index d3dfa2c155c..751a54a31d8 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mario Aguiar WP SexyLightBox allows Stored XSS. This issue affects WP SexyLightBox: from n/a through 0.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mario Aguiar WP SexyLightBox que permite XSS almacenado. Este problema afecta a WP SexyLightBox desde n/d hasta la versi\u00f3n 0.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json index 776b5c55fc8..0e9daa29307 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ab-tools Flags Widget allows Stored XSS. This issue affects Flags Widget: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ab-tools Flags Widget permite XSS almacenado. Este problema afecta al widget de indicadores desde la versi\u00f3n n/d hasta la 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json index 88a9ff1f885..cf356409063 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in dalziel Windows Live Writer allows Stored XSS. This issue affects Windows Live Writer: from n/a through 0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en dalziel Windows Live Writer permite XSS almacenado. Este problema afecta a Windows Live Writer desde la versi\u00f3n n/d hasta la 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json index bce029e8018..08097c4c0ac 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ninotheme Nino Social Connect allows Stored XSS. This issue affects Nino Social Connect: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ninotheme Nino Social Connect permite XSS almacenado. Este problema afecta a Nino Social Connect desde n/d hasta la versi\u00f3n 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json index 8d43b41b23e..bbad2fce5a9 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in quanganhdo Custom Smilies allows Stored XSS. This issue affects Custom Smilies: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en quanganhdo Custom Smilies permite XSS almacenado. Este problema afecta a los emoticonos personalizados desde n/d hasta la versi\u00f3n 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json index 172ed244b30..0c32e295d94 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Salisbury Request Call Back allows Stored XSS. This issue affects Request Call Back: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u00abCross-site Scripting\u00bb) en Scott Salisbury Request Call Back permite XSS almacenado. Este problema afecta a la devoluci\u00f3n de llamada de solicitud desde n/d hasta la versi\u00f3n 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json index c31fe9865ce..2235b85f1fc 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mathieu Chartier WP-Planification allows Stored XSS. This issue affects WP-Planification: from n/a through 2.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mathieu Chartier WP-Planification permite XSS almacenado. Este problema afecta a WP-Planification desde n/d hasta la versi\u00f3n 2.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json index d414ab355db..d9a82337003 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Bjoern WP Performance Pack allows Cross Site Request Forgery. This issue affects WP Performance Pack: from n/a through 2.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Bjoern WP Performance Pack permite Cross-Site Request Forgery. Este problema afecta a WP Performance Pack desde n/d hasta la versi\u00f3n 2.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json index 3ef289df178..3981673b967 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Joe Waymark allows Server Side Request Forgery. This issue affects Waymark: from n/a through 1.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Joe Waymark permite Server-Side Request Forgery. Este problema afecta a Waymark desde n/d hasta la versi\u00f3n 1.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json index fd1ee4b975a..98918b20adc 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \u0622\u0631\u06cc\u0627 \u0648\u0631\u062f\u067e\u0631\u0633 Aria Font allows Stored XSS. This issue affects Aria Font: from n/a through 1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ???? ?????? Aria Font permite XSS almacenado. Este problema afecta a Aria Font desde n/d hasta la versi\u00f3n 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json index 5ea703bb142..dc3dfa4c9f5 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tim Wetterwarner allows Stored XSS. This issue affects Wetterwarner: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tim Wetterwarner permite XSS almacenado. Este problema afecta a Wetterwarner desde n/d hasta la versi\u00f3n 2.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json index 1b44f92c695..dee6b121126 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eliot Akira Admin Menu Post List allows Stored XSS. This issue affects Admin Menu Post List: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eliot Akira Admin Menu Post List permite XSS almacenado. Este problema afecta a la lista de publicaciones del men\u00fa de administraci\u00f3n desde n/d hasta la versi\u00f3n 2.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json index 65de8f7f1ce..26ed1cafe2e 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VibeThemes BP Social Connect allows Stored XSS. This issue affects BP Social Connect: from n/a through 1.6.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en VibeThemes BP Social Connect permite XSS almacenado. Este problema afecta a BP Social Connect desde n/d hasta la versi\u00f3n 1.6.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json index bdc69f57018..8a91340cb59 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack allows Cross Site Request Forgery. This issue affects reCAPTCHA Jetpack: from n/a through 0.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en bozdoz reCAPTCHA Jetpack permite Cross-Site Request Forgery. Este problema afecta a reCAPTCHA Jetpack desde n/d hasta la versi\u00f3n 0.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json index bd1c0c000ed..bde4e4e0b24 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Waymark allows Stored XSS. This issue affects Waymark: from n/a through 1.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Joe Waymark permite XSS almacenado. Este problema afecta a Waymark desde n/d hasta la versi\u00f3n 1.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json index 3b169cd8b6c..4aa5d9eb124 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Uncodethemes Ultra Demo Importer allows Upload a Web Shell to a Web Server. This issue affects Ultra Demo Importer: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en Uncodethemes Ultra Demo Importer permite subir un shell web a un servidor web. Este problema afecta al importador de demostraci\u00f3n Ultra desde la versi\u00f3n n/d hasta la 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json index e1080fd7dd5..baebc8adb1f 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in squiter Spoiler Block allows Stored XSS. This issue affects Spoiler Block: from n/a through 1.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en squiter Spoiler Block permite XSS almacenado. Este problema afecta al bloque Spoiler desde n/d hasta la versi\u00f3n 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json index 976ca98f922..662d119e214 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in oleglark VKontakte Cross-Post allows Stored XSS. This issue affects VKontakte Cross-Post: from n/a through 0.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en oleglark VKontakte Cross-Post permite XSS almacenado. Este problema afecta a VKontakte Cross-Post desde n/d hasta la versi\u00f3n 0.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json index bf34f2ae55e..30d6834e420 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpWax Logo Showcase Ultimate allows PHP Local File Inclusion. This issue affects Logo Showcase Ultimate: from n/a through 1.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para declaraciones Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos PHP') en wpWax Logo Showcase Ultimate permite la inclusi\u00f3n local de archivos en PHP. Este problema afecta a Logo Showcase Ultimate desde n/d hasta la versi\u00f3n 1.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json index dee9e7d0c1c..bce45f92b5d 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sudavar Codescar Radio Widget allows Stored XSS. This issue affects Codescar Radio Widget: from n/a through 0.4.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sudavar Codescar Radio Widget permite XSS almacenado. Este problema afecta al widget de radio Codescar desde n/d hasta la versi\u00f3n 0.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json index 7ce8a1983a5..c31eba8ae73 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in dimafreund RentSyst allows Stored XSS. This issue affects RentSyst: from n/a through 2.0.72." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en dimafreund RentSyst permite XSS almacenado. Este problema afecta a RentSyst desde n/d hasta la versi\u00f3n 2.0.72." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json index 1ef24d2f3d2..7c1cac1c84e 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in lemmentwickler ePaper Lister for Yumpu allows Stored XSS. This issue affects ePaper Lister for Yumpu: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en lemmentwickler ePaper Lister for Yumpu permite XSS almacenado. Este problema afecta a ePaper Lister para Yumpu desde n/d hasta la versi\u00f3n 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json index 0bece907e61..3959a7e4404 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jose Conti Link Shield allows Stored XSS. This issue affects Link Shield: from n/a through 0.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jose Conti Link Shield permite XSS almacenado. Este problema afecta a Link Shield desde n/d hasta la versi\u00f3n 0.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json index 38e87957cff..5f662f1c158 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in SCAND MultiMailer allows Stored XSS. This issue affects MultiMailer: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en SCAND MultiMailer permite XSS almacenado. Este problema afecta a MultiMailer desde n/d hasta la versi\u00f3n 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json index 4d969f30647..581a00631f9 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in hossainawlad ALD Login Page allows Stored XSS. This issue affects ALD Login Page: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en hossainawlad ALD Login Page permite XSS almacenado. Este problema afecta a la p\u00e1gina de inicio de sesi\u00f3n de ALD desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json index 98670909f2e..e7f23273f21 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hivedigital Canonical Attachments allows Reflected XSS. This issue affects Canonical Attachments: from n/a through 1.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en hivedigital Canonical Attachments permite XSS reflejado. Este problema afecta a Canonical Attachments desde n/d hasta la versi\u00f3n 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json index d68592c5fd2..0ffe2dcbf74 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP allows Blind SQL Injection. This issue affects All push notification for WP: from n/a through 1.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en gtlwpdev All push notification for WP permiten la inyecci\u00f3n SQL ciega. Este problema afecta a todas las notificaciones push de WP: desde n/d hasta la versi\u00f3n 1.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json index ba142a66a7b..dea83845323 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickandPledge Click & Pledge Connect Plugin allows SQL Injection. This issue affects Click & Pledge Connect Plugin: from 2.24080000 through WP6.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en ClickandPledge Click & Pledge Connect Plugin permite la inyecci\u00f3n SQL. Este problema afecta al complemento ClickandPledge Connect desde la versi\u00f3n 2.24080000 hasta WP6.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json index f3e3df29ffa..058876e068f 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Edamam SEO, Nutrition and Print for Recipes by Edamam allows Stored XSS. This issue affects SEO, Nutrition and Print for Recipes by Edamam: from n/a through 3.3." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en Edamam SEO, Nutrition and Print for Recipes by Edamam permite XSS almacenado. Este problema afecta a SEO, Nutrition and Print para Recetas de Edamam: desde n/d hasta la versi\u00f3n 3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json index ab1be77c05d..125b6ac0b97 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sandor Kovacs Simple Post Meta Manager allows Reflected XSS. This issue affects Simple Post Meta Manager: from n/a through 1.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sandor Kovacs Simple Post Meta Manager permite XSS reflejado. Este problema afecta a Simple Post Meta Manager desde n/d hasta la versi\u00f3n 1.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json index 52ac1dd3f94..1df1a79141d 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in REVE Chat REVE Chat allows Stored XSS. This issue affects REVE Chat: from n/a through 6.2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en REVE Chat REVE Chat permite XSS almacenado. Este problema afecta a REVE Chat desde la versi\u00f3n n/d hasta la 6.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json index 1385b7072e7..c8234fe47bf 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in dangrossman WP Calais Auto Tagger allows Cross Site Request Forgery. This issue affects WP Calais Auto Tagger: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en dangrossman WP Calais Auto Tagger permite Cross-Site Request Forgery. Este problema afecta a WP Calais Auto Tagger desde n/d hasta la versi\u00f3n 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json index 322d3e6d9dd..25e3f663e80 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ChillPay ChillPay WooCommerce allows Stored XSS. This issue affects ChillPay WooCommerce: from n/a through 2.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ChillPay ChillPay WooCommerce permite XSS almacenado. Este problema afecta a ChillPay WooCommerce desde n/d hasta la versi\u00f3n 2.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json index a4a51aeb0a2..2e8c8af1ec5 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in axew3 WP w3all phpBB allows Reflected XSS. This issue affects WP w3all phpBB: from n/a through 2.9.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en axew3 WP w3all phpBB permite XSS reflejado. Este problema afecta a WP w3all phpBB desde n/d hasta la versi\u00f3n 2.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json index 0d781424aec..2e2320fd0fa 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Agence web Eoxia - Montpellier WP shop allows Upload a Web Shell to a Web Server. This issue affects WP shop: from n/a through 2.6.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Agence web Eoxia - Montpellier WP shop permite subir un shell web a un servidor web. Este problema afecta a WP Shop desde la versi\u00f3n n/d hasta la 2.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json index f1afe53d781..2250ff829bf 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in debounce DeBounce Email Validator allows Stored XSS. This issue affects DeBounce Email Validator: from n/a through 5.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en debounce DeBounce Email Validator permite XSS almacenado. Este problema afecta a DeBounce Email Validator desde n/d hasta la versi\u00f3n 5.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json index dc60413c408..aec2df117b6 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ankit Singla WordPress Spam Blocker allows Stored XSS. This issue affects WordPress Spam Blocker: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ankit Singla WordPress Spam Blocker permite XSS almacenado. Este problema afecta a WordPress Spam Blocker desde n/d hasta la versi\u00f3n 2.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json index ae93d3f30a0..69246b8a522 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chat2 Chat2 allows Cross Site Request Forgery. This issue affects Chat2: from n/a through 3.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Chat2 Chat2 permite Cross-Site Request Forgery. Este problema afecta a Chat2 desde la versi\u00f3n n/d hasta la 3.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json index e36d94694f7..07d87d3b5f4 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kevon Adonis WP Abstracts allows Cross Site Request Forgery. This issue affects WP Abstracts: from n/a through 2.7.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kevon Adonis WP Abstracts permite Cross-Site Request Forgery. Este problema afecta a WP Abstracts desde n/d hasta la versi\u00f3n 2.7.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json index fe17cee3fa1..6fc266966c5 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in George Sexton WordPress Events Calendar Plugin \u2013 connectDaily allows Cross-Site Scripting (XSS). This issue affects WordPress Events Calendar Plugin \u2013 connectDaily: from n/a through 1.4.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en George Sexton WordPress Events Calendar Plugin \u2013 connectDaily permite Cross-Site Scripting (XSS). Este problema afecta al plugin de calendario de eventos de WordPress, connectDaily, desde la versi\u00f3n n/d hasta la 1.4.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json index c0820c52306..a0c2cc886bb 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Foliovision: Making the web work for you Foliopress WYSIWYG allows Cross Site Request Forgery. This issue affects Foliopress WYSIWYG: from n/a through 2.6.18." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Foliovision: Making the web work for you Foliopress WYSIWYG permite Cross-Site Request Forgery. Este problema afecta a Foliopress WYSIWYG desde n/d hasta la versi\u00f3n 2.6.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json index 49ff9b26135..95f8c939346 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in rafasashi User Session Synchronizer allows Stored XSS. This issue affects User Session Synchronizer: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en rafasashi User Session Synchronizer permite XSS almacenado. Este problema afecta al sincronizador de sesiones de usuario desde la versi\u00f3n n/d hasta la 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json index 0c0de0e9e8a..25cb54ceaa5 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in nimbata Nimbata Call Tracking allows Stored XSS. This issue affects Nimbata Call Tracking: from n/a through 1.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en nimbata Nimbata Call Tracking permite XSS almacenado. Este problema afecta a Nimbata Call Tracking desde n/d hasta la versi\u00f3n 1.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json index 6be0283f8e5..62b7ea25c6a 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ydesignservices Multiple Location Google Map allows Stored XSS. This issue affects Multiple Location Google Map: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ydesignservices Multiple Location Google Map permite XSS almacenado. Este problema afecta al mapa de Google de m\u00faltiples ubicaciones desde n/d hasta la versi\u00f3n 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json index f378a49accb..5533ae7f7ca 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in KeyCAPTCHA KeyCAPTCHA allows Stored XSS. This issue affects KeyCAPTCHA: from n/a through 2.5.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en KeyCAPTCHA KeyCAPTCHA permite XSS almacenado. Este problema afecta a KeyCAPTCHA desde n/d hasta la versi\u00f3n 2.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json index 086bd23c2f5..7aadcd40715 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vsourz Digital WP Map Route Planner allows Cross Site Request Forgery. This issue affects WP Map Route Planner: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Vsourz Digital WP Map Route Planner permite Cross-Site Request Forgery. Este problema afecta a WP Map Route Planner desde n/d hasta la versi\u00f3n 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json index 4d160ce45d1..6ff8b17d124 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in plainware PlainInventory allows Stored XSS. This issue affects PlainInventory: from n/a through 3.1.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en plainware PlainInventory permite XSS almacenado. Este problema afecta a PlainInventory desde n/d hasta la versi\u00f3n 3.1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json index 72d55b47d9d..093b0903d4d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in czater Czater.pl \u2013 live chat i telefon allows Cross Site Request Forgery. This issue affects Czater.pl \u2013 live chat i telefon: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en czater Czater.pl \u2013 live chat i telefon permite Cross Site Request Forgery. Este problema afecta a Czater.pl (chat en vivo y tel\u00e9fono): desde n/d hasta la versi\u00f3n 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json index 786e45f6314..df038c0241c 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elementor One Click Accessibility allows Stored XSS. This issue affects One Click Accessibility: from n/a through 3.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Elementor One Click Accessibility permite XSS almacenado. Este problema afecta a One Click Accessibility desde n/d hasta la versi\u00f3n 3.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json index 351192fe00c..902e863846f 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor allows Cross Site Request Forgery. This issue affects Anant Addons for Elementor: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en anantaddons Anant Addons for Elementor permite Cross Site Request Forgery. Este problema afecta a Anant Addons para Elementor desde la versi\u00f3n n/d hasta la 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json index 9990aa6a8ad..58b2b05af76 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in appsbd Vite Coupon allows Remote Code Inclusion. This issue affects Vite Coupon: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en appsbd Vite Coupon permite la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a Vite Coupon desde n/d hasta la versi\u00f3n 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json index b70b922d432..a0bc5da31cd 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ip2location IP2Location World Clock allows Stored XSS. This issue affects IP2Location World Clock: from n/a through 1.1.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en ip2location IP2Location World Clock permite XSS almacenado. Este problema afecta al reloj mundial de IP2Location desde n/d hasta la versi\u00f3n 1.1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json index 32f64d8af89..160c4b621f7 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hiren Patel Custom Posts Order allows Stored XSS. This issue affects Custom Posts Order: from n/a through 4.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Hiren Patel Custom Posts Order permite XSS almacenado. Este problema afecta al orden de publicaciones personalizado desde n/d hasta la versi\u00f3n 4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json index f5be104393f..97b820618e1 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in fraudlabspro FraudLabs Pro for WooCommerce allows Stored XSS. This issue affects FraudLabs Pro for WooCommerce: from n/a through 2.22.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en fraudlabspro FraudLabs Pro for WooCommerce permite XSS almacenado. Este problema afecta a FraudLabs Pro para WooCommerce desde n/d hasta la versi\u00f3n 2.22.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json index 7e161445958..2e3df5a1f5f 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Map Plugins Interactive US Map allows Stored XSS. This issue affects Interactive US Map: from n/a through 2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Map Plugins Interactive US Map permite XSS almacenado. Este problema afecta a Interactive US Map desde n/d hasta la versi\u00f3n 2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json index a12676dd2e4..d138b7d7295 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ashokbasnet Nepali Date Utilities allows Stored XSS. This issue affects Nepali Date Utilities: from n/a through 1.0.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ashokbasnet Nepali Date Utilities permite XSS almacenado. Este problema afecta a Nepali Date Utilities desde n/d hasta la versi\u00f3n 1.0.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json index e9260e63406..2bc5f1acf0f 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in fromdoppler Doppler Forms allows Stored XSS. This issue affects Doppler Forms: from n/a through 2.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en fromdoppler Doppler Forms permite XSS almacenado. Este problema afecta a los formularios Doppler desde n/d hasta la versi\u00f3n 2.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json index 79bf3a5dc1d..d5a6344ddaa 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in MERGADO Mergado Pack allows Stored XSS. This issue affects Mergado Pack: from n/a through 4.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MERGADO Mergado Pack permite XSS almacenado. Este problema afecta a Mergado Pack desde n/d hasta la versi\u00f3n 4.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json index f3b49511c49..4a0f7a58e4c 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in epeken Epeken All Kurir allows Stored XSS. This issue affects Epeken All Kurir: from n/a through 1.4.6.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en epeken Epeken All Kurir permite XSS almacenado. Este problema afecta a Epeken All Kurir desde n/d hasta la versi\u00f3n 1.4.6.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json index 0cecc233e78..8a0c38b824d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in QuantumCloud SEO Help allows Server Side Request Forgery. This issue affects SEO Help: from n/a through 6.6.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en QuantumCloud SEO Help permite Server-Side Request Forgery. Este problema afecta a SEO Help desde la versi\u00f3n n/d hasta la 6.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json index c0774159c1a..2e0d0797dda 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Picture-Planet GmbH Verowa Connect allows Blind SQL Injection. This issue affects Verowa Connect: from n/a through 3.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Picture-Planet GmbH Verowa Connect permite la inyecci\u00f3n SQL ciega. Este problema afecta a Verowa Connect desde n/d hasta la versi\u00f3n 3.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json index 59fb36b4761..22281b46eb1 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in solwininfotech WP Social Stream Designer allows Blind SQL Injection. This issue affects WP Social Stream Designer: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en solwininfotech WP Social Stream Designer permite la inyecci\u00f3n SQL ciega. Este problema afecta a WP Social Stream Designer desde n/d hasta la versi\u00f3n 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json index ef8a646574d..36d9af8fa32 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ashish Ajani WP Show Stats allows Cross Site Request Forgery. This issue affects WP Show Stats: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ashish Ajani WP Show Stats permite Cross-Site Request Forgery. Este problema afecta a WP Show Stats desde n/d hasta la versi\u00f3n 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json index fa53bacb526..726ea3938fd 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ZealousWeb User Registration Using Contact Form 7 allows Cross Site Request Forgery. This issue affects User Registration Using Contact Form 7: from n/a through 2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ZealousWeb User Registration Using Contact Form 7 permite Cross-Site Request Forgery. Este problema afecta al registro de usuarios mediante el Formulario de contacto 7: desde n/d hasta la versi\u00f3n 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json index e1f68e73db4..983f1426115 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Grade Us, Inc. Review Stream allows Stored XSS. This issue affects Review Stream: from n/a through 1.6.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Grade Us, Inc. Review Stream permite XSS almacenado. Este problema afecta a Review Stream desde n/d hasta la versi\u00f3n 1.6.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json index 3ae2e06d07f..be8d30320b2 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RomanCode MapSVG Lite allows DOM-Based XSS. This issue affects MapSVG Lite: from n/a through 8.5.32." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RomanCode MapSVG Lite que permite XSS basado en DOM. Este problema afecta a MapSVG Lite desde n/d hasta la versi\u00f3n 8.5.32." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json index 8cc05db198e..874b008fe1b 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in RomanCode MapSVG Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MapSVG Lite: from n/a through 8.5.32." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en RomanCode MapSVG Lite permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a MapSVG Lite desde la versi\u00f3n n/d hasta la 8.5.32." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json index ceaf0de29b6..0493e1f73da 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aristo Rinjuang WP Inquiries allows SQL Injection. This issue affects WP Inquiries: from n/a through 0.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Aristo Rinjuang WP Inquiries permite la inyecci\u00f3n SQL. Este problema afecta a WP Inquiries desde n/d hasta la versi\u00f3n 0.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json index ae57d9369d4..f7568490763 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Angelo Mandato PowerPress Podcasting allows DOM-Based XSS. This issue affects PowerPress Podcasting: from n/a through 11.12.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Angelo Mandato PowerPress Podcasting que permite XSS basado en DOM. Este problema afecta a PowerPress Podcasting desde n/d hasta la versi\u00f3n 11.12.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json index 057f8eecf4b..090448df1a5 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Angelo Mandato PowerPress Podcasting allows Server Side Request Forgery. This issue affects PowerPress Podcasting: from n/a through 11.12.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) en Angelo Mandato PowerPress Podcasting permite Server-Side Request Forgery. Este problema afecta a PowerPress Podcasting desde n/d hasta la versi\u00f3n 11.12.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json index 154f14708a4..d730398d60a 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Shuffle WP Subscription Forms allows PHP Local File Inclusion. This issue affects WP Subscription Forms: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control incorrecto del nombre de archivo para la instrucci\u00f3n Include/Require en programas PHP ('Inclusi\u00f3n remota de archivos en PHP') en WP Shuffle WP Subscription Forms permiten la inclusi\u00f3n local de archivos en PHP. Este problema afecta a los formularios de suscripci\u00f3n de WP desde n/d hasta la versi\u00f3n 1.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json index d9a565e05e5..01ed5bb4713 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WPWebinarSystem WebinarPress allows Phishing. This issue affects WebinarPress: from n/a through 1.33.27." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Open Redirect') en WPWebinarSystem WebinarPress permite el phishing. Este problema afecta a WebinarPress desde n/d hasta la versi\u00f3n 1.33.27." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json index 2ee668ae880..27a75c428f4 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Rustaurius Ultimate WP Mail allows Phishing. This issue affects Ultimate WP Mail: from n/a through 1.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Open Redirect') en Rustaurius Ultimate WP Mail permite el phishing. Este problema afecta a Ultimate WP Mail desde la versi\u00f3n n/d hasta la 1.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json index a12ac0cdf3d..cd8cf9508ec 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Mestres do WP Checkout Mestres WP allows Privilege Escalation. This issue affects Checkout Mestres WP: from n/a through 8.7.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Mestres do WP Checkout Mestres WP permite la escalada de privilegios. Este problema afecta a Checkout Mestres WP desde n/d hasta la versi\u00f3n 8.7.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json index 669374b270c..e868bfb446c 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede leer fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json index b7c9870948f..a4a563805f4 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede leer fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json index 7ab452588ed..341c7d1010f 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a un desbordamiento del b\u00fafer de memoria basado en la pila. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json index faec77e6cf2..371a8498924 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a que un atacante puede leer fuera del b\u00fafer de memoria asignado. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json index 465a08dac04..e2e810f569d 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo local en Rockwell Automation Arena\u00ae debido a un desbordamiento del b\u00fafer de memoria basado en la pila. La falla se debe a una validaci\u00f3n incorrecta de los datos proporcionados por el usuario. Si se explota, un atacante puede divulgar informaci\u00f3n y ejecutar c\u00f3digo arbitrario en el sistema. Para explotar la vulnerabilidad, un usuario leg\u00edtimo debe abrir un archivo DOE malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3346.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3346.json index 3d5dd96519b..339a37da504 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3346.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3346.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. Affected by this issue is the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument pptp_server_start_ip/pptp_server_end_ip leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC7 15.03.06.44. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetPPTPServer del archivo /goform/SetPptpServerCfg. La manipulaci\u00f3n del argumento pptp_server_start_ip/pptp_server_end_ip provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3347.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3347.json index 437da79ca01..d651ff83e03 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3347.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3347.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /dental_pending.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Patient Record Management System 1.0. Esta afecta a una parte desconocida del archivo /dental_pending.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3348.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3348.json index 2411370050c..ca31a7b561c 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3348.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3348.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Patient Record Management System 1.0. This vulnerability affects unknown code of the file /edit_dpatient.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Patient Record Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /edit_dpatient.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3349.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3349.json index 44cfbe1fb46..6732c4b5341 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3349.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3349.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component SYST Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PCMan FTP Server 2.0.7. Este problema afecta a un procesamiento desconocido del componente SYST Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json index 36555e44a28..52e4c73802b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/view-enquiry.php. The manipulation of the argument viewid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Old Age Home Management System 1.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /admin/view-enquiry.php. La manipulaci\u00f3n del argumento viewid provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json index b7413aba832..5f91cd55afb 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Old Age Home Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json index f8f9767a2ae..24e30aa881a 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-scdetails.php. The manipulation of the argument contnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Old Age Home Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/edit-scdetails.php. La manipulaci\u00f3n del argumento \"contnum\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json index abc5b56a8b8..4260c6af925 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in GNUPlot. A segmentation fault via IO_str_init_static_internal may jeopardize the environment." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en GNUPlot. Una falla de segmentaci\u00f3n mediante IO_str_init_static_internal podr\u00eda poner en riesgo el entorno." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json index 2cac02e239d..84b5bffe639 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en GLib. Se produce un desbordamiento de enteros y una lectura insuficiente del b\u00fafer al analizar una marca de tiempo ISO 8601 larga e inv\u00e1lida con la funci\u00f3n g_date_time_new_from_iso8601()." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3369.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3369.json index 8058096d3da..cfcba53a425 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3369.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3369.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in xxyopen Novel-Plus 5.1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /novel/friendLink/list. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en xxyopen Novel-Plus 5.1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /novel/friendLink/list. La manipulaci\u00f3n del argumento sort provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3370.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3370.json index 0785939797e..744a7ad5dfd 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3370.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3370.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Men Salon Management System 1.0. This affects an unknown part of the file /admin/admin-profile.php. The manipulation of the argument contactnumber leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Men Salon Management System 1.0. Esta afecta a una parte desconocida del archivo /admin/admin-profile.php. La manipulaci\u00f3n del argumento contactnumber provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json index 5e704dfde4a..0245463e32a 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authentication for Critical Function vulnerability in Drupal Panels allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Panels: from 0.0.0 before 4.9.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en Drupal Panels permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los paneles: desde la versi\u00f3n 0.0.0 hasta la 4.9.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json index 0ec13dbb1b8..c64a9a395bb 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling, Incorrect Authorization vulnerability in Drupal WEB-T allows Excessive Allocation, Content Spoofing.This issue affects WEB-T: from 0.0.0 before 1.1.0." + }, + { + "lang": "es", + "value": "Asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n, vulnerabilidad de autorizaci\u00f3n incorrecta en Drupal WEB-T permite asignaci\u00f3n excesiva y suplantaci\u00f3n de contenido. Este problema afecta a WEB-T: desde 0.0.0 antes de 1.1.0." } ], "metrics": { diff --git a/README.md b/README.md index 5243ef4f785..f81917fefeb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-12T18:00:19.691194+00:00 +2025-04-13T02:00:19.312868+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-12T17:15:15.363000+00:00 +2025-04-13T00:15:14.997000+00:00 ``` ### Last Data Feed Release @@ -27,26 +27,51 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-04-12T00:00:04.392690+00:00 +2025-04-13T00:00:04.386255+00:00 ``` ### Total Number of included CVEs ```plain -289718 +289719 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +- [CVE-2025-2814](CVE-2025/CVE-2025-28xx/CVE-2025-2814.json) (`2025-04-13T00:15:14.997`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2093` -- [CVE-2025-29479](CVE-2025/CVE-2025-294xx/CVE-2025-29479.json) (`2025-04-12T17:15:15.363`) +- [CVE-2025-32685](CVE-2025/CVE-2025-326xx/CVE-2025-32685.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32690](CVE-2025/CVE-2025-326xx/CVE-2025-32690.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32691](CVE-2025/CVE-2025-326xx/CVE-2025-32691.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32692](CVE-2025/CVE-2025-326xx/CVE-2025-32692.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32693](CVE-2025/CVE-2025-326xx/CVE-2025-32693.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32694](CVE-2025/CVE-2025-326xx/CVE-2025-32694.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32695](CVE-2025/CVE-2025-326xx/CVE-2025-32695.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3285](CVE-2025/CVE-2025-32xx/CVE-2025-3285.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3286](CVE-2025/CVE-2025-32xx/CVE-2025-3286.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3287](CVE-2025/CVE-2025-32xx/CVE-2025-3287.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3288](CVE-2025/CVE-2025-32xx/CVE-2025-3288.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3289](CVE-2025/CVE-2025-32xx/CVE-2025-3289.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3346](CVE-2025/CVE-2025-33xx/CVE-2025-3346.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3347](CVE-2025/CVE-2025-33xx/CVE-2025-3347.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3348](CVE-2025/CVE-2025-33xx/CVE-2025-3348.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3349](CVE-2025/CVE-2025-33xx/CVE-2025-3349.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3350](CVE-2025/CVE-2025-33xx/CVE-2025-3350.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3351](CVE-2025/CVE-2025-33xx/CVE-2025-3351.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3352](CVE-2025/CVE-2025-33xx/CVE-2025-3352.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3359](CVE-2025/CVE-2025-33xx/CVE-2025-3359.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3360](CVE-2025/CVE-2025-33xx/CVE-2025-3360.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3369](CVE-2025/CVE-2025-33xx/CVE-2025-3369.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3370](CVE-2025/CVE-2025-33xx/CVE-2025-3370.json) (`2025-04-07T14:17:50.220`) +- [CVE-2025-3474](CVE-2025/CVE-2025-34xx/CVE-2025-3474.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3475](CVE-2025/CVE-2025-34xx/CVE-2025-3475.json) (`2025-04-09T20:02:41.860`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4da42cd0763..89870f07808 100644 --- a/_state.csv +++ b/_state.csv @@ -8319,7 +8319,7 @@ CVE-2003-1602,0,0,100cc4b378e6d3378f30d5d8318a2a19da715b624e57f6715477282b3d3639 CVE-2003-1603,0,0,e5710194d6078fbf5be0bb9e3c5320856ca6a9c042266789edf9b1634dca8b47,2025-04-12T10:46:40.837000 CVE-2003-1604,0,0,68d18a24a1cc04e17b691d4b876fe1a9df1d657725ad49796adec4a23a5a6403,2025-04-12T10:46:40.837000 CVE-2003-1605,0,0,ed5f92da9c6de8972983b658c118e7e0846e0df7ea7ebc15170bdb2a9feb6690,2024-11-20T23:47:32.647000 -CVE-2003-20001,0,0,f2ea85619ae38648190e57e7c4e1b569eb853d1f828adef09498d6801530e9a7,2025-04-02T14:58:07.527000 +CVE-2003-20001,0,1,e4522e0fb181f10a56d478e5d4a177b28a6dde2ee056cd7addd5510131d69ab8,2025-04-04T21:15:40.577000 CVE-2003-5001,0,0,89c6b3fd852123cd6cd57c9df41b4e5b93bae8f30e890cc46f84b54e47bac556,2024-11-20T23:47:32.800000 CVE-2003-5002,0,0,9d86531092cf585bf2e264c697f54f114302431ec19c4d24bf4227480c34d013,2024-11-20T23:47:33.050000 CVE-2003-5003,0,0,3425e7f47c21df5d1e028b94e4e690aea441c401ca4ace076f69e557c84de5f1,2024-11-20T23:47:33.187000 @@ -83296,7 +83296,7 @@ CVE-2016-1000282,0,0,80557be177d6e8e40fbed2f2f2e57bb77ee756a5dd2bdcde261698b2a84 CVE-2016-10003,0,0,e9afe4d8f9aee5016a46ce3fcbec4bc70d6dda5d4b2dc40688272e8de97fa874,2024-11-21T02:43:04.500000 CVE-2016-1000306,0,0,58929e18d7a88d76b38c9344afa685c5dfce19e3aaa94be62e69e6459dd884bf,2023-11-07T02:29:26.900000 CVE-2016-1000307,0,0,bb0bc3690e7d3abeef1ad75b0b0bc1a60b3a6371d455460cecc93391b8e0fdcf,2024-11-21T02:43:02.287000 -CVE-2016-1000338,0,0,db3f6046676a1ff9a952f153ce27e1259821311e5249cd9232b879db61841625,2024-11-21T02:43:02.427000 +CVE-2016-1000338,0,1,8b42a1fa4a3fd538815b29563b97a96896f4444ee1c5611e8f9cdc3ead2676e6,2024-11-21T02:43:02.427000 CVE-2016-1000339,0,0,1167a54323c1bc06607dd25e61a81bc123d187ccd40ec9a0e27f929d382d1a23,2024-11-21T02:43:02.630000 CVE-2016-1000340,0,0,b3f76354c3ef5ca6ec66e93214bd2c403247366372d2997a5cd0a7f961036eda,2024-11-21T02:43:02.803000 CVE-2016-1000341,0,0,d1d106897ada92968f10091a9eb862bd6fe4fead5a8f90b6957248a56edaad6e,2024-11-21T02:43:02.957000 @@ -92805,7 +92805,7 @@ CVE-2017-0032,0,0,8d927b8d5613948cca2441619936dc254ba1ffacaec4b1bbf6f954afe978c1 CVE-2017-0033,0,0,460a099c3afafc9315438205d92ca2f5cb9df202009bbf12c160326766b93110,2024-11-21T03:02:13.123000 CVE-2017-0034,0,0,99a968473980faf17849d9d3ba672fe96f9635adb5c4c8a96d0e3f3f58cae2c8,2024-11-21T03:02:13.263000 CVE-2017-0035,0,0,7e3e8a657b79e78dbd921e9e35f776345907074b1bcab773d9d8fe6696873151,2024-11-21T03:02:13.377000 -CVE-2017-0037,0,0,981288d52fd3ac71ca34bd85c6bc04b655f97b2486acdb82b25e1b1f84128885,2025-02-10T17:15:13.527000 +CVE-2017-0037,0,1,8b1f108f13b3202336266bbb50e8f3c61bce3026122139f8e2b6074bffe34d69,2025-04-04T20:40:43.923000 CVE-2017-0038,0,0,4e762a088f6350a50745f3b31da087b12c8b4ddf53a5bcba2715ecd64b7b127f,2024-11-21T03:02:13.637000 CVE-2017-0039,0,0,843d43a30fbc31bc6b81f75016e0ad78bfc18bbcca32cdd857c1dd2c11372ce5,2024-11-21T03:02:13.767000 CVE-2017-0040,0,0,a015d5a3766a02f9311b59860d0467b21e5d11f4450e0153f62d7855cb751a0a,2024-11-21T03:02:13.877000 @@ -92907,7 +92907,7 @@ CVE-2017-0141,0,0,5d50cc2a91ff21ac9aac2ec8596a4247d2dde09d04b2faaba6a35d682bad16 CVE-2017-0143,0,0,34fa566aa74eacbf2ab2a1a100a7bb53519c18777b579fb8685d57a72ccb913f,2025-04-04T19:50:46.183000 CVE-2017-0144,0,0,d39476374f52147c76a864c6471e7a15b60d4e5e60f4e314f41312b9d18b043e,2025-04-04T19:51:00.227000 CVE-2017-0145,0,0,aec731337803913d47b3f8e0e3e29d1ad1c8db6439a31e22c34dffe16026a543,2025-02-11T17:02:01.967000 -CVE-2017-0146,0,0,c731be3518471b83a99c5be2d858945171187a5afaaf84a0809a7a51678df258,2025-02-04T15:15:09.857000 +CVE-2017-0146,0,1,929cf51e32f33985b08776697097da49cecd79a76a0ccdf9087df2a39cafe23e,2025-04-04T20:27:30.720000 CVE-2017-0147,0,0,df39a846c64e28b683f81ea1bb3ec9a9f7f0ae8b1bd555acdc69c07c710b7fec,2025-02-11T17:01:56.383000 CVE-2017-0148,0,0,5beba1ea0159cd9ad6c93c1f7e5a0e88285e635827a16a6cd20cc2153a1ab4ca,2025-02-11T17:01:39.333000 CVE-2017-0149,0,0,bf78a19acf8dfbc0213c7b78f07531745fe387b03741d0fc0a1a1f54a7bda385,2025-02-11T17:01:28.703000 @@ -102567,7 +102567,7 @@ CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4c CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000 CVE-2017-20195,0,0,7925f7e5197d6a733d1f6ba8fe7f174063b555482c30e77dd80a7d567e532c9c,2024-10-29T14:34:04.427000 CVE-2017-20196,0,0,d3c3fc62bc8dc0302911d2c38b5ebbde54bef43021fa2fe4a124876dd95c1446,2025-01-28T15:15:08.267000 -CVE-2017-20197,0,0,0a2e86e65a28b19e51e2ca707b3a695fc95249c82a01aff178361307c132d8f4,2025-04-09T20:02:41.860000 +CVE-2017-20197,0,1,8bf48f900900ccedd72ddd6d8b964e7adfc8f712be2c6b60b297356b54d7fcd7,2025-04-09T20:02:41.860000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -105965,7 +105965,7 @@ CVE-2017-5685,0,0,7e2720838bf75ba8df74963aa0d44d19823c3d3d8b4fe77ca70634fd4621ee CVE-2017-5686,0,0,1b6369a18bc3048e4f5052404b083fde204cc03e4b3610174df32e9ea98ad410,2024-11-21T03:28:13.317000 CVE-2017-5687,0,0,f3eb17158e526c11205277eb0aa51c4ed790e3b3585c712351e750176ecd3553,2023-11-07T02:49:31.080000 CVE-2017-5688,0,0,3047ed52c924afc3b53203936d7a15635d5467cdf666d3ad272cabd19d6b23ec,2024-11-21T03:28:13.447000 -CVE-2017-5689,0,0,96c00d64f9a3902f424f2f69824a49caca58632158b007388dcd336e358582fd,2025-02-07T14:15:42.800000 +CVE-2017-5689,0,1,9c749b6bb049f14db4d4620b0077e3a0093697457997f513ee4433b1578ceed5,2025-02-07T14:15:42.800000 CVE-2017-5690,0,0,bde03df0f672bdcf5869f8d1b70ef297085f4350e41728ecf5ca86e2a8b87d57,2023-11-07T02:49:31.310000 CVE-2017-5691,0,0,d124b3c9ec131ae52624cc95825b560339c2db7bdf908a63b5224cac4d8b5e72,2024-11-21T03:28:13.767000 CVE-2017-5692,0,0,46649fd68ecee01e250c40c3b478483a6b0a25ec2e017585bff790e16bee79ad,2024-11-21T03:28:13.920000 @@ -108472,7 +108472,7 @@ CVE-2017-8539,0,0,446e318a66537ee136821a154e20e10d668e99c1474f909ea3e5bbeb40ca64 CVE-2017-8540,0,0,4e4b5f6c272e5e80eb604fc056f7bc2d42c6c16a0afb11a9e15f793ece3ace28,2025-04-07T20:36:38.880000 CVE-2017-8541,0,0,29b48775df352b28ce6e0660d1b99d03150f1ab585229d36e12b2d64e174c59c,2024-11-21T03:34:13.430000 CVE-2017-8542,0,0,920b71ee5cfd23f5f08006bbbcf2a18f7317373b78981717ff791819a93adf2b,2024-11-21T03:34:13.563000 -CVE-2017-8543,0,0,920e04509929f94b07195d2bf1f931da0822faad9f73a540f8581de34a93e7d6,2025-02-10T19:15:35.197000 +CVE-2017-8543,0,1,b89a5b7e44f6a6f77da0713eae27deaed30d230ec14afbdfde910faf29f6cd9f,2025-04-04T20:28:18.117000 CVE-2017-8544,0,0,a72203a1b432c85ce0b1d4f34b820b06f845ad353995bb43c4874bfdb6edfd2a,2024-11-21T03:34:13.813000 CVE-2017-8545,0,0,83b588fa6dc026319416aeaa708eecc5cd5054dd747503c8e08cd50e5a5121da,2024-11-21T03:34:13.930000 CVE-2017-8547,0,0,98d0a41eab32e07a3c44b31f8bce22e8d04f759c17eaea8046d5e60e4a92beeb,2024-11-21T03:34:14.050000 @@ -110617,7 +110617,7 @@ CVE-2018-0874,0,0,f136ba4ac4cbd54b2ac0efee75098af79e6133a3ce67c1bdb38d278f85c1b3 CVE-2018-0875,0,0,f80fc26f04d41b93cecf801f5bfdc98656dc3f6302a4142336bed1235e2d5391,2024-11-21T03:39:08.307000 CVE-2018-0876,0,0,9a4561e48e1f22f8c22a67db8f460ece553598686a78e46da7ac37d0d2cf4a2d,2024-11-21T03:39:08.423000 CVE-2018-0877,0,0,47f3be9a70558e35ed8ac5e832446414df562caf468573dbdda7af390635ca38,2024-11-21T03:39:08.553000 -CVE-2018-0878,0,0,07302131ffed6eedc844846cd83145e79385cb9791059837099522d2bcd60f91,2024-11-21T03:39:08.673000 +CVE-2018-0878,0,1,7077cda63dcfafc798e9f1345a97eb83f87bf006437d0481eae964e38fb5ce0a,2025-04-04T21:15:41.180000 CVE-2018-0879,0,0,d4630e0c34bda5b0f44c73595138dfcb9f83f2c407547c461992c758eb579a57,2024-11-21T03:39:08.793000 CVE-2018-0880,0,0,953052e7d66624f8c5b4bc690482426d5478a3903612687aadaac3d83c921b9a,2024-11-21T03:39:08.923000 CVE-2018-0881,0,0,66dc097d213585c7fd10021d3f7f2e4ce75a843afd59f2bfe2e9e24324c991a8,2024-11-21T03:39:09.057000 @@ -120504,7 +120504,7 @@ CVE-2018-20835,0,0,71b3b1ff002bc39cf1c66f035e7000714d87e6455dd02335610a0168b1774 CVE-2018-20836,0,0,599bbd685ae09520aa8bc7c005764c85d88aea1471a36784763747f7608c878d,2024-11-21T04:02:16.550000 CVE-2018-20837,0,0,e91d6bc9dc58b0d9ffc8f6c85189b07c118dd306e265d0db70bb93865e322fb6,2024-11-21T04:02:16.740000 CVE-2018-20838,0,0,d5d753bdba79e2baf72ebb74ba47a6d521dc6cece14b3d9a4972259edf3c1d75,2024-11-21T04:02:16.890000 -CVE-2018-20839,0,0,54abe523105756328e2d09b4e4f93f84ca99c46e1523e9bdeef52d42cb28745e,2024-11-21T04:02:17.040000 +CVE-2018-20839,0,1,fe817f0b4d825739c4ea27d8d2e4182de7499e5d1f175a7790ba6da9874d0be6,2024-11-21T04:02:17.040000 CVE-2018-2084,0,0,0020cad952c12f021fb73c3b3288bc335919aeabb96cd67ba3037418d26b7da3,2023-11-07T02:56:47.930000 CVE-2018-20840,0,0,d5765facca17e9a0fdb2a6179a43f85026a5ea5a1452bd91fda1a09963a875f1,2024-11-21T04:02:17.197000 CVE-2018-20841,0,0,dde1de892991d602fea5e000afa95c4a251b21ff5059d2338a4327cfe3a65062,2024-11-21T04:02:17.343000 @@ -121445,7 +121445,7 @@ CVE-2018-25105,0,0,d16cf144daafb93b508b5b5e5d66a4d924219330c977526c844488af5bef1 CVE-2018-25106,0,0,43324fde9f8c9ae927a1959179cc6b254f9be4aff28b0fa56528b25a6ff16bf1,2024-12-23T23:15:05.720000 CVE-2018-25107,0,0,e74e5f133ec4c9e42aba268447c5e4b8ad803c3cf4918fd4d980370e8a36049c,2024-12-31T19:15:07.077000 CVE-2018-25108,0,0,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b94c3,2025-01-16T11:15:06.850000 -CVE-2018-25109,0,0,eefe4efe4517068004dd71aa2e2ed4847e146b8d0a9b3761965edc87609bd7f2,2025-03-23T23:15:13.060000 +CVE-2018-25109,0,1,78a6fcfa9783d17890c8ccdbf5bd43dceffab865f734cb93193e2f03c25430f9,2025-03-23T23:15:13.060000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000 CVE-2018-2561,0,0,03752647d2e63906688e002ddaaa7e85aba13094709fdf81fa6e8215efd59a07,2024-11-21T04:03:56.197000 @@ -122871,7 +122871,7 @@ CVE-2018-4296,0,0,290bf618fbeee80f7c7e65fa32cbf0b9dfc19a5048f3b55b3ef1c5193a2ca5 CVE-2018-4298,0,0,007162c812763de89784475274b0213bd5f3b3445aa20eda4840d113b63f9252,2024-11-21T04:07:08.840000 CVE-2018-4299,0,0,42b23e7eda66a0b308a029c6815c510458bbff6006ff36345af771ef91431c9a,2024-11-21T04:07:08.960000 CVE-2018-4300,0,0,584e6a13a646a6130b68caf2fc8a3da27299adc088b83cbbbed5c31e133b577b,2024-11-21T04:07:09.083000 -CVE-2018-4301,0,0,07360616b719e0764f57442535c1f2c5ba386fe028826993f47397eec0384e7d,2025-01-08T18:15:12.493000 +CVE-2018-4301,0,1,2d7a08b0b80afef2e0d6018785f5e9e3e7f5e07757077520ba1616ce6a141fc0,2025-01-08T18:15:12.493000 CVE-2018-4302,0,0,6b424f7b74924555e5de84fc0bd1e5707973310f2c3c8c50261acb5429d57bb0,2024-11-21T04:07:09.207000 CVE-2018-4303,0,0,425eef900cf525324087140efd91b482b05d558c5f55446f554414b49feac51d,2024-11-21T04:07:09.337000 CVE-2018-4304,0,0,77755b866f9faaa6cdecfbe90d4be8e19b9e687a2e08e6cb5f94b189e29ba89e,2024-11-21T04:07:09.457000 @@ -124142,8 +124142,8 @@ CVE-2018-5725,0,0,79822325c5a821de89aa81ac16682cbe9adf34cb9b9dc0b60332dbe90b0a46 CVE-2018-5726,0,0,9888f90ad7a5ba433f59922ae646282d1590adfa56cbac417170dd7df0fe8e11,2024-11-21T04:09:15.433000 CVE-2018-5727,0,0,0400648395347771cf2bba52a2ff23ab71d95d886eb1334483df8d7adb46aa80,2024-11-21T04:09:15.590000 CVE-2018-5728,0,0,eee0e1be9a3ace058ab286f15d1a895507a11b0ef98644663c15b7537728af59,2024-11-21T04:09:15.743000 -CVE-2018-5729,0,0,8f7fe9b012e132d4e92c14eade04d3df806250f70d1268cdda1bed2a7b5b1723,2024-11-21T04:09:15.897000 -CVE-2018-5730,0,0,ed1b17a61898f020da65a3330040304ac1509f004bc0c6a3d4fd471b4a21b4d3,2024-11-21T04:09:16.103000 +CVE-2018-5729,0,1,89a6eb17554daabd3bb7a8eacd33c665dd567d75f838e3f223e1465173be65eb,2024-11-21T04:09:15.897000 +CVE-2018-5730,0,1,10b626fe2ee5a00b32d8635c22466cb915d7c556b29d2ca6a67164ae9d497c32,2024-11-21T04:09:16.103000 CVE-2018-5731,0,0,6877f354fedffb653d2353bd571c83b5162c21179ef85ea1383d9393cc6806c3,2024-11-21T04:09:16.290000 CVE-2018-5732,0,0,2abf4ff44118f8fb9993587e1d43620beb7fcf3f20e463c34e9bef8700c9c6c4,2024-11-21T04:09:16.440000 CVE-2018-5733,0,0,601072922e82701cab9bc4a61d6c57a171d97652870bf5fea0812fe73528c6ed,2024-11-21T04:09:16.587000 @@ -126020,7 +126020,7 @@ CVE-2018-8116,0,0,d7bfceeb6490135a68a6aff5f49fcc846f748ec3a3e66bc68f08499b10f7f7 CVE-2018-8117,0,0,6e1de1bb6a8f337e19d8a5d0244ee409dc6f51b8e2d764fddbee318ed3bc3fe8,2024-11-21T04:13:17.787000 CVE-2018-8118,0,0,de3e98a99d3b84c42e33f1d2f84accd4ddf1b611338cd791d01d9e7ba356e23b,2024-11-21T04:13:17.897000 CVE-2018-8119,0,0,e6b1fef257ef7a942ac83e229f66154bc140f085d88ef28dfd6f4b9418e067f6,2024-11-21T04:13:18.017000 -CVE-2018-8120,0,0,7b509b9f2c4a8dc9e0f88ca24d5f04da5de98bef1b6ee59f5e433e4130aaf598,2025-02-07T17:15:11.997000 +CVE-2018-8120,0,1,40eb37232795c19aa494e1480c55a609c33eb2f98e322b4d54727016b467c5e2,2025-04-04T20:30:49.757000 CVE-2018-8121,0,0,17e52c16f2993f6543cee98d13abadb6f3fc14022b060e9ddfa9dc407fd9146f,2024-11-21T04:13:18.250000 CVE-2018-8122,0,0,83ed6da84d34f0b6e05e4f9f28d3a304c0fbc5b7b6f44855e05806c3c9af2169,2024-11-21T04:13:18.360000 CVE-2018-8123,0,0,6e57a2d4db3609a4cfc377af52925142c49839428397631dceb5b1b6d3cf811f,2024-11-21T04:13:18.480000 @@ -126239,7 +126239,7 @@ CVE-2018-8401,0,0,ec5da5a6bcef00f9d3949fca9d9d5e176afe8a778d6433cce97d6d40d3f1b5 CVE-2018-8403,0,0,a322276b53041845e013b25d405b0c983ef2661c503dc57240c886811e9cd4ba,2024-11-21T04:13:45.327000 CVE-2018-8404,0,0,86b3f1620bb1b029924493c1f2691830505e03bfb1b966123d47fa29e88ba4cd,2024-11-21T04:13:45.460000 CVE-2018-8405,0,0,7489d0942129fa51cabd06cfa49ca2a7798fe275639a19a01e699067a054e50c,2025-04-10T16:56:43.263000 -CVE-2018-8406,0,0,b4a2a4bdd0f1b8cd21ef02439b2ea6a23799b77c3a645d0b8944a84908d9e0fc,2025-02-07T17:15:13.100000 +CVE-2018-8406,0,1,2b129cebad7551d3702f86992aa798bd969f8bf23e7590d55a1c8f8036b9e130,2025-04-04T20:27:34.853000 CVE-2018-8407,0,0,0ccc3f6829a19edfdd32bcb55a1469995ba071abe2afa118d46969ab52ca5a71,2024-11-21T04:13:45.840000 CVE-2018-8408,0,0,bab2637887ae7e8079b52705f64317229bc9add816db53fb70b6aea1bfcc417b,2024-11-21T04:13:45.970000 CVE-2018-8409,0,0,894d77eb773e241ccd037074239e989c6fc754f478626589f25ef37946a7f91a,2024-11-21T04:13:46.097000 @@ -126247,7 +126247,7 @@ CVE-2018-8410,0,0,59d42be0a0a1f39145097878f18c6c236ed958430397a598c7dd188cc49cdb CVE-2018-8411,0,0,107abd330e02ce7421bc961ebf5122ee446a693008affe40c5cbb36a7577a531,2024-11-21T04:13:46.360000 CVE-2018-8412,0,0,a02af136a235dd0abaa7f97981f4f88a822cac1b82a61b419de49a2b3b5646cd,2024-11-21T04:13:46.493000 CVE-2018-8413,0,0,356dfa37aeb7f6bdaceb86f05dbde584e1c91afc39a20d6efc221aa363c1d3f5,2024-11-21T04:13:46.607000 -CVE-2018-8414,0,0,a7342c43ae770fb1c42fe566ffacb3573da99464f1fa35cb9722c446dc6260cc,2025-02-07T17:15:13.290000 +CVE-2018-8414,0,1,9bc3b4c3afa68b96a26b15fd5164de2179fcfb51ce9b21df274ccef7d6890660,2025-04-04T20:28:11.753000 CVE-2018-8415,0,0,85fbbf429fed9d086601ed9090d7165c06357ab7a6d785eb468b5f75463a5e08,2024-11-21T04:13:46.863000 CVE-2018-8416,0,0,dd0d752814bebb3d44f5a350c77b9b79b321c8fa2be5f116aa3bc24df83dfb3a,2024-11-21T04:13:47 CVE-2018-8417,0,0,614bd25232ddaabb19345d0e96a96586cda372998eee0e74b6a0950f9f6b66b0,2024-11-21T04:13:47.120000 @@ -126386,7 +126386,7 @@ CVE-2018-8577,0,0,a37939f87fb8613fcaa1f9b3749855855e6ab22f4541764103e4fa662ae6d8 CVE-2018-8578,0,0,c3845b7683b296295195f4c72f82bfedbfbf991296f67c4b5d7a5ac2fd4e8e02,2024-11-21T04:14:04.460000 CVE-2018-8579,0,0,fb338fafdc43e642a9801199527c1a37d85e0686b3bf929fb8ea36c5770f9a3f,2024-11-21T04:14:04.570000 CVE-2018-8580,0,0,6cfac3d8f82cd6505408218bec5738b927926f9b3e2e3c2f81e587ffcec25999,2024-11-21T04:14:04.683000 -CVE-2018-8581,0,0,fa42f23f709366992944032002777516c0daf399966a56f398e439eebc8fef60,2025-02-04T16:15:31.400000 +CVE-2018-8581,0,1,75b3b4eed3d60ee11222baa8a5ff72b994588894c9ad24e2d9ad1426ce1d70d2,2025-04-04T20:30:27.250000 CVE-2018-8582,0,0,5530f4e0697922a0c5b19038a38714f2b1322a28b95e31c013e5813fe7206489,2024-11-21T04:14:04.893000 CVE-2018-8583,0,0,3e8b2518c174e5fd6b22b8afdb3708d6b23bc783be1b23267d194a7154d64bdf,2024-11-21T04:14:05.030000 CVE-2018-8584,0,0,c58a6adf8bf131feb510df0cfce4b001b46f4e75023bc31c2a34bf87491d5e68,2024-11-21T04:14:05.160000 @@ -127630,7 +127630,7 @@ CVE-2019-0539,0,0,c73a3d36f90d9c6dff6809040077ae483187a0f062d6d85f6774cd37654d1d CVE-2019-0540,0,0,92ee09f5b1924f3ebce93d331f303c215d97d91da02233f652258f8deee2e47d,2024-11-21T04:16:49.117000 CVE-2019-0541,0,0,6ba323696cee96ff32dfc874572e77ac27ec2922e1ca4b8bd87a87c1a3dcb423,2025-04-10T16:56:24.640000 CVE-2019-0542,0,0,14ec09a29e1407a93d2372effd914d8d28a08f679c05677d3254c7f81ad98292,2024-11-21T04:16:49.423000 -CVE-2019-0543,0,0,c14a19eaf95f2e38abf58ebe7fd2e695f3dc77f9db1a96d2c8585c31b9011939,2025-02-04T16:15:31.837000 +CVE-2019-0543,0,1,9d60d74d9f39c453911698073cfa78c81605d820b92d0e1b7359bdfea9fb532a,2025-04-04T20:30:18.077000 CVE-2019-0544,0,0,9f794b8b887b44cb7f8bfe74a8aea542043eb92ca78a6138037744860a9a6c0f,2023-11-07T03:01:54.657000 CVE-2019-0545,0,0,c6b46d83898deb37ce8bab6eed71637453c2a8637033092729a487a5da325817,2024-11-21T04:16:49.683000 CVE-2019-0546,0,0,184bdf5ad49c35937422c96cf09b1b8114e43d86520bddb5ae13e47357d6ab1b,2024-11-21T04:16:49.840000 @@ -127890,12 +127890,12 @@ CVE-2019-0799,0,0,58d0091d1eb1bf7ebf21939f57a3b245ed7b0a5615e185cb0feac7ce0ba696 CVE-2019-0800,0,0,e7284af79f2a0eff3975a9cb2cbe55a301dd7241880d9083c972ae1a61e219eb,2023-11-07T03:02:03.790000 CVE-2019-0801,0,0,a867c7a0895a9eb3dde984d4dfa0c4f53e3ce5316267e5bb6cc6e592305e8625,2024-11-21T04:17:18.350000 CVE-2019-0802,0,0,2628e797a8e09f18d4707addecb043133570508621cc2819338f3bb660aa02a6,2024-11-21T04:17:18.450000 -CVE-2019-0803,0,0,20c7f5b63b5cd0f84688f82004138ee5afd3447c2c38cfc3f1dbbc06df2b3531,2025-02-07T17:15:16.230000 +CVE-2019-0803,0,1,0e1f3887190d4ba5924f50454b969ad5c1dd190c7e6832ac380d6c07018dd0f8,2025-04-04T20:43:32.380000 CVE-2019-0804,0,0,5feeb7b73a8234d96b11bd96a457253d4093c1ac883ba47dde91a1af9fff222f,2024-11-21T04:17:18.673000 CVE-2019-0805,0,0,14f16fdebed423439e9f4a34eb333849b816135d64745fcc6ebf561545b36c08,2024-11-21T04:17:18.780000 CVE-2019-0806,0,0,bb268c3e5fc396e56be6f50af2eb5bcb8fe7b694edbea1237582a2e63e85d1cf,2024-11-21T04:17:18.900000 CVE-2019-0807,0,0,7f61e8cf377df686f7c9e89aea30597f1635e4599e3a6dd7674d0ddcbf1ea9bf,2023-11-07T03:02:04.083000 -CVE-2019-0808,0,0,90e3365bae0a37e2f22687e60556d2b64d1a122a039a184b9c850a214b16daf4,2025-02-07T17:15:16.413000 +CVE-2019-0808,0,1,a0f1e33d4671a67a11e83792c79398d978e95310ffa6262d57af290e0a1f3599,2025-04-04T20:48:21.523000 CVE-2019-0809,0,0,6f8be398fcbb862afec9ba85c5e4df55888f8fbb203f38cbafd7471152d6fde4,2024-11-21T04:17:19.127000 CVE-2019-0810,0,0,55e076ed465127552fac6a6a13468431a7cd9c6c696c3ba1bac451d4b299c4f4,2024-11-21T04:17:19.223000 CVE-2019-0811,0,0,dee8e97db7166d722247017238b13ce185c414e6f52a1638d2f83b7dfa2fbe48,2024-11-21T04:17:19.340000 @@ -131421,7 +131421,7 @@ CVE-2019-1321,0,0,85356204dc592489cd2237ba60698985b538ae4d2f6405d6416298d6b5aab7 CVE-2019-13217,0,0,270c15a2297a74168c601232215f604cc09932a804ba8c0d8b925ff614d88bc4,2024-11-21T04:24:28.070000 CVE-2019-13218,0,0,068754b3aac0330171c517fa202b35e3e560f759cab3478a7e34f4a7e0a519d0,2024-11-21T04:24:28.223000 CVE-2019-13219,0,0,e75598f26f80a57d74032b2516a6225a3b70b75c6e13c6401ef24a9edda29b94,2024-11-21T04:24:28.383000 -CVE-2019-1322,0,0,12ca77e019838ad084bd83e1b9bbf2e5d4e941e7271568a1e1649f8f945ceed6,2025-02-04T16:15:31.997000 +CVE-2019-1322,0,1,fba8ebc0aca0a8baea5dd051b50600741dcbf91272b62981bb40a26a541c8c7a,2025-04-04T20:28:29.057000 CVE-2019-13220,0,0,60cb3a84a60b7c878f814837989cfff36db1e50b7fad9b8b481b5990e87b8eec,2024-11-21T04:24:28.537000 CVE-2019-13221,0,0,066b7847e47337a52a45eee1522252cd2b24391ed1934bc763fbb1cf3bdca914,2024-11-21T04:24:28.680000 CVE-2019-13222,0,0,ba4c2c4483100c9cf5af83be2fb17bce8a8ab9bac675e7d3f369eaaefd685c05,2024-11-21T04:24:28.820000 @@ -132344,7 +132344,7 @@ CVE-2019-14286,0,0,775a649fa243cb73c96aa4ede07073945f3c8feb61b7065eba17211bbb7d5 CVE-2019-14287,0,0,b82f1d27a69feac6e1ed969ccc464c95863d73f0d63eeb598acf37989ba8bce2,2024-11-21T04:26:22.577000 CVE-2019-14288,0,0,77844b8affb728285230943c3d84de317bbfd6087132a5385c18d3dea6d38626,2024-11-21T04:26:22.813000 CVE-2019-14289,0,0,d5874ec82f6527d38988c8be2f3868a6fb11d7a646efaf70c0b8c790ffd801ea,2024-11-21T04:26:22.953000 -CVE-2019-1429,0,0,6653ecfa5d24cbe2d2bc9e5aae8524532bd4424b0e2d76cfdc2747ee77af8187,2025-03-13T17:14:11.647000 +CVE-2019-1429,0,1,c5f21e8fd8e0632f37db824c99e503ca62bad6bb1acd2293de7fdd62b9a2c759,2025-03-13T17:14:11.647000 CVE-2019-14290,0,0,313b20f6d9da958256279c657f2b817d820be89a4ac31d0307149478ea6c2512,2024-11-21T04:26:23.090000 CVE-2019-14291,0,0,ed02ef06fd569b050141fa5e2dcee1edd7b4fb0f807e143f41a504ab7bed1e55,2024-11-21T04:26:23.250000 CVE-2019-14292,0,0,bf63f28a0700163c901dbd89cf7a55a7330b6bcbc1aaffc089f1a43a2e88ba1d,2024-11-21T04:26:23.400000 @@ -134117,10 +134117,10 @@ CVE-2019-16145,0,0,2b69793269a5c57f810460bbda040d4d304e9b33a2f77ee33c1b9dbd7a8e1 CVE-2019-16146,0,0,8af4cc473afa15f241018492211f31b0c205758b9e43471a27fa6bb334e16b4c,2024-11-21T04:30:08.760000 CVE-2019-16147,0,0,4a7f39c9d20d6dcf2dade8137651897c7dc2170f14c4c449edf6cbfd873354a9,2024-11-21T04:30:08.917000 CVE-2019-16148,0,0,a19ea0830015076ed2aa786790a8f5f0b9992b0755be9e2897b7be066260328d,2024-11-21T04:30:09.070000 -CVE-2019-16149,0,0,2cb421071c1a53d452a513e274f437d0540bc407be61bcccf99b9f12f5e3fc52,2025-03-28T18:11:40.180000 +CVE-2019-16149,0,1,4b2015eeddf9a42ae8073ac70ee5611a2f759bb901aaf555ee11513ccaa18845,2025-03-28T18:11:40.180000 CVE-2019-1615,0,0,aa52848fb05b8b2f8938e61eee3cdc6d5553493898d3d1ee2281bb1d6547d88f,2024-11-21T04:36:56.073000 CVE-2019-16150,0,0,a6461a4622b00ba70e3add49472eab1393dc846b2d8d2e8a753bdc0b6916d833,2024-11-21T04:30:09.220000 -CVE-2019-16151,0,0,1619c81149aaeee65f92e22a5d98f4bcb41d79ec2193c29b7ddcffb3202ceed4,2025-03-21T16:15:13.210000 +CVE-2019-16151,0,1,bed7de91743cd8d0252be7f35f09fc24cb44befef4c331b01aa2b6b558bb2e98,2025-03-21T16:15:13.210000 CVE-2019-16152,0,0,131cc19e20054d2bf5ae58c81eac14d7c9cd0a3eb2b604f29ab52be39d83ff25,2024-11-21T04:30:09.340000 CVE-2019-16153,0,0,d575345081973e4fcc8f9153136e3d576f01551c1b047ab612d9da9abb6b3d45,2024-11-21T04:30:09.460000 CVE-2019-16154,0,0,1ff82499783ec63d49ea8270078edd98a0c47eef625fc27184f390fdbb5fad1d,2024-11-21T04:30:09.590000 @@ -136321,7 +136321,7 @@ CVE-2019-19045,0,0,819333f2d4f317f3258589f967c788bd309aa8ecf95c668675e18c04363c1 CVE-2019-19046,0,0,8987a45d05deb3cd3a08c21378a7d20a9ee8bc3609cccafcbb5e35b01d4f4898,2024-11-21T04:34:03.773000 CVE-2019-19047,0,0,cb343d11b8c4e8202adea20892f3da33685debcea842b5b8a2288e6ea68f15eb,2024-11-21T04:34:03.933000 CVE-2019-19048,0,0,3da2b293cdb641ef1900d5f9142e3956b032b28fd106db70735bd795ec71dc93,2024-11-21T04:34:04.083000 -CVE-2019-19049,0,0,eb5503ed50585f513cf57037661dc9c43e92f940f4ab1eb080b872d3df21d9ce,2025-03-07T14:37:52.380000 +CVE-2019-19049,0,1,51e659172958df6153bbda629ddea7d03e23770f9c1c9ffc585b76fade36ded6,2025-03-07T14:37:52.380000 CVE-2019-1905,0,0,0b0eb4362f19b07aea9340092a53aa6ec78876ad887d29a07805e338537aaff2,2024-11-21T04:37:39.443000 CVE-2019-19050,0,0,2a878b8a0e2c61d567fbdd2b56dfd6f9f43844593e9b39ce9662625233ee1896,2024-11-21T04:34:04.403000 CVE-2019-19051,0,0,125269ec287e7bfa24a3821003123e06e7e3f35db5c63efafd5dfbf9140883a0,2024-11-21T04:34:04.570000 @@ -136338,7 +136338,7 @@ CVE-2019-19060,0,0,d738aaad4f4b77e0f81a7ac05b7d1cd3264beddd4ccd121d1816b5cd5dae0 CVE-2019-19061,0,0,f726ff0ffe8d7a7031615ef88568fa372712e05b830d80e3e0b9bbf8d2c6835f,2024-11-21T04:34:06.290000 CVE-2019-19062,0,0,2cc525dc40b384ac52287da50b289d6083de7a5d24f55a6c572966970a320830,2024-11-21T04:34:06.457000 CVE-2019-19063,0,0,dd9f7fef5aaa480bbd9af8e7e3cc904ddf9b9c161b7da5d6e7a90defd8c8febb,2024-11-21T04:34:06.637000 -CVE-2019-19064,0,0,7202727de221005e33958256686e8670032ffd4308fdbb37c47ee4c81b78eb10,2024-11-21T04:34:06.830000 +CVE-2019-19064,0,1,9c1ea68e248b182c71e74868de60664e5bae2d23d779143f67c6274cdf55be3a,2024-11-21T04:34:06.830000 CVE-2019-19065,0,0,d2170bbedba2ed59c8401426279498fd185fae12f387c72fd1346575f8b8a582,2024-11-21T04:34:06.993000 CVE-2019-19066,0,0,05b0e9001c200a682f2f1fc0bcc7e5d90897f78f4bbcf8f059c01ec15967813d,2024-11-21T04:34:07.157000 CVE-2019-19067,0,0,deb1a3163424a7c8264270fe15e3485709cb60eea77a9876a0c3550d19902282,2024-11-21T04:34:07.317000 @@ -139366,7 +139366,7 @@ CVE-2019-3817,0,0,592b35c353dd2114f26453cc560be5ec71314ec22e34ec818e406cae432df9 CVE-2019-3818,0,0,2c72062f34152025a7d1b75c2c5ab47453d3c3f5f831af1f21d2c412b82153d9,2024-11-21T04:42:36.370000 CVE-2019-3819,0,0,65d645bf308a1337721532e9edda6777a1876d494b03e0e70d4809c4f105ad63,2024-11-21T04:42:36.500000 CVE-2019-3820,0,0,4866d90338e521274bcae1e9946a2798879a88211c029e3992d6674aeecca5e8,2024-11-21T04:42:36.647000 -CVE-2019-3821,0,0,36d530236a6c26b5f728d91d9f88910539474c26fa5b93e71c421051ef82163c,2024-11-21T04:42:36.780000 +CVE-2019-3821,0,1,e9cbc971fc3b8054c52ed5a919ee71f6f22c7c6c6acb396cd0c957514320ae56,2024-11-21T04:42:36.780000 CVE-2019-3822,0,0,7aa1d839ca2689d192c1504e68742211716bdd2f91bfcf445449fbad6385d41f,2024-11-21T04:42:36.923000 CVE-2019-3823,0,0,a6db19cf00d3ed51437a9fd5cd25eb1f3fcac889bbf6dad68c70c9d07c4ff74b,2024-11-21T04:42:37.110000 CVE-2019-3824,0,0,2474b45a27d07d91a71add860ea28e2acf277015d171c60215fd928a9a63c6fe,2024-11-21T04:42:37.283000 @@ -143374,7 +143374,7 @@ CVE-2019-8896,0,0,0aa9f842d33b9654dca889f38decb1175af9e672aff0de6031f4293693edf6 CVE-2019-8897,0,0,3a223b38a5e7116d2df782d1b5e1ba7ab87c296ada6b209ce5ca6d5edff411fa,2023-11-07T03:13:34.413000 CVE-2019-8898,0,0,813b02bbfc4312cb306a094d98b5f0ac09c3f6363393f87aa8b3daaa16fed4bd,2024-11-21T04:50:37.380000 CVE-2019-8899,0,0,adf1901d7d55b77103a59c4f9ec8380c05cd97ee805925ad10db4d2ed3234af5,2023-11-07T03:13:34.457000 -CVE-2019-8900,0,0,a2af87597175da7efd7cbcc43e0f15b02a48e135a6d0e19ddd04348b171f8ba8,2025-02-22T16:15:30.333000 +CVE-2019-8900,0,1,9f986019fef0fb661b178a3233be444d78ce138cf7da20b7b55fa2b35dab5548,2025-02-22T16:15:30.333000 CVE-2019-8901,0,0,43232e83bf8db4ecdfe2bc0ccfa5289d05fdd242ffbb871121e8cabe69591986,2024-11-21T04:50:37.507000 CVE-2019-8902,0,0,1ae49e00242bce279d5f897c9e5597933981a7d3a204202a57299ddd8069fd2d,2024-11-21T04:50:37.610000 CVE-2019-8903,0,0,27a56ed767f19aeb566cd9b0ebd8b7ebfdd6ff5db988a0d0511852cd09fe5d47,2024-11-21T04:50:37.747000 @@ -144306,7 +144306,7 @@ CVE-2019-9974,0,0,3d465d230eebcc442b36b854518a61956b66b4f7c5cb1a8559528635dc13d7 CVE-2019-9975,0,0,98ea233ad4ab91a3d7caa85b949afb9bd21131dba357cfd25275f86660656db9,2024-11-21T04:52:42.890000 CVE-2019-9976,0,0,e28cafc2e4c205dd3c8e228a98a0141fc2e10296a093b2bf71f683cbc803d51c,2024-11-21T04:52:43.043000 CVE-2019-9977,0,0,ec2527cc5067dbfc68f10d30dace6b96bf83e89c5a29082622eeba6e74a9d826,2024-11-21T04:52:43.187000 -CVE-2019-9978,0,0,220ac6d960c4f941764f0faba677a0c6a2b8f6ed66c85c97cc56a1d56d0f476e,2025-02-28T18:06:20.323000 +CVE-2019-9978,0,1,82011be03f32f9f2fafcc415a12990b98b48c5f49a1ec3325a6e1d7d2914fbfe,2025-02-28T18:06:20.323000 CVE-2019-9983,0,0,511c668feaebd8d95980cf01158100a0f8ab755779eb3befa71dddab6b9af4b5,2023-11-07T03:13:49.863000 CVE-2020-0001,0,0,8fec3cabe322d4c072da09e85c8cbcbccee53ecf75a633aa320b9ff47c927d42,2024-11-21T04:52:43.530000 CVE-2020-0002,0,0,b62b8053cf851d60e105942a11975e98647ccd87f935c5857126072ec7aef36d,2024-11-21T04:52:43.650000 @@ -145093,7 +145093,7 @@ CVE-2020-0792,0,0,a6015feec0a34b742ee81719a2f63158fa09a07ab11fac2e18cc47c268e7a9 CVE-2020-0793,0,0,f1e4bba0d9d29de61e8ac7582e616aa90cfc14c113ec2eb72cd708db50d30441,2024-11-21T04:54:13.640000 CVE-2020-0794,0,0,ad9e77fd6552ddc6d1f870ed0c284703676069ef880165bcdba77bda0c52ed05,2024-11-21T04:54:13.763000 CVE-2020-0795,0,0,96a31687e16433bf999fac91ef0e7272c0365d707b9c8761f4b5648976d4f7b0,2025-02-28T21:15:14.650000 -CVE-2020-0796,0,0,f348c3d3eb2f54cc4bd9f5c5d71468fab55f3d027a2811ca92482e917ae1091c,2025-02-04T16:15:32.283000 +CVE-2020-0796,0,1,b77d43d7384309ab2a971ec7a17617277b8acd543a91fd552375af7eac20fcc4,2025-04-04T20:28:23.720000 CVE-2020-0797,0,0,08b2d3e02cb264cfadd4237cf9cd4d19ecd78df1d89995b83594269b7050a381,2024-11-21T04:54:14.107000 CVE-2020-0798,0,0,147a88c30d12fc1c50cfe588b515514e6e9d3b3f1062894c24f70a02b494ee51,2024-11-21T04:54:14.223000 CVE-2020-0799,0,0,262891ceca543ea99d49bf617b1a5a6fc678a1c8751d75424b97fc14465f4190,2024-11-21T04:54:14.333000 @@ -145170,7 +145170,7 @@ CVE-2020-0874,0,0,b2bdd4f05a8228a5b8884752670f8e1adb46797d342f5c0673221ee8c01eb2 CVE-2020-0875,0,0,9d7c3395efbb3edbd3e6931090081e165ba4027d2859fc026cc16046ff06a9ff,2024-11-21T04:54:22.810000 CVE-2020-0876,0,0,31ac2cb17f75b7735bfac75cabb751742af194522eaf42a54e0cd64ea163d76c,2024-11-21T04:54:22.933000 CVE-2020-0877,0,0,445ab6237b6489f4a2f4d5050bfadd9f2311ca2ad518b64399e78fefac0919ef,2024-11-21T04:54:23.040000 -CVE-2020-0878,0,0,7a1d0223e4ff72ace5a7967cb47eb81876856ecb2ecc83c62600a440c0dcb5a0,2025-03-13T17:28:30.013000 +CVE-2020-0878,0,1,327b913222875a75218ad7ae823193920a5b3975abe95d6fcf7dcdc2bd0ec00b,2025-03-13T17:28:30.013000 CVE-2020-0879,0,0,e32bc4da42a4e6c20dad4016d5236dc104fbe82bc486b3105dedbc1c34f1c5c0,2024-11-21T04:54:23.320000 CVE-2020-0880,0,0,10623e555f16a0b86ab6a56ec235a41f63cf8c6c51f7d37586f1d13cf740a4a7,2024-11-21T04:54:23.447000 CVE-2020-0881,0,0,8b9df3a81768fa5d97f86e4f41fd8daffd97004c3da4b7c2830cee60c67e4810,2024-11-21T04:54:23.560000 @@ -145742,7 +145742,7 @@ CVE-2020-10535,0,0,3b46e11ce548356219456e7be9446007aca0781fce2c61a7cb47f37948cd7 CVE-2020-10537,0,0,c0a2a0a5a13a1cf87a250f1eb7c06cfd821ee928ed177baf903bd3cfc98b52e8,2024-11-21T04:55:32.237000 CVE-2020-10538,0,0,4c96bf14bc94f16200c72ca3a798bd17a4735cf7ce831cdcc1447b9c2e455b46,2024-11-21T04:55:32.383000 CVE-2020-10539,0,0,e5714f688eeac0e74337ff51e10d5f84461ff69d69a85b91263d045e7f351472,2024-11-21T04:55:32.520000 -CVE-2020-1054,0,0,96ac45f4ff2f392115be62be4e1ffe4498d52a5c815119166780ed05caec00f7,2025-02-07T16:15:32.953000 +CVE-2020-1054,0,1,4994a7e5c768dcd80dee5441cb1577661da5c4a94b2556f78f3389d64e0a54cb,2025-04-04T20:31:02.340000 CVE-2020-10540,0,0,dd9af5fa9f22f1ef707cf105cb0ea2714882cb8e0ce01c25bc842ccf4c4be972,2024-11-21T04:55:32.653000 CVE-2020-10541,0,0,1f5ceb2f8a4492afc207f99e325c108b05dffd7215e4d665a496f521df6a7aa3,2024-11-21T04:55:32.783000 CVE-2020-10543,0,0,c3772f9fd683b7caece69dc9dc75add420520cfba8e2fcfd542287c5367a4ccf,2024-11-21T04:55:32.927000 @@ -146234,7 +146234,7 @@ CVE-2020-1102,0,0,beb55d980417bd8b6d1ce31e3a0727b369b5062516d21b175570c1b1aee391 CVE-2020-11020,0,0,a0d36a559ebe7f953236588db302bbdd420d19b4ac6cb48d12345feacaed921c,2024-11-21T04:56:35.843000 CVE-2020-11021,0,0,c19a191fbddcb3f9a17a7591bedcd6fc94ddcd9ad61bf21f8bba572829211e6f,2024-11-21T04:56:35.970000 CVE-2020-11022,0,0,b9af85a8c30b617cd88d73a72bfd445ea341c37ec58205246aade7d3a64a8e02,2024-11-21T04:56:36.110000 -CVE-2020-11023,0,0,3d1a637754c7000abf2e5f1c0865498bb1746c11e79852ed5ff6602e916d9f94,2025-01-24T02:00:02.453000 +CVE-2020-11023,0,1,faf49ab730f77626881212c8e927e0e664a6e8f9ebf81e6c820df4feba017683,2025-04-04T19:53:43.140000 CVE-2020-11024,0,0,35d884b343f59a576a889d1f0a1e58df1211a54ba4869f675bb373afbcf25f85,2024-11-21T04:56:36.803000 CVE-2020-11025,0,0,02e56c0d9fe23dd773712d5f3331b73b0d5cba4fd9ea3a26495134cd48189d2b,2024-11-21T04:56:36.933000 CVE-2020-11026,0,0,6af682f657377c77c2e378246407611faae42b9f229818a297da012ae87ff400,2024-11-21T04:56:37.070000 @@ -147269,7 +147269,7 @@ CVE-2020-12063,0,0,3927d1609f32771f4d98fcb7a9068645d3afb9729416544105554e064334a CVE-2020-12066,0,0,895951bef26856a4ddc9e9d5ec525999243aa1a62e9c36afbb44c5a0c7f2e18c,2024-11-21T04:59:12.393000 CVE-2020-12067,0,0,05d13ece476858059722cc6a8644237c86b1b196adfacd79b5575fd4ef2e4099,2024-11-21T04:59:12.543000 CVE-2020-12068,0,0,ae1ee6148620821fd5671e92fdfb25e86ed80548ad6c3f471284d6788880683a,2024-11-21T04:59:12.677000 -CVE-2020-12069,0,0,2a0313a7a3e5d6821e14787ebd25aad4fc34fc5ab7b3b9eef6f74a595011f901,2024-11-21T04:59:12.810000 +CVE-2020-12069,0,1,fd4e0dccd60de0fc0ca027582b0d93f86e52c5208959b0ebe7d18370e8607af8,2024-11-21T04:59:12.810000 CVE-2020-1207,0,0,a37aa041765dfb864723114083edcb2cb2c48dac881e24c30c597a5d43453854,2024-11-21T05:09:58.773000 CVE-2020-12070,0,0,d4c5cd5451bed1f9df244d29add8e84bf9ead67c94c679344ca9ec6ece7aab92,2024-11-21T04:59:12.997000 CVE-2020-12071,0,0,0536a9ca084f693a74284a34719ed9118698b6cbb83b4e7c89e344439c31ad6f,2024-11-21T04:59:13.130000 @@ -149627,7 +149627,7 @@ CVE-2020-14636,0,0,895b807dc05f9d6c68978dd1484c8c64c8d31b66f5a7a53769c3dccaa81c9 CVE-2020-14637,0,0,1a0acac610770af967955d50ca16527018e1ec2b4635d9b8ad472128f735f9c8,2024-11-21T05:03:45.470000 CVE-2020-14638,0,0,25e060b6ead3d2b2e5e9f44eaa71d4eec2f8b784cdabb763666c9ae800a85e1a,2024-11-21T05:03:45.620000 CVE-2020-14639,0,0,d09c47c08de82bc3ab92626054f140498221347e0d78268ddf5d615db21f53be,2024-11-21T05:03:45.777000 -CVE-2020-1464,0,0,47743c592c2aa680e08226c0861454e7600478389ca9e545f3f4bbf2c99599b8,2025-02-04T19:15:22.740000 +CVE-2020-1464,0,1,19be9fe6fba61d627f058d5a1ba423ec053ba09822edba12232a3c0966fc1401,2025-04-04T20:47:25.163000 CVE-2020-14640,0,0,a27e3224ee65a68b3b4675e75bb7b6e909ea869b78fcee086fe6468d9a34f692,2024-11-21T05:03:45.933000 CVE-2020-14641,0,0,a6832a5e45fc816124fc86bc7b777b34f7637610e394788f75d05417c02acec9,2024-11-21T05:03:46.080000 CVE-2020-14642,0,0,c4f70390931b95f27c1057bc05431a463ac8668dd6181e16deaa602260c084f5,2024-11-21T05:03:46.250000 @@ -153570,24 +153570,24 @@ CVE-2020-22612,0,0,2c6bab4f525b1776cd9261fd3f340dadf1dab0378d3dbd64c11e92ebb5b94 CVE-2020-22617,0,0,eb26e6e1755645cfd54c81b9b982f9e722567f65e85f38191f5dc02089c6cb39,2024-11-21T05:13:19.450000 CVE-2020-2262,0,0,95a1201ba0fca9e36452bf9e0328a484cc5221f9e6088fb49c65aa8cf852bf8a,2024-11-21T05:25:07.810000 CVE-2020-22623,0,0,44249f87cfaea27ef10302e5dcfed045bf111bee105acc194d2fec6b4a26bbe8,2024-11-21T05:13:19.607000 -CVE-2020-22628,0,0,2630db3b9d4684e6a0ef096132c091467e41e79e92b91f6192380e5309d0099b,2024-11-21T05:13:19.760000 +CVE-2020-22628,0,1,30702c73e90dcb2c316b36e4d043900f5dceec86145d176e8d392321e78408a6,2024-11-21T05:13:19.760000 CVE-2020-2263,0,0,f56cf4396983f7dcc1c9d0f7ad4f5e1696838b5469a0df0274ab52e17841e471,2024-11-21T05:25:08.020000 CVE-2020-2264,0,0,049ff1acc8cfe50763bbb01d83d59fd752ee7e34a024aac5b31e2b8bafb4cde9,2024-11-21T05:25:08.237000 CVE-2020-22643,0,0,af6ae3058a1cebe2453fc6bc2d999778141cf8a6880f41e397270f387263b691,2024-11-21T05:13:19.910000 CVE-2020-22647,0,0,d35a955b5c461fa05439c97db25ead1a15f77e924d46286bb23ae3f781c09b2b,2025-02-26T21:15:11.417000 CVE-2020-2265,0,0,db9e75f6d95327a9af604e7c7503d4df968a0197787f9241dcd93c27e6043194,2024-11-21T05:25:08.467000 CVE-2020-22650,0,0,beee4465bb2c780ee6650724ff6701022ee142703fc6eda7dfd0a2d830a606bc,2024-11-21T05:13:20.193000 -CVE-2020-22653,0,0,1cb3cd053d09d119a525e048023df7947e369aea73abc08414229b8c8369352e,2024-11-21T05:13:20.340000 -CVE-2020-22654,0,0,afa4283fafed40540a8d275fed08fc538bb3febff27f49626e644454c38131b1,2024-11-21T05:13:20.507000 -CVE-2020-22655,0,0,24f2c47434a6ca24d366b43f242e4a384fbf008a3fb07f6e58d4257234041132,2024-11-21T05:13:20.660000 -CVE-2020-22656,0,0,c292008d4f1a62c1c63534b8fbf3685ac551521ffc1e6fd5927b00e91135d46f,2024-11-21T05:13:20.820000 -CVE-2020-22657,0,0,ee76fb36ffdc5df5dd0bd6c725a3825ceea33c79d93bfceea9c0d2e76ae1089a,2024-11-21T05:13:20.970000 +CVE-2020-22653,0,1,19ac3d62e787e83659d6a71f63b258e28c653ed3cafd02995d221c77b0672758,2025-04-03T18:15:38.367000 +CVE-2020-22654,0,1,3d9b38b73050b85f2a3fabae2190c85c453126e32ff4a5139b2c3598a0ce770c,2025-04-03T18:15:39.100000 +CVE-2020-22655,0,1,f1ae1ca8c262c9269df6ecfcb281aa2039d17e7f4d895d009a6c61bc4580991a,2025-04-03T18:15:39.303000 +CVE-2020-22656,0,1,64c88b80222ec32ca38e79839068578117bc5f3a1006fd396511f6fe6bfc8d94,2025-04-03T18:15:39.513000 +CVE-2020-22657,0,1,368502a49b5d6d0d4f7d95ec6ddeefb9d4cf97279dc967fbddfee7bda2ca73d3,2025-04-03T18:15:39.810000 CVE-2020-22658,0,0,8a215c2688d6cdcc17b3bed60a6df1355e21cea9985ab9aa1ae73e77cca09f13,2025-04-03T21:15:37.287000 -CVE-2020-22659,0,0,9c89df2c67fa97e0ba07bb80dc8c37aae147b2befec07fdbeab47cd41a74ad55,2024-11-21T05:13:21.283000 +CVE-2020-22659,0,1,26cfc7e6e749599df8e0127b7270d58c63aba07485e1bdd6b9a04f2d5e3e5d8b,2025-04-03T18:15:40.023000 CVE-2020-2266,0,0,bbcc21a2e23b4364b1c2b93b7fc74b04e425d6ca809809ea23c67e033dfb75be,2024-11-21T05:25:08.650000 -CVE-2020-22660,0,0,b5e9abae0063d24c7b2e6dd27d52572166003c75f2080ce2261aee553e0462a3,2024-11-21T05:13:21.433000 -CVE-2020-22661,0,0,1bf6a52d80927fb30efad796dd98e3c9a79fe5fe8ad20113e865035ab3d81d12,2024-11-21T05:13:21.583000 -CVE-2020-22662,0,0,ecac9b3540039f70f95152170e7dc7b13df6b22139da32d27e42ed189a2b91e0,2024-11-21T05:13:21.733000 +CVE-2020-22660,0,1,1bf2f026c810afe3849e76a33f13e1aa3f0051e7d6f8efb21e8a3047be05a468,2025-04-03T18:15:40.227000 +CVE-2020-22661,0,1,3ab5e6150760dd9d02299eb609e26260d7b0743467e387aff15cb88fe4b61f6e,2025-04-03T18:15:40.423000 +CVE-2020-22662,0,1,c8b3ef2632ec75b6aa19634995d0b772f40ada27410cbcd3d7cd62085b0bf795,2025-04-03T18:15:40.630000 CVE-2020-22669,0,0,bd541c510a66ceaa48805b807bc0a4dfb0d11439b59d9936ec675b8ba4d047ab,2024-11-21T05:13:21.890000 CVE-2020-2267,0,0,2646dcc8b849128756c22742efe5e30623f474971877f7978c391f2840ebdb11,2024-11-21T05:25:08.837000 CVE-2020-22673,0,0,8dc5bbbd0c2aadeaf0985f620406785b3d39112184e08d9a754274fe0ab3c516,2024-11-21T05:13:22.047000 @@ -153778,7 +153778,7 @@ CVE-2020-23243,0,0,314960ec2520ea38bfc1bfaeef31233c6f3a8be00d0c97fc7c83df40a5ef6 CVE-2020-23249,0,0,fb73178f1a9133cc0e0487f7435d0a7c05f7bcedc20c7afc89092ca6ad649eae,2024-11-21T05:13:40.510000 CVE-2020-23250,0,0,9bd7799a4467cea185f31f06cbe080ee10a616e1f8ecabbd42cc280539d6931b,2024-11-21T05:13:40.647000 CVE-2020-23255,0,0,c58ffa917f3c8ae4268020362a9698bcb54fe07368e69353e275bc3cba7bded8,2023-11-07T03:19:48.423000 -CVE-2020-23256,0,0,3a28647b096682a62651d74f45d8245cb11dd7d2a22261e5d5a1884f41e0971d,2024-11-21T05:13:40.810000 +CVE-2020-23256,0,1,0c7866b25557549e8bc266308dc64d4812129f2ec80afc4c39f1223a74fc0b43,2025-04-03T18:15:40.867000 CVE-2020-23257,0,0,58db84c4712c69083c7e5549cc4247538f9d8b1ff47d27c2b85116149b1b8247,2025-02-13T17:15:26.383000 CVE-2020-23258,0,0,1f38838d4737e0dd5397d959b39c571a6fd5dba0c6b25adba2ea5eb1b372b877,2025-02-13T17:15:26.553000 CVE-2020-23259,0,0,23eebc435ab87cb5354b07a6863a92d25030f7a9e38d303cc92620023484804b,2025-02-14T19:15:12.967000 @@ -154195,7 +154195,7 @@ CVE-2020-24366,0,0,762eb98e709d3f0bfa901baa094ed931c6e7f45e460bf1c695d1a76a8abe0 CVE-2020-24367,0,0,c61d88dc3cef09e4a47c78293e141938d02a07f117a8b5f8330365e53e84f514,2024-11-21T05:14:40.640000 CVE-2020-24368,0,0,0058d2336417b6c4f45c140e59ef139889212b47f698112b5562ad57145a6078,2024-11-21T05:14:40.790000 CVE-2020-24369,0,0,bec4416bf14ed7160ccc104bd43cd8923dce20a7695f01a882929c3bcb5cb5af,2024-11-21T05:14:40.963000 -CVE-2020-24370,0,0,4ae695856221bdadc9beea85d6400c83ce0cc9b524bf455cc3f34ac8b180cf77,2024-11-21T05:14:41.110000 +CVE-2020-24370,0,1,10664e0286fefa74ea1ec29fa3c22e379283cf9ec27a33371755755ab1db33c1,2024-11-21T05:14:41.110000 CVE-2020-24371,0,0,ec9e85a8d1c4261b368f846b674fddb4e545549e39481fa0626e765b72631c55,2024-11-21T05:14:41.293000 CVE-2020-24372,0,0,44558c0f20227fd65f241600befedf161e8bcaec0afca0e61dfc8f23d55fc47e,2024-11-21T05:14:41.440000 CVE-2020-24373,0,0,79a5a7064c4d389d68707b6c6baecd24cf4cf026fb0f1d231ee55331f31ac928,2024-11-21T05:14:41.583000 @@ -154978,7 +154978,7 @@ CVE-2020-25495,0,0,2079dbe4a69438edaa115e3536617664d52b6b9e241aa603b5284170e5106 CVE-2020-25498,0,0,09714c2e442335c78b9cd78e1ddb6f2adcae608e8e57152130ad1044239caed2,2024-11-21T05:18:03.937000 CVE-2020-25499,0,0,7cc44ad1e63b0b16eecabb5972fa4ac8106b0a0a0044bbf4d4f2c14b5cc3d7dd,2024-11-21T05:18:04.130000 CVE-2020-2550,0,0,11df22576a2023cce4820fb0d3a7b879862cc9415278389fb2a2dec86bc3d941,2024-11-21T05:25:30.673000 -CVE-2020-25502,0,0,79f4833da264656ca5f9c31a45ac3aa5db44c1805c29ab01341c4568ccddcd3a,2024-11-21T05:18:04.333000 +CVE-2020-25502,0,1,53a5b52a49932e0888922e42fe5040baba41eb7861b73f626f2baebfc3f2af0b,2025-04-03T18:15:41.077000 CVE-2020-25506,0,0,89d6a759816cebae4f70fe1ea5cd09d2059dec1be3153ea41e1ef411bfb1ed39,2025-03-14T16:59:53.160000 CVE-2020-25507,0,0,b71dcd1b5d328289189972c61ced68277c02c871ae1e7b6f29a78e94b3fc21e7,2024-11-21T05:18:04.740000 CVE-2020-2551,0,0,f8b2d2ac377c7c351009663ba5ce721ea8e31e8bc74ec5c248a030d1dccf0766,2025-02-14T16:47:28.167000 @@ -157598,7 +157598,7 @@ CVE-2020-29287,0,0,73324b4c53be37d94e771d302b09620ef34bdd26fef4eecd4203453774060 CVE-2020-29288,0,0,783a745870764a9c3233ee54742711389e7ed4d5bb4ceb3d5d1a261241d9055b,2024-11-21T05:23:52.660000 CVE-2020-2929,0,0,16eda53681f128fbdf9ca15d5ddd21256c13e1089655403ec6b1f5a9063293da,2024-11-21T05:26:39.380000 CVE-2020-29292,0,0,0bea11e407c93b6116987ce4b031024d60d176ae54b26132e72a29a2c34a768a,2024-11-21T05:23:52.820000 -CVE-2020-29297,0,0,6a603a18d3252111893e799cca69035a9d0d4f22f7d066475c7ca1c3f4bb4704,2024-11-21T05:23:52.997000 +CVE-2020-29297,0,1,5cb8755f40ba9d02514378e4633615880900ee26ae8dc037488a0384d5215012,2025-04-03T18:15:41.290000 CVE-2020-29299,0,0,e877d8b2ba6788c2047c505ec51c15a550e9f1596d2618cdeb98a9964978a218,2024-11-21T05:23:53.157000 CVE-2020-2930,0,0,8567175df3b2168801c0152b915c60733d613dcae462a5b57e6a35d55dd1cd2c,2024-11-21T05:26:39.550000 CVE-2020-29303,0,0,9324a1109a4405f778ed00a25caf94537859c7c4361b894b1a4aff9a9957309a,2024-11-21T05:23:53.313000 @@ -158704,7 +158704,7 @@ CVE-2020-35727,0,0,f0dd223582d6309ce179497a9b74e987555b732bfa8f631dd955b0b9a61e1 CVE-2020-35728,0,0,99fed61d496a6a5c294587255ba0c17afa8c36ec21a65e421be4e3e3640f1f16,2024-11-21T05:27:57.440000 CVE-2020-35729,0,0,73b791035750e29920d34fc3318c4c53df54886e03c72db4c4c47435377ff0e9,2024-11-21T05:27:57.760000 CVE-2020-3573,0,0,2428323c31c74dfe8ac763df12cf371bf8979fc323cca23115d173e506b9e5e9,2024-11-21T05:31:20.473000 -CVE-2020-35730,0,0,f12d6216bb92191d2b178ca6f786325cbf84ac9464b59d1226d30d17dcaac76b,2025-02-28T18:06:00.523000 +CVE-2020-35730,0,1,dba6566a60b97cc548bb2e82d936fd7a48b17eea0832b7ef0ee7dbd138306471,2025-02-28T18:06:00.523000 CVE-2020-35733,0,0,b028818da92f1c6c012520f779905a1cfb1ea5019b64f07e8c5b3e86f104cb4a,2024-11-21T05:27:58.170000 CVE-2020-35734,0,0,35b93685fa197211641fbd36f388c497f1ebdd34985df5fe2344f370ce01d4e2,2024-11-21T05:27:58.373000 CVE-2020-35735,0,0,8ab12734471d586080bb2440d148e75bc3179f443ffe3b1a5942e143406b784a,2024-11-21T05:27:58.577000 @@ -163644,7 +163644,7 @@ CVE-2020-8510,0,0,f6f3e1ba366b278d6ac76587844933dfaba9fbf429bd39bf64372bdf2794ad CVE-2020-8511,0,0,b59e2abadb34af0e9765ce8751ba7b8c140aa41dcc769819e454bd94f6646c3f,2024-11-21T05:38:58.343000 CVE-2020-8512,0,0,c6aad879dcb0eeae681fd336e19cb36414387c26cc5acd97df3655b2317377cf,2024-11-21T05:38:58.470000 CVE-2020-8514,0,0,7623633bc4bec886f3ffff217da2aa9f9256288ca0899985b522f17399516644,2024-11-21T05:38:58.590000 -CVE-2020-8515,0,0,1ceb8a24605a43f26732a5de493f7d2f92760c5d1b696d654aa98165d2626966,2025-02-28T18:05:08.880000 +CVE-2020-8515,0,1,b3a83b64c5e52667b65cdb6ba9ce939eee6f6ed0e6d07ab65545f21d2b6cc6d3,2025-02-28T18:05:08.880000 CVE-2020-8516,0,0,6ae3c70d46962c8d2c749f2d3f757eeac95c55e855094d263224a61cc073b866,2024-11-21T05:38:58.863000 CVE-2020-8517,0,0,6fb6f5a3faca4964db8a901a51cc240d4e249c901f83483c2c5a575827cff85c,2024-11-21T05:38:59.020000 CVE-2020-8518,0,0,28eeac7e377f0a40e26159f7f02ff9d925e281ae7c14d913cdfab415cc37c75f,2024-11-21T05:38:59.183000 @@ -166848,7 +166848,7 @@ CVE-2021-2019,0,0,28766b5dfedce9e375a169a1701aae9f3437b3d0b300453fe8c75b1ceb4bcb CVE-2021-20190,0,0,0a0d6499f55f7969e14e727ac1a5576efd662e675213d72392673a1d8e281153,2024-11-21T05:46:05.973000 CVE-2021-20191,0,0,bf5fb25f940b5ed55d9fdc882341485aa9eb38684a572419f8a0306bff592e08,2024-11-21T05:46:06.130000 CVE-2021-20192,0,0,3dd8be816a8dc6c137adf1504c8646a23863e79bd887c70954eb2bc7f2280695,2023-11-07T03:28:59.460000 -CVE-2021-20193,0,0,65a7648bd72e066b905b22854abc1faffa58c3171399f98df3a2240032435906,2024-11-21T05:46:06.267000 +CVE-2021-20193,0,1,2d1e186528d422e8c1c7ba1f902824acd007778b5a8aa06f71cc2ea31f29c623,2024-11-21T05:46:06.267000 CVE-2021-20194,0,0,6cebac4d3ec388a7912762ab98f9d757f05504fa8287a1a81cc4264ba84146f9,2024-11-21T05:46:06.407000 CVE-2021-20195,0,0,cac9cfdf2e5527995daee31f9d8331d3f04ca616367980f995b8b42faf5d4f15,2024-11-21T05:46:06.527000 CVE-2021-20196,0,0,fc6f1ac3fc5e7cb8be6fc8239c0013b7fb0117fbac2af839e70bcead7eae3900,2024-11-21T05:46:06.653000 @@ -170168,7 +170168,7 @@ CVE-2021-24002,0,0,addc5eef10d2818e03f7e15b6eac319d4f4160522b2da84506fdf9afee446 CVE-2021-24005,0,0,90b643847db1ffbda88a1e24fd39a6d41ba3ed869904aacfe0f12013ff128369,2024-11-21T05:52:11.520000 CVE-2021-24006,0,0,86422d585823531724bba7d81a507595d8b212f8cd4a7e1633c3ead27b68d9ca,2024-11-21T05:52:11.643000 CVE-2021-24007,0,0,220048f00966eddc01c92bfbc5adffcb09ffb6bb101362af86860eb6aad6c3d8,2024-11-21T05:52:11.773000 -CVE-2021-24008,0,0,a9855fce076e1f3af20de79cc708179e998743232fce216a925651181f8c7db1,2025-03-28T18:11:40.180000 +CVE-2021-24008,0,1,2e0cf8ea3ec1d6b79226e160b30ff9208b0eb53ff37aa8f565128b7afd9801a8,2025-03-28T18:11:40.180000 CVE-2021-24009,0,0,fb92da175d73dc74b6a1a2076c75478b767f109414e2f9be9cbde10ba77e9f4b,2024-11-21T05:52:11.923000 CVE-2021-2401,0,0,e836cbf9b9529d542b335d1267d910fa46c8af303aca0af0f04193133dede53f,2024-11-21T06:03:03.020000 CVE-2021-24010,0,0,10717fa162d2085ac94ce76810cd605f18c622ea6cfe839a903f2b0b65019295,2024-11-21T05:52:12.053000 @@ -171690,7 +171690,7 @@ CVE-2021-25630,0,0,cad44ebb79302bd287f5572fc079b7a725d37f585d127ab4e48cb2924989c CVE-2021-25631,0,0,f451d201c3aee5aa489f46acd1ccb0f2a32f0bcb0f82d36284f08a683c6ffc71,2024-11-21T05:55:10.970000 CVE-2021-25633,0,0,8e5409e6b842e103d615b908a7ec176f967785d14db5b2d13bae92b24822ca00,2024-11-21T05:55:11.100000 CVE-2021-25634,0,0,e0c98496230f444a7769e9ecad3a3da2ca5ee8846fcb35122666d3caa86b7425,2024-11-21T05:55:11.250000 -CVE-2021-25635,0,0,3f1762ced96b6d87520cd0fd12e959b0361c3f977115ebfcbeb5dc70bc9d05a0,2025-03-21T15:15:35.707000 +CVE-2021-25635,0,1,9f2c9091bace63d38ea787a3d4809e47328d3e103410af540e4fef9ea20dc094,2025-03-21T15:15:35.707000 CVE-2021-25636,0,0,d966a6172282fac04c56692a0487ea6f27da3080662bd32ca451f5a5b60cb8cb,2024-11-21T05:55:11.370000 CVE-2021-25640,0,0,e320f0276ca27804cbb1468063c1ac5087a403ac736178bf7b0659f84b8be2ea,2024-11-21T05:55:11.497000 CVE-2021-25641,0,0,6a34bad28528770c24c4bb77638cd31b451b710b288808500f01e7026a21f7b5,2024-11-21T05:55:11.660000 @@ -172603,7 +172603,7 @@ CVE-2021-27061,0,0,a9bdd3d791d056a27907bdad7344847b96066a4fd806441d6f5b216747a57 CVE-2021-27062,0,0,5b4986eb03cf9aaf2ef6354c0c80821b8b5d7fd5b9cd15eb5a5836d99382168a,2024-11-21T05:57:16.620000 CVE-2021-27063,0,0,920102c09b4311e731c92b194fd237318d14dda26f10393e258c0932037ecfcd,2024-11-21T05:57:16.737000 CVE-2021-27064,0,0,6ec1eed9034fdd2333cf0a487d4d8855ae8eab5296f5960cdd8407ea6a47d344,2024-11-21T05:57:16.887000 -CVE-2021-27065,0,0,53f51f185f80ebc5fd5dd5b9b5e4a5399ad508cfc263d1aa235f2ed782019b81,2025-03-07T21:59:37.343000 +CVE-2021-27065,0,1,cc3e8c2de2a04664bb32cae2657330b1f35a577743565f28f57670e3b6e54b83,2025-03-07T21:59:37.343000 CVE-2021-27066,0,0,ee858350d70ec4a65efcb77773704abfc00ebf5a085f998253d5718f9721f01d,2024-11-21T05:57:17.157000 CVE-2021-27067,0,0,f0990987abfe90108c26fa429007971ebc27257e648af9781569f1210c1652da,2024-11-21T05:57:17.267000 CVE-2021-27068,0,0,5b3cfd97fd393bcd1dee30da66ebf6c68ccf533fb11282891d3f159399633634,2024-11-21T05:57:17.397000 @@ -173953,7 +173953,7 @@ CVE-2021-29094,0,0,25c93b1929872e4da82e1bfe85ed93e091de37cd26fb7eb1b89f9eb8f3944 CVE-2021-29095,0,0,a14ae4a63d0bebd639a1508e7bf0d9b087d4084607b3b5bfcc0ec29664d0523d,2024-11-21T06:00:42.303000 CVE-2021-29096,0,0,5a806de58066ce5b6d3871c0ee0d510407cb7189725ba3b5a4c30fc312cd1c62,2024-11-21T06:00:42.430000 CVE-2021-29097,0,0,931fc6136415782919fc9b9ca60ac9226f452a06e13fc2712e7741ef4bef4441,2024-11-21T06:00:42.570000 -CVE-2021-29098,0,0,1ff4cb29e5ad81df2a911e66aaa86acea3463e2e4cab6a97ac3b0be93d8783bb,2024-11-21T06:00:42.740000 +CVE-2021-29098,0,1,d1cce3eb5cb827416929ec2f6e22200352dfdf7ab7f8f1090d94b946be622025,2024-11-21T06:00:42.740000 CVE-2021-29099,0,0,77554a6e7aa33cb43b684c45486110ff7029359c9a8165e39d26db6a03f809a0,2024-11-21T06:00:42.883000 CVE-2021-29100,0,0,b7b8e4516a24e07263ad6e28d7ce4fff354ef94cde333130230efea3e5791e05,2024-11-21T06:00:43.017000 CVE-2021-29101,0,0,afb42ee19407cd96a399bdf5f511896e39e485c3a2737fe7e6808deab6570d63,2024-11-21T06:00:43.160000 @@ -174036,7 +174036,7 @@ CVE-2021-29251,0,0,700a4cd398be0c57419b2b217839bcd6a94a502f1e4f7f474b80b6ff38b5c CVE-2021-29252,0,0,f0933777c0c308ee5a32296016bde2de20068463be1956359df32f9621933f4a,2024-11-21T06:00:53.360000 CVE-2021-29253,0,0,499506f2e55a033b98b72f9391b30cbef0e863f81c0b02f53d6f18adec3090f5,2024-11-21T06:00:53.517000 CVE-2021-29255,0,0,84eaa1ba67239640d08ddd9c0adcd36085d036b0ceea3a25401d8f796ff5d4a2,2024-11-21T06:00:53.663000 -CVE-2021-29256,0,0,5dbd128763a837d353f5853b3cf5c51114ba2f1cade297f88f5d70ba59812f7c,2025-03-26T16:41:11.860000 +CVE-2021-29256,0,1,a55b7d3d999c28178da92cf77516e61548bb8086bd5f11e6623236b734e24e76,2025-04-07T13:08:28.870000 CVE-2021-29258,0,0,ff5dce28ae45cc37ada5436c522c7ac162c4667f2444d65e714ea1d78101cb00,2024-11-21T06:00:53.947000 CVE-2021-29261,0,0,2d03fcac11a6cce4850192fcebf3bdf149eadf87d331563db474f354576ac7d8,2024-11-21T06:00:54.093000 CVE-2021-29262,0,0,6c6bb875bbfca8d93029fcd2400df89361ad81fa105fa03d75be4e4dfacb79e6,2024-11-21T06:00:54.250000 @@ -175638,7 +175638,7 @@ CVE-2021-31201,0,0,c9a66e28100c814ca9c7303a4853d92730011fcc71d2351ce03041392b712 CVE-2021-31204,0,0,589fbb9ec33db1005ec96bf19c0eace4788b15efcb6ce543e9dfbb8e1368ce0d,2024-11-21T06:05:17.833000 CVE-2021-31205,0,0,2b1f22e4a9affd3ec177218e6e1f7a3797503f61f2b5e94c9b10bbc1cf49aa8d,2024-11-21T06:05:17.990000 CVE-2021-31206,0,0,d800ed47a3c2c2e4e60c6740beeb55e2111afbd5a2ed66aad11870b68ab8c567,2024-11-21T06:05:18.140000 -CVE-2021-31207,0,0,e9ef9afeda4b52c19814053d0cb187bf639a9b4b0859ed09ee835ca0d170b6e5,2025-03-13T16:41:49.303000 +CVE-2021-31207,0,1,3efcd3817a60e73cbf1bca7195bc6773bb1ae801fad6b77e53c12b18684f3bef,2025-03-13T16:41:49.303000 CVE-2021-31208,0,0,73a829c7364bad95d494eb610c61f0f6aa6db53a37e9339b4eb71792b20005e7,2024-11-21T06:05:18.403000 CVE-2021-31209,0,0,ce7c14a31b399a369b6067a4ad1a495029ab40e4a159a71f303eed5a345df5e0,2025-02-28T20:15:38.687000 CVE-2021-3121,0,0,3b94eae29042e2bc3082dd38a3f462cd10b39dd24187bbe3f6e06e20f97f418d,2024-11-21T06:20:55.957000 @@ -180250,9 +180250,9 @@ CVE-2021-3748,0,0,132f5264c5758e631f63736bc0fb9ac9759aec393fd744746f8729d84cec3d CVE-2021-3749,0,0,485930f777929a3788c4e7ce2de18ae619eeaa65c1f263b61a31dcdc25179cc3,2024-11-21T06:22:19.837000 CVE-2021-37491,0,0,ced1b15ad1bdb1909f4fa5473ccd573b00ae60a36c840ef307c971491eb16d57,2025-03-25T18:15:28.270000 CVE-2021-37492,0,0,7312241f9e5e64be51f6b5ab29c0276c46549726fbae81b979135b6a41edf528,2025-03-25T18:15:28.467000 -CVE-2021-37497,0,0,284ab8b201cc95ca38c1b4838828794f688a4f2ae2ec968c39d50f9ee515d0a0,2024-11-21T06:15:16.513000 +CVE-2021-37497,0,1,6d8e99161b46fff3debab9521308d2b6abea68fcbee9e20984d337d157df7640,2025-04-04T21:15:41.443000 CVE-2021-37498,0,0,4009653a16117397e65e2f9922487b1abfec2d95718695f92847bd9f2d98868d,2025-04-03T13:15:41.377000 -CVE-2021-37499,0,0,b70434bddb1bfaee1f037b44b15c525dbcdd70dc5c38a6c8c19f47161ccf531d,2024-11-21T06:15:16.960000 +CVE-2021-37499,0,1,91caa8bead3da4f87683997693322795a4244d7076feb3a70dc354b6970431d6,2025-04-03T18:15:41.510000 CVE-2021-3750,0,0,925490973b974b80d70ba3e05bfa74ffe77ea5e279323940671b0de27b976367,2024-11-21T06:22:20.063000 CVE-2021-37500,0,0,df636651911ff195f31193f3cd167ef1d81182aa6e0330265afdccdab68e89e4,2025-04-03T16:15:23.320000 CVE-2021-37501,0,0,9e98fb040486e04280510f67e4aef3aeaa97972da982764d001b65949c3cf322,2025-03-26T19:15:16.750000 @@ -180712,7 +180712,7 @@ CVE-2021-38114,0,0,dcc34993449335bce7ac164918f8ca13087f09cfe97ee05f1f3c1ffaea526 CVE-2021-38115,0,0,aac65d670b83c50bb6fdf3dde8ca97dd9df4d7eee0cdf91517338dfa0ded44ba,2024-11-21T06:16:25.407000 CVE-2021-38116,0,0,19092e103e8946ee72b66860b89710bf2c45f7caa2b93c131673bb3dfdd5e1de,2025-04-10T18:39:46.610000 CVE-2021-38117,0,0,9635290830542951976ff95b1aa0db5c249c1c9a10b9cb59f2bf80964481a91e,2025-04-10T20:25:24.830000 -CVE-2021-38118,0,0,ba2ec27c72243ac06fa07fa3c2002032e3244a29a14afe7500e04e8a60c83293,2025-03-04T16:37:23.820000 +CVE-2021-38118,0,1,c5de920bd81fd0bc383c2303ff801b195d6cd0674383621c8395d0378456aa9b,2025-03-04T16:37:23.820000 CVE-2021-38119,0,0,c38b291d8eb0da8068a7c8ed65ba4e91d1cbd76dab04bcea40e6358a8c1671c1,2025-04-10T18:15:05.050000 CVE-2021-3812,0,0,c5cb3f5b7111b975944866407ce7921fd1756d44d3c707face417fefec9022e0,2024-11-21T06:22:30.810000 CVE-2021-38120,0,0,b60e1861e1b921e1137b6df18349a144506c4be8364c1355e526faee82dc1255,2024-09-13T18:04:28.527000 @@ -180730,7 +180730,7 @@ CVE-2021-38131,0,0,980eb492833fef04df71f8c1be96cc90363084ebe94acd61a1b0ddd54c9cf CVE-2021-38132,0,0,cc4e1381a735ddb1e1b2e30ee731f10ac1786d2b08adbdb5c6b1a67d1117697d,2024-09-18T21:04:11.840000 CVE-2021-38133,0,0,0d77afe3c41e217ee49f58798c33ffe693557e4f4c683fac1020b9d1c0576a03,2024-09-18T21:05:17.027000 CVE-2021-38134,0,0,de37de5a16b4b60690210ef47675417e3fec3a477627bbde92eb25ab10f922ec,2025-04-10T17:47:09.593000 -CVE-2021-38135,0,0,8454b855164ae7e75984729c2e8725bb0f7efb06bad0d84481f11dff2c32b198,2025-03-04T16:43:31.200000 +CVE-2021-38135,0,1,39990803deb9bdbc0b2123dbd804ffa5dcdc551f21f463c6aa5371647e9dc8f1,2025-03-04T16:43:31.200000 CVE-2021-38136,0,0,75dccf60c11e25464bc510952d9ccdd379a17e029a4ca730fef234378d74c33b,2024-11-21T06:16:27.247000 CVE-2021-38137,0,0,2ddc1b293c690f5b9d3e7ffefcd4ca372c28380db582fcb89b1014416b90329f,2024-11-21T06:16:27.437000 CVE-2021-38138,0,0,1e14c27b356072692022b0b633e52103df305663f6cc532303cc54463d19ff14,2024-11-21T06:16:27.617000 @@ -180755,7 +180755,7 @@ CVE-2021-38156,0,0,c624e5b7a95ec5e7e11f258bb3442fc075e4180a3b2a304dbf3acedf7c7f2 CVE-2021-38157,0,0,17b468e618c91fad68f40ae9cddb0a6ea9553853ee67cce593231857868faa94,2024-11-21T06:16:30.893000 CVE-2021-38159,0,0,e4ab08aa747b7551a1c7dd057e351869b37515ead4a98d85d417f15077c8bdcb,2024-11-21T06:16:31.097000 CVE-2021-3816,0,0,4aa36dc92c706b88ad115c870e69b85d034b2cb701ed3a91f046fb32775392f8,2024-11-21T06:22:31.437000 -CVE-2021-38160,0,0,0a8dd00f8de226e4572ed933a6000a24be1a0c5756313ced28abd01f294a023f,2024-11-21T06:16:31.280000 +CVE-2021-38160,0,1,4561b58be9109be3c4eb29bef848540b901f6ee3513d9dbcdcf8aa69851f0e42,2024-11-21T06:16:31.280000 CVE-2021-38161,0,0,4258bd9e342f7c3b063d35f9d22635b85b6cc1ace79f771d6c8b8da7946a7fdb,2024-11-21T06:16:31.513000 CVE-2021-38162,0,0,ebe13498ed07b80b251296b072b427308c701e75a872df97c306a9de7d4dadaa,2024-11-21T06:16:31.677000 CVE-2021-38163,0,0,2e129aa82515fea9adbf2f5be33a936663f47da17385e177f18868f2d3be5948,2025-03-13T16:36:14.333000 @@ -182626,7 +182626,7 @@ CVE-2021-40440,0,0,b50794c0137adc8bf2a653200e33f12b6612b278dc022589bfa486bd00cd7 CVE-2021-40441,0,0,08d21c64325fa7646787d6bad4fc8533260370d6de6f2edac612aec7a3f6b10f,2024-11-21T06:24:07.390000 CVE-2021-40442,0,0,0d7325900a291e8244ff143aadf19c537df8dd072fea5aac43868d6be2e322f9,2024-11-21T06:24:07.530000 CVE-2021-40443,0,0,f80c23d2a9c050ef5b18038dcf58b79bd6b493ecb1af45f599d492702f3e2e75,2024-11-21T06:24:07.677000 -CVE-2021-40444,0,0,96145ca1d6249f674ca9d9ec34e4428e47930601e530ef32a664c8c373e0f92f,2025-02-04T15:15:12.880000 +CVE-2021-40444,0,1,ab680fe912278e7122735eab45503cc65462f3473683102a32c53ea8bcfbf9b1,2025-04-04T20:46:47.360000 CVE-2021-40447,0,0,f7acf519a68e80057b033ca2f90440b01e6d22edfaeb719db2e282621649f113,2024-11-21T06:24:08.087000 CVE-2021-40448,0,0,ae218b8e895a2dd87217b3043e17f30044e1d360f67e6cb830e631757b235874,2024-11-21T06:24:08.260000 CVE-2021-40449,0,0,19134ae12cb28d44fcef2cbc910bca929fdc3c2b311dd5207d03881ad8279093,2025-03-13T16:36:21.307000 @@ -185724,7 +185724,7 @@ CVE-2021-44533,0,0,b688b4c33da58fab50730478d5cfc4bdee1fe898192eed5b51ad909b74a7d CVE-2021-44534,0,0,bcb71acf2581505560789487e5637ff718f5e174e5ccc630938db1b565a5e233,2024-11-21T06:31:11.113000 CVE-2021-44537,0,0,628edce87b58071fd11d993afdd95c319258d66494dc354669653fce1e9f768c,2024-11-21T06:31:11.330000 CVE-2021-44538,0,0,af774d616b2ad65cd6694202293e5cb98645f726b4865866d3144d514a8e9116,2024-11-21T06:31:11.483000 -CVE-2021-4454,0,0,44978854450ea785c505afcfde05241f4c0de4dac3d470557093182648f732d8,2025-03-28T18:11:49.747000 +CVE-2021-4454,0,1,eeb2ec5598b7215630d92b4ec09605d71fe64cdbf3522471da3a7660e8d31785,2025-03-28T18:11:49.747000 CVE-2021-44540,0,0,9468c5de620a1e6db049fcf5af7fe2e1460c891adf7fed75c685a9b0a3acce8f,2024-11-21T06:31:11.640000 CVE-2021-44541,0,0,c0857f7ca2ebd587cda4bd153090809b08739ae1160633d2ebc20b83d9a68664,2024-11-21T06:31:11.753000 CVE-2021-44542,0,0,cc19f057e044c038fdcf741a6ef991904c443c33803df8db670ade1fe042131c,2024-11-21T06:31:11.863000 @@ -186004,7 +186004,7 @@ CVE-2021-45040,0,0,3dd07265706e4de61364c6291ffa84304260bf3008f0d605fe153e435eb07 CVE-2021-45041,0,0,44c026922470d1db402ec2344ee4ed1df8b5b3c7ffa174b23058e284f11efb19,2024-11-21T06:31:50.993000 CVE-2021-45042,0,0,30a921bb9a7e69aa18089b9a9376ee639bf32f6beb6f661dd848b5453d225981,2024-11-21T06:31:51.180000 CVE-2021-45043,0,0,aa067c47f0bbc3d89eb352efb6935597a5e1f68f79cf3be6d41504cf150338ea,2024-11-21T06:31:51.330000 -CVE-2021-45046,0,0,6d9c40d9418fa9471bdcc2715db958c75a071341734fc11395a28f6b8599ce83,2025-03-12T19:52:00.270000 +CVE-2021-45046,0,1,a7de1050d9a47e511851206c725ca447d6d72d6b7b7c93140033393b63820f63,2025-03-12T19:52:00.270000 CVE-2021-45051,0,0,1737001b174d0edac7520596a663c3abb42cf487dc2700845d6beed2e827b7b0,2024-11-21T06:31:51.750000 CVE-2021-45052,0,0,f78b8629b1faae4633929e3c9c2864af6d3b5cd60c3d3b1b6c554f0bf53cfb24,2024-11-21T06:31:51.880000 CVE-2021-45053,0,0,b8dceb05f9425aa41892471fd8dbdcb242109d72aebab0cf174e11ef9db5c70a,2024-11-21T06:31:52.003000 @@ -187467,11 +187467,11 @@ CVE-2021-47161,0,0,ec465e3d1cfd5141748d11f76b506133d3c2d044374d3db55315684fedeae CVE-2021-47162,0,0,eeb8edd49e9981d884e096ebddd00ac92a1833a1574ec75c16d1cc4120e2439b,2025-03-13T21:23:24.410000 CVE-2021-47163,0,0,b54a9a5b8d126c1cb7d9afb8a01265f4d31b06d912e6776c2dcca44de6a58af1,2025-03-13T21:23:34.380000 CVE-2021-47164,0,0,5f23854b4f099fb6fdac7718ce7e13674f7549368640ba9489dcff1f7fab1462,2024-11-21T06:35:31.987000 -CVE-2021-47165,0,0,a890c0a37eaa2f35d93ed446611ca60353e5c046315f2087140017da2bbab3df,2025-03-03T17:46:31.550000 +CVE-2021-47165,0,1,abf1359b854ab7a172b5dad1edff59074b16c5e772057ac5eac73201f94f856e,2025-03-03T17:46:31.550000 CVE-2021-47166,0,0,6bcbde94f3b8f325419937f23cb53569c1a8a455bfb9beeb500d51c2a175d32b,2025-03-17T15:03:38.947000 CVE-2021-47167,0,0,6d98b5f6a5e9d4c3a526429d5d079c256d4039da1ea60b7f4bc02d86520e8fa1,2025-03-17T15:03:30.547000 CVE-2021-47168,0,0,a65a2b937b9d97590e949cfb52282e972fae79a44596381a73c54953c033dd4a,2025-03-17T15:03:22.997000 -CVE-2021-47169,0,0,3adf53cbf72a86cc1f74ce1f9b5de10781252e75cab66ddca394c5f7c4997a33,2025-03-03T17:45:46.213000 +CVE-2021-47169,0,1,a16b7f7ba0d1d9e8b90e06a0c3504d542128f133e94ef50bcd343fd0458df777,2025-03-03T17:45:46.213000 CVE-2021-47170,0,0,78a99b1bfcf2952726b0c4fa3fdb66c6766cecbdbfd7618234e13ec843b3da63,2025-03-17T15:03:13.297000 CVE-2021-47171,0,0,53f9efba59fa2e2383ad5139a1ec5849f84c59bcb80640d33ac39a94bd1d81f1,2024-11-21T06:35:32.923000 CVE-2021-47172,0,0,d828888ed8ef79257f45aee96101e886d726fa717d11fd369327fc396e922a4a,2024-11-21T06:35:33.073000 @@ -187488,9 +187488,9 @@ CVE-2021-47182,0,0,a76d1e29eaf71ee760bcb06a3de33f45435260f2fec363d33d9b7550d6083 CVE-2021-47183,0,0,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000 CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000 CVE-2021-47185,0,0,a08b9d0d568a88fccfd76ba79b4a9105234b33e9cf54a4486a769f1c9bc3d255,2025-03-21T14:59:09.967000 -CVE-2021-47186,0,0,a4768465c5ecce71458f0c9a924e92257c7b60bfad226bb1881c9b0392f4472b,2025-03-04T15:05:46.573000 +CVE-2021-47186,0,1,cbacfaeffb23015356f88ec190a7c4f9b513efac62c39ed7951338b3e0f8762c,2025-03-04T15:05:46.573000 CVE-2021-47187,0,0,f85468c18bf82c4388087f81a023307255c708351d1a8bdd625f90fe6965b793,2025-03-21T11:57:12.867000 -CVE-2021-47188,0,0,d3fcfd85f08139abf3a7f97c48f9ab2c9fd1fea909abe7fe3e967f2e3c253a2e,2025-03-04T15:19:57.170000 +CVE-2021-47188,0,1,5ebfbdfb3efeb787d396783ad3bb20161513db10ad128050ddb4d76bae38785c,2025-03-04T15:19:57.170000 CVE-2021-47189,0,0,6b5a3eaa80084a3e837e6115663c571962e3f793536fa8f08533d74f389c8aef,2024-11-21T06:35:35.463000 CVE-2021-47190,0,0,40ef95b8cb1627967e420a0198535424c5b2953d956679426a61ed7516c65495,2025-01-07T17:11:50.810000 CVE-2021-47191,0,0,852e5f21c2f27721ffff20a5aa14cc9d373131c4810b464f930bf925acc7d2e7,2025-01-14T16:40:59.737000 @@ -187498,7 +187498,7 @@ CVE-2021-47192,0,0,7c4cd5bbbdb4219843e00ea339300d08c65e06dec7b36ecf3164f42082648 CVE-2021-47193,0,0,c905fa876770fb280b0f84199dc4cabbc26a998966555c8162862f405026d033,2024-11-21T06:35:36.083000 CVE-2021-47194,0,0,0cf48d0987b605869a637210ddbdf4bc207c9eaac2ae582e1a26f691b3d52160,2024-11-21T06:35:36.263000 CVE-2021-47195,0,0,ae07f8af7323f460f36cddf655e138db6ede037a4af6c91ef72f3e6c96ece0fd,2024-11-21T06:35:36.413000 -CVE-2021-47196,0,0,74cc2fe1cc25aa42b637891eb0d3dde073ddc5b4ed22c16a1d37692976d8b397,2025-03-04T15:23:02.973000 +CVE-2021-47196,0,1,41b0f77559b6716c498b8e276114edc212a06f8a0defe33e5364e8f598247ab2,2025-03-04T15:23:02.973000 CVE-2021-47197,0,0,ff278b57005be39a605158e468d07f7b771efffd46ad329ea80d3d03fead61c2,2025-03-21T12:03:49.537000 CVE-2021-47198,0,0,b993f750c37c4c38f432a1fa687c613c700df27bc966490e10b5bbb5b658e377,2025-01-10T19:05:47.023000 CVE-2021-47199,0,0,b54d7d4593bdaa1296c80c94872766f0aebb031e426176cb727724e16ea27e3b,2025-01-14T16:40:06.220000 @@ -187507,7 +187507,7 @@ CVE-2021-47201,0,0,54de1120fc9fdb3601acc431f0154fc87a819de27867f178a33889ea7eb2e CVE-2021-47202,0,0,f71fdf699570077845ea4020f7dda9b1b42ec5830520d11735bde0982f5ac699,2025-01-14T14:42:43.193000 CVE-2021-47203,0,0,23ecedf5c87bed8a26460406d75448c16071a6195e5aa863e7a7c6bbe8684914,2025-03-27T21:15:41.670000 CVE-2021-47204,0,0,d855ea7a1c34fec98e08b6ec6fc4b87aa056a23800ca368fb608f86f4465fa84,2025-01-14T14:35:39.270000 -CVE-2021-47205,0,0,549c8ae254d28d7ac269df29364fd85d999eba14823bb753afbe9412e13374e4,2025-03-04T15:27:32.420000 +CVE-2021-47205,0,1,4e8458578ce38213cb7e662cdc817e0e04b0f9bd8e698bd11d060b1ce10f1831,2025-03-04T15:27:32.420000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000 CVE-2021-47208,0,0,1530409a9601a0907c9eb35e42d9ec9620e69106ced76ea9e3ebfe673f296458,2025-03-20T14:15:14.867000 @@ -187521,7 +187521,7 @@ CVE-2021-47215,0,0,c85e565b0341874f7942802893aff71248ad89f071ee29569b0cc37c4dc94 CVE-2021-47216,0,0,7b28f4a443e8cdf94e80536f7a879b2105949aecec684610de3f50e588e6c23c,2025-03-18T17:01:47.293000 CVE-2021-47217,0,0,0a489705239b1608b1dac0f9ef137450310d629ac310e04d5fbc0878960cf64a,2025-01-14T14:44:11.917000 CVE-2021-47218,0,0,cdeb5c7e6dbdcca4a12e7f3fd8c0c1023ff2d2f036ea1b66236860ff4b09a050,2025-01-14T14:44:55.610000 -CVE-2021-47219,0,0,f1060243806af51a0cc03e0e16dca07d32d1e07bba999e0882caec8301729d0f,2025-03-04T15:29:21.270000 +CVE-2021-47219,0,1,339088e3912c7f0a035be9bbc6f53b27276b668f281d0386b9b98f0f0a3990d4,2025-03-04T15:29:21.270000 CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000 CVE-2021-47221,0,0,7afbe582defa95f34b58ec3b4d10fc6db91ded7409ab2f1fde46bee521aabd80,2024-11-21T06:35:39.267000 CVE-2021-47222,0,0,f0d76d0e2cdb314b19f8094ddd09a2b1cda77d6c5b61bbba0f92f2b58298fbb9,2024-11-21T06:35:39.383000 @@ -187641,14 +187641,14 @@ CVE-2021-47335,0,0,328eb3645a18c5f29c918b49774ba62cf65897a9bf118eba16623aa0b88c0 CVE-2021-47336,0,0,574b511187a20b144e1a41e424bb252a26bf57fd2f2c258012116c53068fbcd0,2024-11-21T06:35:54.710000 CVE-2021-47337,0,0,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19041,2024-12-24T16:15:04.180000 CVE-2021-47338,0,0,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000 -CVE-2021-47339,0,0,9131542072bc70507e7d5be71d6a29a9d3ef1f8c3289abd9d7763baaa5820dd0,2025-03-06T12:57:52.070000 +CVE-2021-47339,0,1,663a5f527463549aeb662c7ddab25b46c9ac7334aa89f496e2f8957f5ddbdb39,2025-03-06T12:57:52.070000 CVE-2021-47340,0,0,4800185c819526cfdd83b27045687b91c60e90a3e12af11337074c136ce8ddde,2024-11-21T06:35:55.207000 CVE-2021-47341,0,0,de6df9bc89a00c0eee555b5550f951ca1c227ff6ccb6bb702130533fcb19308f,2025-01-14T17:28:39.313000 CVE-2021-47342,0,0,87691d96ad1a4689fc95ec83dde8f8407d98a729b3e3a4eff31c1bce3aa3fc7d,2024-12-26T19:29:20.557000 CVE-2021-47343,0,0,05baa50e8f01703dbae3936b2595f3acbc4f37225bdead1e4b8828946131a960,2024-11-21T06:35:55.597000 CVE-2021-47344,0,0,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000 CVE-2021-47345,0,0,e7fced2d39bb01ac3aa638228f3d111fb4e7a3b155cc0145bd8963569fdff796,2024-12-24T16:12:42.907000 -CVE-2021-47346,0,0,5ddab6a6dae1e01606672706db2a4ffdd46bb63625963f539d11751079d1aee3,2025-03-06T12:57:41.553000 +CVE-2021-47346,0,1,c31d87ac2472f5e3ce0b2852eed66cfdc31fafebb2f000ca6e78cf9eed42b9c9,2025-03-06T12:57:41.553000 CVE-2021-47347,0,0,3d5ab8cbfcabcf3e10d962ebdf44437017acd9f28770c1524beb0a84950756e2,2025-04-02T14:31:32.537000 CVE-2021-47348,0,0,f4faab26def2799dd733450be581ac91c1150b72de613f702c0aef63a9fbbd88,2025-04-02T14:30:39.097000 CVE-2021-47349,0,0,4bbe92cbdd19bea4c0660020f8f6f562d96fbf23f4aff4917213209b46165265,2025-01-10T18:12:28.513000 @@ -187709,7 +187709,7 @@ CVE-2021-47403,0,0,44dc7099881136c9adbdcf2f396256320a98706f22d1228e149180cb19b87 CVE-2021-47404,0,0,b4a6c4984c318e0b5f084184228def57d269d3a8a4195164e12844a9b471a71c,2024-12-24T16:05:42.447000 CVE-2021-47405,0,0,1cdbd44c13d2f8232fde2c8c485c2b6990b3a78ee79f2bb0f3bce11552afaaa0,2025-02-03T16:11:50.860000 CVE-2021-47406,0,0,7be0a97ea86c4cc76a2f429cc1e35b4ed64b17516994c738b226292e891ca623,2025-04-02T14:51:38.020000 -CVE-2021-47407,0,0,a950497c63f86d264acb5a919121c8e41e9caba9f76c019e1327e2e8d6e2398a,2025-03-04T16:47:54.193000 +CVE-2021-47407,0,1,c3e42b88722d38355ac9676d8e92d5b8c69e4083755f86cee921fb0904e5d57f,2025-03-04T16:47:54.193000 CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000 CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000 CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000 @@ -187738,7 +187738,7 @@ CVE-2021-47432,0,0,7b0f86bae526144577bb7cded9fbc968abecfc546c0a213f07dd10bc578a9 CVE-2021-47433,0,0,4665d69408034a8f61f2f7a3ef27a521461a82b8fc95da599554878d40570716,2024-11-21T06:36:08.040000 CVE-2021-47434,0,0,5d889b13cb9c4b665236a8505baf9fc1a75a9299c3e831d6b6d287c793912fec,2024-11-21T06:36:08.147000 CVE-2021-47435,0,0,15cd1ff840c477f998041450b016486f8abce38dab583041ac04502b3bdd0a58,2025-01-31T15:16:51.193000 -CVE-2021-47436,0,0,7be628317d6e8b1cdba098f4ddad516eaf6ad826623d9608ea09482d0ebdd96d,2025-03-01T02:38:25.597000 +CVE-2021-47436,0,1,ded6bc2cc7652a6e41c8d7e1729468d2b1cf50eb1a9a046140b177f45fb3b9b8,2025-03-01T02:38:25.597000 CVE-2021-47437,0,0,4b84844b5d0afa1aee4eb9cd8d91132cc86915fa767cebe46028421178083be8,2025-01-10T18:15:20.720000 CVE-2021-47438,0,0,be81f99bd1ceb58f333eb7d8cd405f4be714465eff11c5e96abfd42454bc4f82,2025-01-07T20:14:16.923000 CVE-2021-47439,0,0,3afdfc4c0521ef6e4c11893bb23cd152ca1168eea62eac36f879a9ee88bff59c,2025-04-02T15:14:43.920000 @@ -187819,7 +187819,7 @@ CVE-2021-47513,0,0,1ab24834c6e25de3cd21c69df4862969503b5957f7e9422b536d99e4d4b03 CVE-2021-47514,0,0,d482bd614f8350106349d669e8c5ea8f14726313db7bc3ead4cad79879ca1129,2025-01-06T20:47:59.463000 CVE-2021-47515,0,0,85d38a07a6b131553cdc5099a519d358d39ac1ae31a60607258204240a937d00,2024-11-21T06:36:24.957000 CVE-2021-47516,0,0,f4fda38e9ae8b99457534ddf4d79e5f2761987b926e65958495114f7c9939384,2024-11-21T06:36:25.113000 -CVE-2021-47517,0,0,9f12dd37222f0aac67d7fe20657fbf758483508756f9684d6cba80a89aae848a,2025-03-01T02:40:24.407000 +CVE-2021-47517,0,1,b00e44ddf8e1bd976e5ee2adb52820457b3ff7b334a4e2e74117545ff8b2ed31,2025-03-01T02:40:24.407000 CVE-2021-47518,0,0,c174c3682e03fdf16401dc5415ed4cc2f8b033d145a41adf9d21f2e1c1142258,2024-11-21T06:36:25.463000 CVE-2021-47519,0,0,c1175394ed227f2144b8711c2481fae2df967e065ba70df95ebcf1e871210f74,2024-11-21T06:36:25.683000 CVE-2021-47520,0,0,3a4fa4be37be34c383e493a2a5e21f7db35590484cce8cb281d5dad9097409c5,2024-11-21T06:36:25.953000 @@ -189132,7 +189132,7 @@ CVE-2022-1267,0,0,685937d46fe8fc36f93822774c505754a05e41482acaf9d41f386abfdf83d6 CVE-2022-1268,0,0,997c98d744203f2f7d48a8aa3d133349e67aea93f73428c6eee499f30fd272e0,2024-11-21T06:40:22.667000 CVE-2022-1269,0,0,5d4548d0624bfdcc2c580a2e1005b48c5da1d60cafdbc0a4348dc566fe222b98,2024-11-21T06:40:22.780000 CVE-2022-1270,0,0,63d228e89a77445fc65780dc39daff81fa5e58b3c221ec79ffee5d58a785ef73,2024-11-21T06:40:22.903000 -CVE-2022-1271,0,0,874671d97b23f7bbb68f2e123caec05ea412f761d2c782320a4fc6b05f2b86b5,2024-11-21T06:40:23.040000 +CVE-2022-1271,0,1,7c4c069fe205cc70e97bcd013a755ce6e04db60f699fdbcbf5314963fc7b424a,2024-11-21T06:40:23.040000 CVE-2022-1273,0,0,270b7010113b82bf7ab089af2f6cae3b9118181dd514b4d77892e79b91fe5251,2024-11-21T06:40:23.207000 CVE-2022-1274,0,0,079fbce78f728303f12019f1d9d6658cdd6566d5e11c862ae6c7a104401ea957,2024-11-21T06:40:23.330000 CVE-2022-1275,0,0,6a94ffc22400b952e65d00d8e4ec345d29221956f0e1d0a565522c0900913580,2024-11-21T06:40:23.477000 @@ -191376,7 +191376,7 @@ CVE-2022-21583,0,0,9f1fcadc56013fdbdbfe88c530b90a3712e53b0377bc3d126ab9d61d2c13d CVE-2022-21584,0,0,eaca3100f758f244eff30b2d1012cc5d5be9e5eb9ca44ac5b2b47a4cecefeacb,2024-11-21T06:45:00.580000 CVE-2022-21585,0,0,b98e71e0b8b4a971de9aef5baab6c269769a00049c3cadee558734226bab373f,2024-11-21T06:45:00.710000 CVE-2022-21586,0,0,a1e330f68940049f1d03feb6b5b4288300c5a6f8f785890a7d53e677c127d6c7,2024-11-21T06:45:00.850000 -CVE-2022-21587,0,0,c93af6a5e524503656b12e8bea06a6d1473739bb41915a071fcba5fedfee04bc,2025-03-12T19:39:15.827000 +CVE-2022-21587,0,1,39e96136e182dc1fb9d4088cd5402fb0d1453029a94d42c7bd7e405d7ef6a0df,2025-03-12T19:39:15.827000 CVE-2022-21589,0,0,a5cad395b4157cc77c35c9690ca100f7e94d250deed8ca44830349b52a025af1,2024-11-21T06:45:01.183000 CVE-2022-21590,0,0,fee08b690e3b4ae3fd4e388f4f4d2994ceeebb25f4413a822f0693ef6bd7e925,2024-11-21T06:45:01.310000 CVE-2022-21591,0,0,1d28b3a5ad9669c4920fc1b84c20d0771407fab9e01b07c34a5ac2d17eb187b9,2024-11-21T06:45:01.443000 @@ -192478,7 +192478,7 @@ CVE-2022-22701,0,0,1b03ba762efca4740cc7f7dfab0fed7e33f2d0852d8ba711337e053f53e9f CVE-2022-22702,0,0,66839ab723af623b7522ee0f7487d93b6f1b2853ca1ff0aef24ff9286665ba29,2024-11-21T06:47:16.933000 CVE-2022-22703,0,0,629919cd7d620cd0480d16dcefa0d96f12b8f969c8cad05af5f25e15c1f192f2,2024-11-21T06:47:17.033000 CVE-2022-22704,0,0,2d52274a9072d0a911a3f16fc385c1eac806ceae7d4cce0831d2041946c96d58,2024-11-21T06:47:17.157000 -CVE-2022-22706,0,0,535cda4ae9d0c24e3a4eab7cfcdd01882d60eb0f922df23fc4ee8816098de5c4,2025-03-14T16:50:53.957000 +CVE-2022-22706,0,1,a3c2d1eadee42da7877a6ed3db754b0b5deaa7e580878918c2c4ff0d0ba4f46f,2025-04-07T13:09:05.120000 CVE-2022-22707,0,0,e95d3d8529ff9471e9315fa0f84a9dfb5c77246cde3e2dbf656242e229fd8c30,2024-11-21T06:47:17.437000 CVE-2022-22709,0,0,1285fb76aa64ab393c87c3cab2df6540e0541164ae78cf7aa6a8fe8581555198,2024-11-21T06:47:17.570000 CVE-2022-2271,0,0,0091defe3bbf6dc6e6f862b62ebc31cd05149b7ec734187f74e55337c0ed070c,2024-11-21T07:00:39.670000 @@ -195035,7 +195035,7 @@ CVE-2022-25628,0,0,66860e6e1ae60e41951bf3154eb4ee006c2cc0522021a8c14ee11aaadb1bb CVE-2022-25629,0,0,2050ed852d5a1142fb8bf17d4d1be2f77206648a6b0bfced036ea87cd50f60f1,2024-11-21T06:52:28.437000 CVE-2022-2563,0,0,4985830944adfe5dbe8c9a68612d59eb629247bc2d52662f2d365f23b74b1a8e,2024-11-21T07:01:15.347000 CVE-2022-25630,0,0,56604379647fe997b8632c6b57b89d5547418ca1d329bd7772b048cd2c12fe38,2024-11-21T06:52:28.543000 -CVE-2022-25631,0,0,80d01908931bda9be834dba102e98ffed337f33b16c00ed8c5f5d3d5e1203fb5,2024-11-21T06:52:28.650000 +CVE-2022-25631,0,1,240e39a8ec02d1a789f8bdc33e380314b573e0c7bc214a1829cc53659f6b0142,2025-04-03T18:15:41.717000 CVE-2022-25634,0,0,25e7ee06ed8040d7fbe28229d68f8b985ed9f32b0543d213ead443e535277805,2024-11-21T06:52:28.763000 CVE-2022-25635,0,0,ed6d3bdf2102d7c59766b0fda10b754f5b42645ec5ad39176ff37c7438bf5e0d,2024-11-21T06:52:28.903000 CVE-2022-25636,0,0,ff0064f4310ed49070495b31825b7a4b3a4e4a5425fb94edcd61c26b69d5c69d,2024-11-21T06:52:29.017000 @@ -195599,7 +195599,7 @@ CVE-2022-26318,0,0,30041f5e9a4822da4d6e3ce474b508bd262fd054cff46c59113e7c7776f21 CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000 CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000 CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000 -CVE-2022-26324,0,0,1a4aad8a8ed402456382060129e5f91204a73988ce91ede0dce8f4260ebec003,2025-04-10T19:54:25.537000 +CVE-2022-26324,0,1,f17a183a69da7bfa7321588963d1cf2bcf1154098a4fe24026a0bffc35a55536,2025-04-10T19:54:25.537000 CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000 CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000 CVE-2022-26327,0,0,14209176bfddac3742a841a3f635ca4404a584d709335abb6ed62100d8608437,2024-08-21T17:25:08.560000 @@ -195809,7 +195809,7 @@ CVE-2022-2657,0,0,552a9bc8b7b04ebf8a5ecdea4cc825d5d941bfab8ed08ea05ec2c38856cd8f CVE-2022-26572,0,0,434fe8a2c075de68b33f6df8c577f431189e3c3632fef9d1e879a7be0f857054,2024-11-21T06:54:09.093000 CVE-2022-26573,0,0,24ef96c7992ce9d71e6b376f0020bb01b8cd5e27cce2d1120d062305944c01db,2024-11-21T06:54:09.227000 CVE-2022-26579,0,0,a0fb742be073170959f87306670d515c142ddd7c0c14ee208a61ce638cce4392,2024-11-21T06:54:09.360000 -CVE-2022-2658,0,0,26ed3a881291f201ea02ae3288a1704395bb9d2fcd2a474be9ff2aa44a021fdb,2024-11-21T07:01:27.603000 +CVE-2022-2658,0,1,6b3ce50fb027cf2f9b4fc8fa02c14c133ed159e62b907e6196f9383b5de512c5,2025-04-04T20:15:15.093000 CVE-2022-26580,0,0,400c02b7fdc085512d9c32dca5af1222b2d986a16acea60278bfa545f6d9c286,2024-11-21T06:54:09.587000 CVE-2022-26581,0,0,6558034aa21a79cae52472e107a80fbc28b68e589d10f6dcae7e8377165d7831,2024-11-21T06:54:09.740000 CVE-2022-26582,0,0,5ea90b32ce4fab5e28263f32ef7c9db791db2e2416a82521d75962fe60f1a360,2024-11-21T06:54:09.940000 @@ -196083,7 +196083,7 @@ CVE-2022-26872,0,0,d5d620c1d0a83c40398b1603b6c313ddff66bb2e10bba71c289303bbd08be CVE-2022-26873,0,0,f1736313bc07dbae0592c59770e1dbfd9cb91bff401e1f6300117f87ae65adbe,2024-11-21T06:54:43.483000 CVE-2022-26874,0,0,f4be2a4acf62c4ca9a25936ce3fc7d52142b0519270b19d8cf1c76348ed3aca2,2024-11-21T06:54:43.603000 CVE-2022-26877,0,0,5f979b96ddc49527bf7d9fb75516d2367e396f7b8dcce2a39bc6d0e57163db93,2024-11-21T06:54:43.750000 -CVE-2022-26878,0,0,a3aa7132bf19a451747116e84fee875ff57236108568fc863c4c32ee780758b9,2024-11-21T06:54:43.893000 +CVE-2022-26878,0,1,b327530039ea5d60add8e862f7ea0837cd1d2ddb8bf980de0c11179044b36d23,2024-11-21T06:54:43.893000 CVE-2022-2688,0,0,ccd9eb21cef178ad7994715bdc0a1b4c9fc135984f6ed451e126ab797c988b26,2024-11-21T07:01:31.063000 CVE-2022-26884,0,0,f79165fd2223609cb46b0e9e39492392e91d8c40a8f267c0cc790caa7700b8ff,2024-11-21T06:54:44.060000 CVE-2022-26885,0,0,684b93dcd24c8273f9b3c4c7f504494bbdefa870b0404bd95d3db79f068a3af8,2024-11-21T06:54:44.183000 @@ -203870,7 +203870,7 @@ CVE-2022-36444,0,0,1e2e348270d7a31ab761b6ff629c656d43a57096ea9a02b1242b7f2074c41 CVE-2022-36446,0,0,916b2196c19aa016856c9806701bb695efdb90725330e47655f732f72d52694b,2024-11-21T07:13:01.783000 CVE-2022-36447,0,0,610470b8298f5cc38da6f37ec3f5c742c2a83dcc392632b38bb5a67a4675e018,2024-11-21T07:13:01.960000 CVE-2022-36448,0,0,c3bfbff2189ed91f04228c36ef7f79a1bc46d537d24ed905f1d90e7125d6bad3,2024-11-21T07:13:02.127000 -CVE-2022-36449,0,0,0272c5fcf933c6e74ce1a6f2ffba77c32889c972d1d66d6be3a8a84f56039027,2024-11-21T07:13:02.293000 +CVE-2022-36449,0,1,cb701fd641a2928f844cc6a5c720f63307733e7b9cf3600bca18b1508e3d6295,2025-04-07T12:47:11.043000 CVE-2022-36450,0,0,e6c92eda88ef15edd6d60b94131feccc39f875cacde26c9ef71f64e597c581dc,2024-11-21T07:13:02.477000 CVE-2022-36451,0,0,71977d5bb89085f4a8a3c2668c5d77843726811bebabcc165d268f728f9a486e,2024-11-21T07:13:02.640000 CVE-2022-36452,0,0,ba79b5f83ad662aa03806821fad5af85c56b972706d773cbc14e561ad9c883c8,2024-11-21T07:13:02.800000 @@ -206717,7 +206717,7 @@ CVE-2022-40315,0,0,05d9285bb6cc017e30dbb5a38cf7f38ed4f03f09c1d2a1d2b3981338b49fb CVE-2022-40316,0,0,cf83de4c7ee7a1cbe9ee13608f89fd63959852bcb62b5612d8a85addbace0d22,2024-11-21T07:21:18.203000 CVE-2022-40317,0,0,cc17b526ea0328bcaf1b715606ede8dd23127402e5f359e1ceb08fe56e8d4be8,2024-11-21T07:21:18.340000 CVE-2022-40318,0,0,f5921eddad0bb051ed608287fc32fffb5b1d1d8557618d0de9b2a74186aa2ef1,2024-11-21T07:21:18.503000 -CVE-2022-40319,0,0,54f470ca1d5b4eb8ad7db708f2b609d4240f17bf8742fb366e89bf14deba52fc,2024-11-21T07:21:18.700000 +CVE-2022-40319,0,1,44756b9bd01c9a7608ee2bf4b857cd628a5cbbb6d675fb043e8c9578b3f875f4,2025-04-04T20:15:16.227000 CVE-2022-4032,0,0,74774b5171968f297ecee243108f6d94c1090e4ffada889bc60aeb5dafe9caa4,2024-11-21T07:34:28.933000 CVE-2022-40320,0,0,a7580f12472baa50d7eb7366dc2598b703a77660c0c7bff68cf8434ecaf347f2,2024-11-21T07:21:18.860000 CVE-2022-40322,0,0,f2fe88f0758847eff4d0ebcc9b3e83e63ab81ca06ee828bc268898af99475c88,2024-11-21T07:21:19.020000 @@ -206953,14 +206953,14 @@ CVE-2022-40653,0,0,c530db75e85c82b709a959ba53c21f08704f2b35f5bde582da61130f33623 CVE-2022-40654,0,0,4a46c62924a27a366107e74b116fb512902645049da93f83830cc9c6a2d8ac0b,2024-11-21T07:21:47.720000 CVE-2022-40655,0,0,2249c53d8e144885dfcb8a9246dcaf2d20b9aae1bba8a07bafbe683c0ee33660,2025-01-07T19:15:26.640000 CVE-2022-40656,0,0,16a2ff204c6c9d856b86d36af3d6f628546dfec3c31fdfa2df8d81da0d97a554,2025-04-10T20:51:02.880000 -CVE-2022-40657,0,0,e05667279d1b44886e2627e0eccadcb95e8621815492bc9bff52007195a0cace,2025-01-07T19:15:27.923000 +CVE-2022-40657,0,1,f9198713da9b09ee426ca7f430d5c2a36c9e85894627a1b6a9848b84978598a5,2025-01-07T19:15:27.923000 CVE-2022-40658,0,0,fd749250a5f0ddfefa15b2616713f255f02b7960033b39c300ac1bbf9d7d2528,2025-04-11T14:49:14.823000 CVE-2022-40659,0,0,8ecf568ccb6183d16c381715ffac3ab1576e3eff692fcc652619032e40461620,2025-04-11T14:49:09 CVE-2022-4066,0,0,beae61b48c85e5f59e106fcd0e2231f7dd67421f06f8464ab6fe8ba24d8c3a6a,2024-11-21T07:34:32.567000 CVE-2022-40660,0,0,67fab54360fc1bb9f2bbd88ce57e3781e2d8cd17ddf321103eab24d5ebca2891,2025-04-11T14:50:43.153000 CVE-2022-40661,0,0,784b09a84ce120919fcfd1c4c0aaeac1cf11bed528422759ef6f40d63c7f121a,2025-04-10T20:40:16.880000 CVE-2022-40662,0,0,3bcdea42aa85d026989762f91f8323f19dd120804371d34eec212aa25007a655,2025-04-10T17:44:27.980000 -CVE-2022-40663,0,0,dde31399f5a66e6c570042ca074334e5e7f72b9477fce1392dfe59d8146293e2,2025-01-07T19:15:28.657000 +CVE-2022-40663,0,1,6b3f6aa4ef156ae24b96bf2e376c8d48a81f1833e6da98fe020b45cd8afae60f,2025-01-07T19:15:28.657000 CVE-2022-40664,0,0,6384fb998400dd78dbbbbeb97701764cf40b03283cb2d5b45fedc9b8706ae4ab,2024-11-21T07:21:49.007000 CVE-2022-40665,0,0,11adc7edb24b1840642261dc605f3c70eb716a34efafd620ebb9fd24f65e6877,2023-11-07T03:52:33.163000 CVE-2022-40666,0,0,632ec9ff8b574405a7f28bedb20e0ca0512dfd079c1ef041a8fc193cc4145955,2023-11-07T03:52:33.393000 @@ -207002,7 +207002,7 @@ CVE-2022-40700,0,0,fca590d6fd1fbdfc5739ecd2e65df0fcd08202a7197755ab9726bdfc00b55 CVE-2022-40701,0,0,b79877d5d8545a9c8defb05ca4935a4b3c744967f351c858cf25816169ee21c5,2024-11-21T07:21:53.280000 CVE-2022-40702,0,0,d46577d42503d5eb7dc542ff1a2615da897b7309a2a84aaf4171346114a0f679,2024-11-21T07:21:53.407000 CVE-2022-40703,0,0,07674f2470764e5c65b8965ed36278149b32a21b9f3b141ca0abc772272f5f8d,2024-11-21T07:21:53.537000 -CVE-2022-40704,0,0,9d3c28832fd418e868a0584b96e404024f17cb1996d174eda1631c0902a27b88,2024-11-21T07:21:53.663000 +CVE-2022-40704,0,1,6f5f5337b940f6d7ec5c793dddbe14d5ca72e84b17c5e84dd958a1c3ae49979f,2025-04-04T20:15:16.460000 CVE-2022-40705,0,0,efefbb1893244ae9fa59d8f7d02122cd7b73951fd77aedd9114c1bdc9a1247ed,2024-11-21T07:21:53.783000 CVE-2022-40707,0,0,4108c9a606bdf4e329ce1a1a55fee05820453bc32b4d03b4396aaf61e31fc74f,2024-11-21T07:21:53.990000 CVE-2022-40708,0,0,a23b1d9a209770185d1cb0092c8b268dec050b035ad3f9dded199fe135f45978,2024-11-21T07:21:54.130000 @@ -208491,7 +208491,7 @@ CVE-2022-42435,0,0,cc0e9696869ddba79598814ae00f9d8a0b0e6af0c66dd4b7021edd95824af CVE-2022-42436,0,0,c11d8d676b67bb8f105ff05e8dc4ce1e6bd487065e111bd4e854225774ac561d,2024-11-21T07:24:58.130000 CVE-2022-42438,0,0,afc2fe0cf473b52ca23d69a4275bc1761565798a837222c9234a9b499e5be663,2024-11-21T07:24:58.260000 CVE-2022-42439,0,0,4e01fbb9c33edea9106ffc0b4167a5a65dc49e1e9db6790bbdbe9b0df445cb8b,2024-11-21T07:24:58.383000 -CVE-2022-4244,0,0,ac7aa8637bd51b0082b62accf7566c41956dfaa0408f9eef65ee5607ca988b28,2024-11-21T07:34:51.510000 +CVE-2022-4244,0,1,16ae99c985e7b36dcab810e8ccfc14c9fa257b27663d0c72059c2a5842fdc1cc,2024-11-21T07:34:51.510000 CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000 CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000 CVE-2022-42444,0,0,5329124ad7f1068195d555d1d0ed53c482283f2a11b45a18466b4858bf7aa527,2025-03-25T16:15:15.877000 @@ -208731,7 +208731,7 @@ CVE-2022-42822,0,0,67bbc2542a632a1720052dfa2dcc2ec8cda2381ddc4abbf51e0a406addb8a CVE-2022-42823,0,0,2706d6d702a162619e5c8c87a113083e113e2f3e61e1cb73de615fb73185bd30,2024-11-21T07:25:25.053000 CVE-2022-42824,0,0,d5e685830c1a3c445ce4db0fcabb13d68cfc3c757166d52c61f443ffd19f26f8,2024-11-21T07:25:25.203000 CVE-2022-42825,0,0,5dc9e23b067062d81271ac617f8021956edc3bcba1071ec1aae0b7e0f379647d,2024-11-21T07:25:25.357000 -CVE-2022-42826,0,0,92c4ff3890b8ea9adec9d54118fed5a0b345e84992b64cbd5aede5e0795d2144,2024-11-21T07:25:25.490000 +CVE-2022-42826,0,1,a3db93b6acc795d6f94f901a4da2959143f2f1df1d41d8a4377b77c2f10dc1bc,2024-11-21T07:25:25.490000 CVE-2022-42827,0,0,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000 CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000 CVE-2022-42829,0,0,60b7d93b772d03e8943ccdbb49b71d351a7499a5bf19d49948ac08d4b6c96b4c,2024-11-21T07:25:25.853000 @@ -208875,7 +208875,7 @@ CVE-2022-42984,0,0,fcfe28b8dbe5f84aab1316e2459e35c4b5b1076a57522be4205d9d3a3a8ab CVE-2022-42985,0,0,50fcb0d8d2222e8ae0e860b478861446d3b8197800b3237365e901fcbd1f295f,2024-11-21T07:25:44.747000 CVE-2022-42986,0,0,e8c3c30f82ae751725e0f1a4959865d5d7d4f14ba6546aa469c2aaa927cbcaf7,2023-11-07T03:53:42.750000 CVE-2022-42989,0,0,9744234b97b3f36fbddd9f3b5132f9b7c5c65f19b1a002fd832fb050cdeeb1e5,2024-11-21T07:25:44.920000 -CVE-2022-4299,0,0,c0810a0c558417ce91f997400c07029eeb5b26e947546737e7f94be53577d73f,2024-11-21T07:34:58.097000 +CVE-2022-4299,0,1,e6fab8219cf449187712742ef29cb6f7406d1c9664898e749ae53d697821497d,2025-04-04T21:15:41.903000 CVE-2022-42990,0,0,6ccaff42c9716cd36f018c3e45e2d8023a828302b54797c348c5c945f344d6b5,2024-11-21T07:25:45.090000 CVE-2022-42991,0,0,e7d14a0cbd98573d2e9a43656211443bdab3e0a4823061f29ee103fd63330d0e,2024-11-21T07:25:45.237000 CVE-2022-42992,0,0,dd33bc6d00eba48a73d27f11ebfe827da87d8fa132230a4b43035db9c8211b4a,2024-11-21T07:25:45.393000 @@ -209668,7 +209668,7 @@ CVE-2022-43973,0,0,fbf58f67e6150c85f77a8fcc0dbe067db0cf425d405092d33943297cca1f9 CVE-2022-43974,0,0,69919e0e7167905137470b42346d9514d9f5ad392ebade71b415f92da98d24ae,2025-03-06T16:15:37.880000 CVE-2022-43975,0,0,66bb1339275bbad749a298df1e8a811ec00a782bf611dfed24d457af87acfce9,2025-04-07T17:15:34.940000 CVE-2022-43976,0,0,9654644c3cba085a8f48cbb96cdd14b46fb8933b952abcdf67794e9e677da970,2025-04-07T16:15:18.280000 -CVE-2022-43977,0,0,871f20691e0f649b27fa670416d3aae8731f054d31e24a163c764cf222e1609e,2024-11-21T07:27:28.160000 +CVE-2022-43977,0,1,d824b10cd4a3f5b91d3e0db3f9e133f238d24daffa9516cc9dbdb5a4e25a8ace,2025-04-04T20:15:16.660000 CVE-2022-43978,0,0,c5bd49bc699b20fbaeb4c71243fd1f15427f8242429862494a7b367293664002,2024-11-21T07:27:28.303000 CVE-2022-43979,0,0,3834129eef14cb691f827de465b024a303441cdcf79b520cb61d3b6d1c1c3ea1,2024-11-21T07:27:28.440000 CVE-2022-4398,0,0,e7fbb0cefb4c8e6aa4478ddb999e47a23fdb14f518ce5464afbdc69a05cbf9e9,2024-11-21T07:35:11.850000 @@ -209854,7 +209854,7 @@ CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b2 CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000 CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000 CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000 -CVE-2022-4431,0,0,a997979e77848dc720009496f56aa1bc847b4cf922636fc1e59621262ba1a1f7,2024-11-21T07:35:14.930000 +CVE-2022-4431,0,1,723db002c5699096c9126aa7688dc656d3723d7dde55c074d8c392948d015d8a,2025-04-04T21:15:42.073000 CVE-2022-44310,0,0,7a72af122186838fc7bfed1392316c46767978b12ec7c0f1861ca40c49475bed,2025-03-12T16:15:17.480000 CVE-2022-44311,0,0,1390ad964710d376d223686d1d0a0aa9a2e60ff70e3e9e276eaf20d3340a2e87,2024-11-21T07:27:52.043000 CVE-2022-44312,0,0,4c5ba9ac81239a5b02862be3bd3d25706812c7973b613af5d4a48f28f25d7ea3,2024-11-21T07:27:52.190000 @@ -210426,8 +210426,8 @@ CVE-2022-45180,0,0,9f620c4a664e3e793609c73bc097f6ede0c71acddff0176caa3a2a131c9de CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000 -CVE-2022-45185,0,0,16d3421e1dd997b987b16e5a1be92166802a096c290aa7656430b9fee7afb2fb,2025-01-08T18:15:13.847000 -CVE-2022-45186,0,0,5670ee5a46f5e4938195d00385aa4e9d5840fb229a927ed2b9bfe7bbfe73fceb,2025-01-08T16:15:26.787000 +CVE-2022-45185,0,1,60b7a5e3672c758bde70d414b1a891c14f6f3eeb29142742ac056f678d6ca0a8,2025-01-08T18:15:13.847000 +CVE-2022-45186,0,1,641d189fc4bf2acd73cd90d73b7321007ba2ef709adf56c382852f1907ca6e6c,2025-01-08T16:15:26.787000 CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000 CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000 CVE-2022-45190,0,0,f73aa26a6891c9ffeeac54b85ee8816a251564df5d1f415837c833d564391596,2025-03-25T16:15:16.280000 @@ -210611,7 +210611,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000 CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000 CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000 -CVE-2022-45449,0,0,6de754a18b8d47c00cd7ceeef04145b79172ad8cbe7261c632ca49ab71d89aef,2025-03-07T16:04:37.610000 +CVE-2022-45449,0,1,1e1ef067bc5ae523478e48b1ab3788234b7efb8c08da9cd75ab258e5dacef427,2025-03-07T16:04:37.610000 CVE-2022-4545,0,0,d87e7bfbf3f0412db298bc01038a7edd46c308ad3bcd5477d3a12c03a671a7cb,2025-04-03T20:15:18.597000 CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000 CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000 @@ -211328,7 +211328,7 @@ CVE-2022-46440,0,0,5e9f025b62b475de280b45d71c727fff77b65691cda61d6d9fb615377c4e7 CVE-2022-46442,0,0,678b9820b0106459aa0248d67124ad88518cc774d3433978e9228bbb322737be,2025-04-11T15:15:40.300000 CVE-2022-46443,0,0,55a7c896ac0c0497c368be2c3b16324841fa8a1208a8cd554b930b672ebe23b6,2024-11-21T07:30:35.950000 CVE-2022-46449,0,0,01fed2dd68d6025c1d1f5ac3e39810312ed20f1850f542b79104a0163a073c03,2025-04-09T16:15:21.380000 -CVE-2022-4645,0,0,485d685e6a64431bd6c5d2670b1b80d1289850bd50fc74fcd90ccbbac4ff286f,2025-03-18T20:27:08.320000 +CVE-2022-4645,0,1,3000346fedbe219373d8ceb4b6222d6ef062a5121441e73ca6be59d55cec24de,2025-04-04T21:15:42.243000 CVE-2022-46456,0,0,1caf185d160d2c007724a768c1968eaef8a178b82fd16840f5b68f045b2d425d,2025-04-10T15:15:55.343000 CVE-2022-46457,0,0,b9408b6579e15c7e7edd50781a4fe2a64be977793eac298d0bf929da4389cc15,2025-04-10T15:15:55.560000 CVE-2022-4646,0,0,32360f8f79849a91095b93ecff3a7dbe390ee1ff4655dabde3d1ec6a359e9583,2024-11-21T07:35:39.850000 @@ -211400,7 +211400,7 @@ CVE-2022-46568,0,0,1e7d4981b59e7e0605cf96f86839045385826176d895a76a6eedc815a1653 CVE-2022-46569,0,0,acd59798ec5be32c1bca9187ca03a34ee7a86984fe6a2f4b448597ebb23f2df7,2024-11-21T07:30:45.283000 CVE-2022-4657,0,0,631ba67a3b4939bd9d8fd7345375791f8a20d0870700712e002b43921c9442e2,2025-03-25T20:15:16.587000 CVE-2022-46570,0,0,4958166aa5e304b02a85f8b27b5ecf9972ebeeb0b42558f1561fde30ec5f1b4d,2024-11-21T07:30:45.437000 -CVE-2022-4658,0,0,8fb642b8f32c4f037f1e9788d540646c445ed8ea27a22fd62e011c5d23897371,2024-11-21T07:35:41.167000 +CVE-2022-4658,0,1,b91bc6f3e5a5faa98bb1cec63ab8eaef2598ea780a870b5bd332290fba727361,2025-04-04T21:15:42.457000 CVE-2022-46580,0,0,0beb0c11879b8285863d1794f29f1b0bc79aa7d2b307cc30554c95157e07713c,2025-04-11T23:15:27.637000 CVE-2022-46581,0,0,d944feb6b5ed493a03450b40cdff5e5e430946dc5901ffd70be0e2393954052c,2025-04-11T23:15:27.853000 CVE-2022-46582,0,0,f95020625af08a557362d713126ed2300aa65ee01c8112a6d68c90d757d5db0b,2025-04-11T23:15:28.070000 @@ -211673,9 +211673,9 @@ CVE-2022-46885,0,0,03e634b42679f64836438cf714f85e7b9455acd49a8940d2b20eb357beb8d CVE-2022-46886,0,0,2c5177682d11c815928c08ac4ff1ee3cff28dfbf29c5808251179c9b1aa6aab0,2025-02-06T22:15:34.057000 CVE-2022-46887,0,0,749aeaa915a91542622a9cad3b70a23b86f43b82e0419d6eb1bbce9f022947d6,2025-04-03T19:15:38.337000 CVE-2022-46888,0,0,b46f68e9e86fd41a1226bf837cb3646b07c439a68643cdd6c92868d2edc57336,2025-04-03T19:15:38.530000 -CVE-2022-46889,0,0,bd1ad8c9756bd80a5153f3303915e1b67cfae78d7f750ed70710210b30d703b9,2024-11-21T07:31:15.163000 +CVE-2022-46889,0,1,2ce854f1588980e5c13b0a95e292c97bd0037125d2e42b61d29eff5add6411a8,2025-04-03T18:15:42.307000 CVE-2022-4689,0,0,e3ecb10eb93d790d7c10c5fb4bca0fcfcfd80f89c4c97ab9c5199d444cb3c369,2024-11-21T07:35:44.400000 -CVE-2022-46890,0,0,d69e60eca86f930501c52b695cc04c06aa9ee721988b099937c5fdfb5b836e23,2024-11-21T07:31:15.307000 +CVE-2022-46890,0,1,e96127f0e3a42cdf0aab1997a630faa5c213f86901569ac58beb3c9babe2be73,2025-04-03T18:15:42.510000 CVE-2022-46891,0,0,338ed870ab4d36745bd165833d3bc94dc064c19bab29d636370f5249d84beaaa,2024-11-21T07:31:15.453000 CVE-2022-46892,0,0,aed08df9da0746eefd7855074f55002ef87a3db62609b63f9f4849054d755591,2025-03-19T18:15:18.570000 CVE-2022-46897,0,0,ba53137ecd568f4fab0981ebb387799610a2c8af877be455e5bf13f25149225f,2024-11-21T07:31:15.780000 @@ -211782,7 +211782,7 @@ CVE-2022-47095,0,0,5e83a5179c27c28b51f63f1870723ed70e74420bf90ad9ea68db2ec716e9b CVE-2022-4710,0,0,7dfd8457b8ce63842c06d5f5362ebfc8ce962651da0ac74a31956bda48b86c98,2024-11-21T07:35:46.840000 CVE-2022-47100,0,0,61b44eddee8762a6a2fbc5232dfffae3bd5197feb64fe25ae2c561a5d6e94999,2025-04-02T16:15:22.980000 CVE-2022-47102,0,0,78778a4bb3d94b5726f0458f84ce7ac19358c59edaa2cb53c716b499e18add36,2025-04-08T14:15:29.520000 -CVE-2022-47105,0,0,4d8abb3976b42044e1cb75fcac19fe6d6678b243b2b256309ddf6fa4769b4153,2024-11-21T07:31:30.547000 +CVE-2022-47105,0,1,05a9e403ed554a6f621694c16e93867c495eff7cdeb788d1685f64b21ecf7f56,2025-04-03T18:15:42.693000 CVE-2022-4711,0,0,43cdf83f4bff51294766f1a74dd3e9d5b0faa7b2bae15729eb7bb4ef4af41e08,2024-11-21T07:35:46.953000 CVE-2022-47115,0,0,a3b8fa59c9a6bbe67107d855a9a16d86c4755caa8ba3c9fd5edee049e3e1c14b,2025-04-11T15:15:42.107000 CVE-2022-47116,0,0,bc93e725a0f8541ddf98d21b2e14f4340382ec109d136dea36f4d8cfbbee8693,2025-04-10T18:15:44.877000 @@ -212616,7 +212616,7 @@ CVE-2022-4842,0,0,59db9ab30460788a354d7e0bf46cd4437b13ff0f311ab4a5e6896c72e85775 CVE-2022-48422,0,0,21280efffd732310e96aab7ce559416bfc11e676f2fac7503fda3c38abd1c1c0,2025-02-27T17:15:13.490000 CVE-2022-48423,0,0,9a382a8f9283e9cc20387d0ba6add00de2aff03f57ee8431397c94b87413c240,2025-02-27T17:15:14.530000 CVE-2022-48424,0,0,9da47869864ec90be63e396d6253bb25acaf19379b79f5fbbeffac650f050c1b,2025-02-27T17:15:14.697000 -CVE-2022-48425,0,0,93864fe860b2f013079492f9e8dfb06bf67caceb010ee43ab9ab04d733583ed7,2025-02-26T20:15:10.493000 +CVE-2022-48425,0,1,93f4daf3685a8626ec9a7dc02bef2df4fe25228a3ad0be39f5f46eea0b21d2a8,2025-02-26T20:15:10.493000 CVE-2022-48426,0,0,e18aebb1b534c2a05d63e4f30be752d5746fff5a412fd6531155a734c44d5f7f,2024-11-21T07:33:19.603000 CVE-2022-48427,0,0,0326e52456f97bd2c754bc3da2f531e8b133551d82bbfc3aa6700b24a0427d58,2024-11-21T07:33:19.720000 CVE-2022-48428,0,0,4547183837d0e6734c739f353f012e965f39e76c25b2222332674192a05ca15f,2024-11-21T07:33:19.837000 @@ -212790,7 +212790,7 @@ CVE-2022-48629,0,0,61e95796ad26cabbf634a5891e412934a1a901a2d9e6e15e591b6dbf19398 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 CVE-2022-48630,0,0,c1c0b149824310772dd2a34eccec1464745f453029fe1e494c66edf69e66a0b2,2025-02-03T14:09:55.317000 CVE-2022-48631,0,0,07cfa709b2311dbd1149137d694e3cc56dbf7ee50a39f3e8764d7c810d0b445c,2024-11-21T07:33:39.040000 -CVE-2022-48632,0,0,7de6f29a2d792a1760c2d5678de7c33a7555220f33541341ccdbdebc8af946e3,2025-03-04T16:00:42.163000 +CVE-2022-48632,0,1,e568dd582a4cb1138295e64c1dc54f573f048db135846f10bd62fd2bb06d3bdb,2025-03-04T16:00:42.163000 CVE-2022-48633,0,0,39061c44a5a7b00aadebb280c44e2a7295bff9ff4a64448f966add5f4258b8ef,2024-11-21T07:33:39.280000 CVE-2022-48634,0,0,1765bef3b459a9c7d04ea047e7a9c537706505aada07a4dd36606127735a58c8,2025-03-21T18:26:33.670000 CVE-2022-48635,0,0,055732a4655dc0271eed1cba4bba6051f58f2b33347e90372bd9a0b297b54ac0,2025-03-21T18:26:27.387000 @@ -212806,7 +212806,7 @@ CVE-2022-48643,0,0,ab9b649f55ad96816c2493c31f5a05b2eb566c44703b1f0180a6a102d8ac6 CVE-2022-48644,0,0,c5039b46b0d136554ba427d83c4470091587ebeb56eef158e382b1a908e7e2d6,2024-11-21T07:33:40.817000 CVE-2022-48645,0,0,4d8ec773eaf2c6a6981744ed20ef9fe75b117903e4fb588c647780c2e96ceca6,2024-11-21T07:33:40.933000 CVE-2022-48646,0,0,2bb2fdb29daa9dd60ebcd367490425ac9963ea4f2842936bd59923671c26e4ac,2025-03-20T21:29:44.733000 -CVE-2022-48647,0,0,ccb239d2c955e135193a2528634923ad9b8b5d4d8949e9bbb6fb9a21adecb785,2025-03-04T16:05:37.600000 +CVE-2022-48647,0,1,b8d69b58a8f06dc2bdc736d9caa8a988a0fb13c9c7953c8b50f93411f1b87523,2025-03-04T16:05:37.600000 CVE-2022-48648,0,0,9a846fbdbad309d97836e69fabd5197db1c3b2910cc6f57468045df41e3f2876,2025-01-14T14:52:07.293000 CVE-2022-48649,0,0,2ab33e79ca9b4194d6d75677c978f0f9883b10a83b196d871b3a9d72b7c8b216,2025-01-10T17:49:53.747000 CVE-2022-4865,0,0,18e0a04c007aee1df9befeaf56e83e037df0050950a376d12b247ab05acba711,2024-11-21T07:36:05.920000 @@ -212861,9 +212861,9 @@ CVE-2022-48698,0,0,757b9d8e85f2f60517a233e4330b21bea480184a2d3da1442abac1a77c637 CVE-2022-48699,0,0,4a65b916873eacb0ff3e3e320e4042125dd7b4593e08989ea9e1bb3148422bc9,2024-11-21T07:33:48.920000 CVE-2022-4870,0,0,cf8eabe70441156e718239f55dd4a96c27111e9045e8fc7245a71a9a53fcb5be,2025-01-21T21:15:08.203000 CVE-2022-48700,0,0,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000 -CVE-2022-48701,0,0,ad5a0001b0117f2dc2ef17a41995c0d455be44f06c29118eb41ffc52408b51ed,2025-03-05T15:13:43.770000 -CVE-2022-48702,0,0,8350ffdba1476edb4d97953e39a11913476ea1861a2bdba9415d5d1ed3f2829c,2025-03-05T15:13:34.227000 -CVE-2022-48703,0,0,5c0665c01ebb6e5c7d8fb47f4d83f7b7d68941cdecbf0052a50e38d3de569338,2025-03-05T15:13:19.340000 +CVE-2022-48701,0,1,027c54e4d825bdd12c32673c3103cd17d2495483ff45797ebb4c7bdae8c8952e,2025-03-05T15:13:43.770000 +CVE-2022-48702,0,1,643a7ba53f7eaf4c19106438fb5fd4aff75f35ee24b5b8c34eba96d00432e8c1,2025-03-05T15:13:34.227000 +CVE-2022-48703,0,1,aa9b6f2164afdbec32512a3297decc66b299fdd29a8c3774ba55744298564c64,2025-03-05T15:13:19.340000 CVE-2022-48704,0,0,47746aeb57bcf7a965c1ca8f69f62ccdd67c83a463e82f583542de3bf10ea0fa,2024-11-21T07:33:49.487000 CVE-2022-48705,0,0,4d7355aade7f8a715c9b190e7e3da5273a5fffb6306134ecaf22441341989089,2024-11-21T07:33:49.613000 CVE-2022-48706,0,0,655269dad9460ce24903be8487a36beced2ab87815e825178201c8883a7a58e6,2025-02-03T16:12:16.050000 @@ -212878,7 +212878,7 @@ CVE-2022-48713,0,0,dba52de96f36212e00e3f48911b9901b8a56b45e7b0246c938f59444b875b CVE-2022-48714,0,0,58a367e8e2a2b8b403513dd3431efff25f4b14846b4d8a855f1b8d14ac3671d2,2024-11-21T07:33:50.707000 CVE-2022-48715,0,0,93224e8d22f349fe51e81b99199774a1a821d5e47ca2fb81a3cb0bf5abbe6a22,2024-11-21T07:33:50.820000 CVE-2022-48716,0,0,b07b80b34d462d3ac15d2d56d5e6aa7cdc0ce082639261c6c9b2d73d8c0823fb,2025-04-01T18:27:38.810000 -CVE-2022-48717,0,0,b3b08bd8e722ce2459091035138c2b5548df0105d024b90098827376a629e5a1,2025-03-05T19:17:58.723000 +CVE-2022-48717,0,1,470bbaaadc9dc1bd2669fcaacebe78216dfaa11aafa1b98283d631eafd0d65dc,2025-03-05T19:17:58.723000 CVE-2022-48718,0,0,56ecf471bcba13fb47d5f3ace85ade27dab5f6ff3be1a1b50c6e21a26de8e9b1,2024-11-21T07:33:51.233000 CVE-2022-48719,0,0,1ec83493267c5a3396d0c5845cc4a1abca73ebaedabef02e084a478b98384c5a,2024-11-21T07:33:51.357000 CVE-2022-4872,0,0,bd983ec589fb7247ee85da696c8ec022ec1972c4ac97eb49f86975fc0bb5edee,2025-03-27T20:15:19.160000 @@ -212975,7 +212975,7 @@ CVE-2022-48801,0,0,a8fd5f16c8a757c25d85dfc312a52de37c1cf99353d1034498d2c616b2131 CVE-2022-48802,0,0,452388413750fad0016a585aeb6293a87a2a7a194129365e3d1068278e8d25d8,2024-11-21T07:34:07.003000 CVE-2022-48803,0,0,3944ba64b4bf5014e3b95671d9aaf2ca749998f790b192bd3d54f239fb4ea60a,2024-11-21T07:34:07.110000 CVE-2022-48804,0,0,d4967cc93f900d12692fa8fabca50399bd7d028413bcceb09e055fdf35a9730a,2024-11-21T07:34:07.233000 -CVE-2022-48805,0,0,8788147360675056840fe2c4f240f0eb77eab3860fbfb0b076fd059e27934ce3,2025-03-06T12:55:17.027000 +CVE-2022-48805,0,1,167d52a24873e16da257bf54e776f2ad2b9f6eb95b7d9e16898053f4fa9fe42c,2025-03-06T12:55:17.027000 CVE-2022-48806,0,0,138d514a8f59997aa967f097597406012727075dc083aaf3ae10ca94a35161d7,2024-11-21T07:34:07.470000 CVE-2022-48807,0,0,2526145aa7b4eed086785b29ff23ceec41a1875b0c9d0ab2bac70882e3cf55f9,2024-11-21T07:34:07.577000 CVE-2022-48808,0,0,0dde40ae7f1b74db3ad7c6c323821786b9fb456c6601160feb9f4b68999dd61a,2024-11-21T07:34:07.673000 @@ -213002,7 +213002,7 @@ CVE-2022-48826,0,0,eb2c23661e650309111b6515f53a230ebe0f461e3609384a75f2ea2b7e892 CVE-2022-48827,0,0,59a6cad7f6f2d12d8ed70898fe02c3f7c8544fb257f311d73d4984a36e9b27a6,2024-11-21T07:34:09.767000 CVE-2022-48828,0,0,7a234af029357a827284fafcee560972937ab1d00a6901553e15bf06be0ae96b,2024-11-21T07:34:09.883000 CVE-2022-48829,0,0,23b069311a24aa387c6592becd0f69e4210410c11f95c41a93227a82c0aa2c1a,2024-11-21T07:34:09.993000 -CVE-2022-4883,0,0,0c4329ae6bc9d0dbc79b7d7f61f4292a76f5401a96b3839e9cf876c66ed4bb33,2025-03-20T20:15:26.757000 +CVE-2022-4883,0,1,ca0d7be2c3e22bdd085322e5712e140797c1e3afea4aa983f9e23659b64d85a7,2025-03-20T20:15:26.757000 CVE-2022-48830,0,0,528e538a1cb5b7fc619709dd1a627afd309d21ad4886875ad2412a3af030b95a,2024-11-21T07:34:10.103000 CVE-2022-48831,0,0,05bb24217e56141a02362670e6855afe44bffe0bad1a2d46f283b17ecf64f728,2024-11-21T07:34:10.210000 CVE-2022-48832,0,0,412b19f2926396c16f14324151947f9bb5b297fa00c72ccfe19f1676fd085e12,2024-11-21T07:34:10.327000 @@ -213761,7 +213761,7 @@ CVE-2022-49520,0,0,e5307f9b37880054f4da04ed4cd0256419aa2046ad8ef496d6a57ef085a0a CVE-2022-49521,0,0,e644a8814ea918f85e8c1694b44f101304bc35ce01d7c832f690b4567f5df3bb,2025-02-26T07:01:28.113000 CVE-2022-49522,0,0,9488e6ed21b227ba47a49df0934ac9256cfe804214100f332cfe4ec56ad49861,2025-02-26T07:01:28.210000 CVE-2022-49523,0,0,bbd81ff4fef48ffd0e431512c5eec489cb47dc1a285ab5f7a21cf26224ca7dbf,2025-03-17T19:53:36.500000 -CVE-2022-49524,0,0,8a7cb3b5626d81e48c7a63971deaf788c0a866d87e11cb60f21ac5f4cdf5017d,2025-03-24T19:43:42.333000 +CVE-2022-49524,0,1,23c31bd580c70142bf1ddec50641f8dbdb3859b62b610d1c1bc6c570b2cec908,2025-03-24T19:43:42.333000 CVE-2022-49525,0,0,981facbe77820bc63be37056597f6bd0c13283c2aefe388263621a35ac5e726c,2025-02-26T07:01:28.500000 CVE-2022-49526,0,0,5339b66753ad80fb9a756eb170f85cfe6377c30292ade6b3738883eee6d81737,2025-02-26T07:01:28.593000 CVE-2022-49527,0,0,8960d347d57916d69084b31394fa7ed486a2d4f2b204cbb50324b6ae797bfbcd,2025-03-10T21:16:33.907000 @@ -213990,33 +213990,33 @@ CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176 CVE-2022-49730,0,0,e4380c0e0399cfc6b375388279705da8be09a1a2fdffe485a89fe9faccc26dde,2025-03-24T19:32:33.903000 CVE-2022-49731,0,0,831558e1f06d066bdcd53722be4168da2a4977f1014a464b1eb0286885be58fc,2025-03-07T20:46:01.040000 CVE-2022-49732,0,0,364e13a6491839d83af585411890da08c1e514679e122e818830d89fe163fab9,2025-02-26T15:15:17.843000 -CVE-2022-49733,0,0,32f73869bf1c562f5b3ec290ddbcb7e24cf28788336a4ed241e4fcd302f309dc,2025-03-05T14:54:00.890000 +CVE-2022-49733,0,1,504ed215e4fef9568384eb9015b544d5e4199a14de8ad89fcf59cf8eaf3ddd19,2025-03-05T14:54:00.890000 CVE-2022-49737,0,0,68f37be35c87e6632eaa4dfeaad0e5274348fdc377147f4515b3c041f52f3c20,2025-03-17T16:15:17.540000 -CVE-2022-49738,0,0,9edf4848665a8e76cc40002322b7c6c9353836b21cdc075c710f87e8172a0e26,2025-03-28T18:11:49.747000 -CVE-2022-49739,0,0,177b5c4fd502519f039b0e8d6c3d147df97d2bb471f1caf3a9dc9848e092365e,2025-03-28T18:11:49.747000 +CVE-2022-49738,0,1,c915039010737ab0ea3baa96d8fb52186972f13bac3b225f6caca566b78c9f3a,2025-03-28T18:11:49.747000 +CVE-2022-49739,0,1,86b85746688ded2b491c3537c6a0eefd5da0550e2f8931c01faaca49ecbc3863,2025-03-28T18:11:49.747000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 -CVE-2022-49740,0,0,e0baa0991050aa4fb07b7b4de5b9a8d136bfe1f327795190897b7e5971da559f,2025-03-28T18:11:49.747000 -CVE-2022-49741,0,0,ef4f9ec92d166a08a100d8e5d1f4e6ec7f13a752ab52008f18162487ddfee7b4,2025-03-28T18:11:49.747000 -CVE-2022-49742,0,0,ebf06750f8174eb7c0a64296f2de1f679b531ca356c665d667f53589df99c8d0,2025-03-28T18:11:49.747000 -CVE-2022-49743,0,0,85f802f2e4d320352d70a65e535c705648a5ea4b16a2aabce9cbc700e70a2acc,2025-03-28T18:11:49.747000 -CVE-2022-49744,0,0,02d63ac9f23a3233ea1a8e8f584edc34bc3ee43806b36f9c6d9b6f8b4ec944fc,2025-03-28T18:11:49.747000 -CVE-2022-49745,0,0,34cb17d2be85aafc8218d9fce78dde163ee1461eecb7c7b658024a2ad4a771be,2025-03-28T18:11:49.747000 -CVE-2022-49746,0,0,1208c4f74df2f82c8d261dd9b2f1f47028a9515bd328569b7c7a1d8e36a6a0ae,2025-03-28T18:11:49.747000 -CVE-2022-49747,0,0,456f0b36b8b15bfddf77e0dc3e969f3b73fbc1783a2cb4d003d385d85a82ddfb,2025-03-28T18:11:49.747000 -CVE-2022-49748,0,0,15899c02015f7ebc027ea458416f6498a709c0561bf6ef59b07796e3eca34f2a,2025-03-28T18:11:49.747000 -CVE-2022-49749,0,0,7b676ed75ba92d53b6288d95c65bc0664420dff4d9d67769253c7fc433a22a1f,2025-03-28T18:11:49.747000 +CVE-2022-49740,0,1,baf160f4d8080c56b8a4bb95385771a2ebeccd045dfaf4b9581d0bd018d05e5a,2025-03-28T18:11:49.747000 +CVE-2022-49741,0,1,21129d56ce00153c57374dc2bc7d97f388bd46e103dcd193b107c41618db7435,2025-03-28T18:11:49.747000 +CVE-2022-49742,0,1,58a09e1a4a96d91cb25b22ec7df6d14614e63ecc6a275bd43ded1d5cdd11553d,2025-03-28T18:11:49.747000 +CVE-2022-49743,0,1,539b6ce5edf4d279a11736bc4054a062d6e32d6c32e177b78bf5f318891605fe,2025-03-28T18:11:49.747000 +CVE-2022-49744,0,1,058727e6d53f1e055bee52d197393500fc92431b51d44d271ba8bd151dccdbbe,2025-03-28T18:11:49.747000 +CVE-2022-49745,0,1,dc4892c6042b4ed0dc7d24163161c76e3d77b3a0798eda9605249f6f05233a1f,2025-03-28T18:11:49.747000 +CVE-2022-49746,0,1,aeaaf1f1dca5483eb99627c4a08caa38ae4dd400cbccd41d42f6de21e543dea4,2025-03-28T18:11:49.747000 +CVE-2022-49747,0,1,91da049ed72080e214e6e57b849e07d9b34ba537e33415af165e5890208cc47d,2025-03-28T18:11:49.747000 +CVE-2022-49748,0,1,d3197a24c540af40b6b34d0f7abcaa1ca628d4ff158b06db6613d45f180439c9,2025-03-28T18:11:49.747000 +CVE-2022-49749,0,1,c2556158c3bc053cba1fa872126c4eb1c64fff778f489f6fe47a45bc79468e3c,2025-03-28T18:11:49.747000 CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fbd5,2025-01-27T14:15:27.210000 -CVE-2022-49750,0,0,6244e8b4a9a1afd0202ffb31f2a809e3d11deda413425ff64ed0fc733537c656,2025-03-28T18:11:49.747000 -CVE-2022-49751,0,0,902ae0571ccd9652a6508f07ee0bbe7c6631a70bceb2c35ca8fb3bb889f1be46,2025-03-28T18:11:49.747000 -CVE-2022-49752,0,0,4caf0d6986c76544699fc5e67831136407cc4154023d57a292bd6ef9bd21f5f1,2025-03-28T18:11:49.747000 +CVE-2022-49750,0,1,56ed291ac3c93e1bd6d476faa5c3f9ba6272b9529cafbf4e2ca85d0ec27b5fcb,2025-03-28T18:11:49.747000 +CVE-2022-49751,0,1,5a0d0969f4db2d1f19420e0cf6bf748bee08a4e7cdb5f60687baa928a2c310dc,2025-03-28T18:11:49.747000 +CVE-2022-49752,0,1,7b99da340057587abd4c70596e837196b7b2ea5f277bf86e52f956754c7c3ab8,2025-03-28T18:11:49.747000 CVE-2022-49753,0,0,8e3e12f1d1db560c5d97270ae4834ea7085523f364fa32ffe611532a97d064ef,2025-04-01T15:41:09.700000 -CVE-2022-49754,0,0,6af1eae30d5b9b91fa852a6491e6e308e4873562f91dc0ee28d6938f37b87133,2025-03-28T18:11:49.747000 +CVE-2022-49754,0,1,1d8d8be4bcd96e50020e0ddecb9d656a32a6067576dda688ef22cf1cec411eff,2025-03-28T18:11:49.747000 CVE-2022-49755,0,0,c4c160831d08afe734b18a9033385b20e4e60be66fc6905e3e921241bd56da97,2025-04-01T15:40:57.590000 -CVE-2022-49756,0,0,3a6ce8eeb2e25ac70164ae5cf4a78952668a1ccffe129e7a6187967555509bd4,2025-03-28T18:11:49.747000 -CVE-2022-49757,0,0,a5318aaa570f322259f645747be3167dc8ac987a6ed92366c0f302ad131115ca,2025-03-28T18:11:49.747000 -CVE-2022-49758,0,0,3f0b777c867a5e0bc305e97af59d3da33e1c6765004047a205a4978aff5b546d,2025-03-28T18:11:49.747000 -CVE-2022-49759,0,0,0f3b871bd92d0d52da93aeb508390c7defe97e6d0f0b449a0549c9dee88448df,2025-03-28T18:11:49.747000 -CVE-2022-49760,0,0,4b729c74a829c4ba4daa03bc58d3ab56925024e35b5e622bd527c0332c5e4636,2025-03-28T18:11:49.747000 +CVE-2022-49756,0,1,13c24b5d1ccd2e03513baf19680edeb18dc05cba102a390ac6138202b5f9264e,2025-03-28T18:11:49.747000 +CVE-2022-49757,0,1,92f674a00f5044658bdb48ee513c211612e127833ee923d0766d02e6c4e1b0b0,2025-03-28T18:11:49.747000 +CVE-2022-49758,0,1,d524fe8beba1bd01a5774b52b022de0fd70b23f757d631c3633730f9273ed1d6,2025-03-28T18:11:49.747000 +CVE-2022-49759,0,1,49ff8b84d1e766d117b5510b430c66fae77de9973ec4f23d04a90d9099b07e60,2025-03-28T18:11:49.747000 +CVE-2022-49760,0,1,174c6ebf6ffdba46560ee57082a10e2bd736443de432b3c57d79e8c3a863f4d9,2025-03-28T18:11:49.747000 CVE-2022-49761,0,0,182b2acd2b419d0dc6631691801e74dd45ce3a727bffa39bafb3990c4066bd75,2025-04-01T15:40:43.063000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000 @@ -214706,7 +214706,7 @@ CVE-2023-0710,0,0,e069c9ceb271a441a1cbab0d288e14aa201522693766f3040f5eaa2f5c6d00 CVE-2023-0711,0,0,3ef111dc0a8c56fa2b0cdb3bdef34950f0a876b835518538dddd8e9e66ebda4b,2024-11-21T07:37:40.560000 CVE-2023-0712,0,0,a7cb6bd1d5630da8131075b971ef3eb0ab8efdfeb6087a8c949cb0ebdf2eada9,2024-11-21T07:37:40.673000 CVE-2023-0713,0,0,ee4fb9bc1801a5c621f2437bee3adb75a2f0f68c0a904f5dd9611d665c475665,2024-11-21T07:37:40.793000 -CVE-2023-0714,0,0,30ae8c6ae34f29ec22e3054595437550323be827fd4c72a973466692617e889d,2025-02-28T22:41:29.023000 +CVE-2023-0714,0,1,57d0bb662f7268ceaa292cc1e69b801ea5475e8964b2ae7db32f156a74e510b3,2025-02-28T22:41:29.023000 CVE-2023-0715,0,0,588bd08c0664db84705b05b0d4427e9de13d616d914c63d05d7bc2760789f82e,2024-11-21T07:37:41.037000 CVE-2023-0716,0,0,b5ef7e2142ca054fb3d17f09ab8f09f4999f9c8876cb3453c02ec500b2e983b2,2024-11-21T07:37:41.153000 CVE-2023-0717,0,0,9a3ce991cb88faad1393c7537376867867d5a010fdf7847cfe25910fac893fc6,2024-11-21T07:37:41.270000 @@ -214778,13 +214778,13 @@ CVE-2023-0784,0,0,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443 CVE-2023-0785,0,0,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000 CVE-2023-0786,0,0,9f4d2c852d70de6724f12a5989e00d1cabeb5b77f3984843da8a00c626444350,2024-11-21T07:37:49.993000 CVE-2023-0787,0,0,a3af2d4a739da41e2884d7213d2426d7f2c8d7b0d7fc8836c1642926bdcd28e8,2024-11-21T07:37:50.117000 -CVE-2023-0788,0,0,d49b254bba1cd390c928d415fc876cb5d95495680a57260c89a09e2978c03f7b,2025-03-21T19:15:40.667000 -CVE-2023-0789,0,0,d31b84689ee8babf1a2db4d0e088bbc99bc0d21dbc8dbc297ae158dc9bc8aafb,2025-03-21T19:15:40.783000 +CVE-2023-0788,0,1,5d14587b04219adccf1a57e71841a2271c39a9466cbda4eda5135370536148a0,2025-03-21T19:15:40.667000 +CVE-2023-0789,0,1,35bfd8c92ec8458487f267226429976541b59ebc71d18823cac67ebad395ea50,2025-03-21T19:15:40.783000 CVE-2023-0790,0,0,93c780875e4c53b352180307ffe00d07502c425aa74c11caf2e41f579944e8b7,2024-11-21T07:37:50.470000 -CVE-2023-0791,0,0,d3fa504ea79c3b3cb036b9f75d21fa7bcc0a4c072e8c1fc2bd20ca164b6e4f6d,2025-03-21T19:15:40.947000 +CVE-2023-0791,0,1,6b92e9454a8ce2f3c6e8017657d84f677318062b521012987fbb58df0fd3e70a,2025-03-21T19:15:40.947000 CVE-2023-0792,0,0,46db86de608c333ad3cbf3fade5a43e28f92fd2f92f2ab67e2fb41e4e17ddd85,2024-11-21T07:37:50.710000 CVE-2023-0793,0,0,c35deb6975cec46adcf23e97a61d02437fd9fa0341cd2aef154eeb1ef575a0f6,2024-11-21T07:37:50.823000 -CVE-2023-0794,0,0,87cda6ff02759b8d90d30edce8f0e708eff5d8ac0814c7205a8cf54fd2c3b697,2025-03-21T19:15:41.173000 +CVE-2023-0794,0,1,0b15f337a5e84759813cd813927598161b3c07be384a1fcd4c7bd27332d5aa5c,2025-03-21T19:15:41.173000 CVE-2023-0795,0,0,07ba104a216f54d85c7063750962cfd0d3f307b7af0797ba71485e5319af6b92,2025-03-21T19:15:41.283000 CVE-2023-0796,0,0,e832c6df85e4ca357f72600ab5bc1c63771eb2faa98da1affd983bde27c3d98f,2025-03-21T19:15:41.423000 CVE-2023-0797,0,0,42ac508864791ca53713ad8f66599713c069dfd8767b002092161700364c1b33,2025-03-21T19:15:41.577000 @@ -214866,7 +214866,7 @@ CVE-2023-0877,0,0,f7c5614fc818a77141babc941498bef6d62ec80b7a35eecd6cb52b4a6ea6a2 CVE-2023-0878,0,0,73513b4cb79465a825fc6fe4097e2d92697ed53944759ed1b3ed8e720981e051,2024-11-21T07:38:01.403000 CVE-2023-0879,0,0,c9bd45ba28893eb756363d2bd10f5dc9c0dcccb0bccc348a8a17ac34201ad6b6,2024-11-21T07:38:01.520000 CVE-2023-0880,0,0,b70505a20c36b1724631108c617ecb0187165091566214579e6d68e63f2f6fc0,2024-11-21T07:38:01.653000 -CVE-2023-0881,0,0,cb1b68f0e0086b66c3e31b7713c9b7a90b3989e11951f1001c853c9787bb781b,2025-04-01T20:26:30.593000 +CVE-2023-0881,0,1,fcb54335389f7ea7158379540d90817f1ed50f439af98625e7eec4527af2d5cd,2025-04-01T20:26:30.593000 CVE-2023-0882,0,0,be783d81d43022a661616ff88862949c4c4621b4987ce67aee41b6bcccab6ef9,2024-11-21T07:38:01.773000 CVE-2023-0883,0,0,4376ce51f945727b1c84e92d613ae08b49509fa376d3fe611123367a4e8bb807,2024-11-21T07:38:01.897000 CVE-2023-0884,0,0,8a838a456506801d1bf6b5da5bfb07117c80ec5e44975a1c6bf776f379c23430,2023-11-07T04:01:46.887000 @@ -214905,7 +214905,7 @@ CVE-2023-0916,0,0,596b7dc36222b209b87b2899b78f27cf28a8f8d758e1f657c2c931f77289ba CVE-2023-0917,0,0,a7231a8da1c4d44e142bf303dc21b6784566ff4ddd3681cce4dc781b6b845f21,2024-11-21T07:38:05.767000 CVE-2023-0918,0,0,3991662f18a9da25feb427987e4c4ade19c212ca9558262d1cc8872eda6f4723,2024-11-21T07:38:05.887000 CVE-2023-0919,0,0,5305cf677997835fc8e97f12f98585f9abdf4bd59ff72c678671606015005d50,2024-11-21T07:38:06.010000 -CVE-2023-0921,0,0,13e7f89125226c2be46f4ff9448cd445661866b8ff54e902081ec06d99e14908,2024-11-21T07:38:06.130000 +CVE-2023-0921,0,1,9a1e4a3f663e00806efb8e2e5cefe6d79e69969d858bc01b2c36a8c3bb527b94,2024-11-21T07:38:06.130000 CVE-2023-0922,0,0,cf60c569e8a1822a3b2b032815b27b121e14e27c2704870c00f09b54b60b9b81,2025-02-13T15:15:12.780000 CVE-2023-0923,0,0,7daaca2b1392cdb563ac6de27eca1f70a13e9211557487fd5d694051f34523c2,2024-11-21T07:38:06.380000 CVE-2023-0924,0,0,4e9e83a5f6fd36de10c8e0b39b632f1d97b68f294f9f811e519c5444ff1aac5b,2025-01-30T15:15:11.770000 @@ -215014,7 +215014,7 @@ CVE-2023-1031,0,0,f0c2d71c0798f9b4b9a720491da6b3ef1aa0247d4e03803b9eaba0ade3b81f CVE-2023-1032,0,0,77fcc52d1426eccd495d41e0ab921272a8345b6ca79a132e8c6439d82e73a274,2024-11-21T07:38:19.347000 CVE-2023-1033,0,0,b28d9102d05ee07421b322e9221cd65a492867a73157c7bafc4ac4bd211a216f,2024-11-21T07:38:19.497000 CVE-2023-1034,0,0,6cef5d71b24864ef8fea0fdb0b519564247133adfeaf8c0426c14cf78c223ab2,2024-11-21T07:38:19.620000 -CVE-2023-1035,0,0,a1bcff5dd1376ff036b73ac79c269f0b2e22dec6e8f5a5696257f4d0025717d2,2024-11-21T07:38:19.757000 +CVE-2023-1035,0,1,91ef7939446a9bbb29db35c721c7b43b6db0c91d24495f0df58d62fe3fcc73b4,2024-11-21T07:38:19.757000 CVE-2023-1036,0,0,3cb6547b2988ac23971cf3a32fc73ce5eec79b22f0af1f9ff45190c4b68d8f50,2024-11-21T07:38:19.907000 CVE-2023-1037,0,0,118a2e9c7bd40b84ed744da47d12028a656b490b0b5a3b2b441e0fbbaaf2bd06,2024-11-21T07:38:20.043000 CVE-2023-1038,0,0,a04b32ed84a9757d56fc4e89edb9b20c76dc991b32ea535064e758ba079ccec1,2024-11-21T07:38:20.173000 @@ -215365,7 +215365,7 @@ CVE-2023-1397,0,0,a32622303f05dfa8861d339a07430d40da1928c25f1a758930bc5b4938a02d CVE-2023-1398,0,0,4801f1c79e23eb5e524049fb56356b28ef75cafdd4656ecc95ac4834beecb15a,2024-11-21T07:39:06.657000 CVE-2023-1399,0,0,2a6baf6eb2d2cdcdc3c54b5a48379f795bf5c2b50c75dabeeb29a3b6d6be3645,2024-11-21T07:39:06.790000 CVE-2023-1400,0,0,c008e5363ab73e81a55c5ef067fcbe56846a8ab931b3e12ed983e984460b78d8,2024-11-21T07:39:06.907000 -CVE-2023-1401,0,0,b7b84f0c45956f1261b0dfd93b78ea443a58afd34b9661c386f7b7a6e124b00e,2024-11-21T07:39:07.017000 +CVE-2023-1401,0,1,446a4ed022a1c5c6a532ccefba91ee1d1dc150f68119d11ed95f6e2ef74b13c7,2024-11-21T07:39:07.017000 CVE-2023-1402,0,0,d94f3781ef1c97da331985c79553601bfed02974ebc48b3a2025272b504712ae,2024-11-21T07:39:07.150000 CVE-2023-1403,0,0,41359bb3315c9ed5028419254e1fc1af82a197e340dc56753c98da3da9060125,2024-11-21T07:39:07.290000 CVE-2023-1404,0,0,7de066fe901bec60cc95094448c93e74f3ffe86294e31187ecdd090526c8b5a6,2024-11-21T07:39:07.410000 @@ -215779,7 +215779,7 @@ CVE-2023-1837,0,0,843502960ca6e491ad9accfb6c6ed5c829dbb5bc4eee48104dd1d8febf6d10 CVE-2023-1838,0,0,0a8fbbe5d0029b1b3df61a7a56fe1c380ddaf7b537ba283161ca9d35b1cfa6a5,2024-11-21T07:39:59.817000 CVE-2023-1839,0,0,1563748e63ae4a7b7aa6ee515f7ba6b5d2c596fec26a68793f05c8219a249dbd,2025-01-24T22:15:32.847000 CVE-2023-1840,0,0,2b4571b017989f11905a194979f2a3b3e38633e6833968f41eee44adb840c533,2024-11-21T07:40:00.037000 -CVE-2023-1841,0,0,6f0fca320cb55929b6b46d4a149fad33b310bf654397e6acc655dfff39b4d8d2,2025-03-04T12:37:07.763000 +CVE-2023-1841,0,1,8b27b4fded85eadb7f4dc9c93d9e683d7d5e9b60479d63b4d087d249bd918899,2025-03-04T12:37:07.763000 CVE-2023-1842,0,0,7823b637afff00dcae852589d7e7ca278d53d8ae6240f85cdff16a8b8257733b,2023-11-07T04:05:04.657000 CVE-2023-1843,0,0,46bcdf97a8b4053aec5e646e46be38edf9851a07cef98d532105047515fb2270,2024-11-21T07:40:00.270000 CVE-2023-1844,0,0,70a62885e593f987b4cb298f5e65054e6e1d764eb1cf483c544ff8caf6d73a89,2024-11-21T07:40:00.393000 @@ -218010,7 +218010,7 @@ CVE-2023-22327,0,0,67f8a812725595239e2c4bcba8d48b32601ecd79a17d25a0349b80dcdce74 CVE-2023-22329,0,0,f87a257a3f491ed4d593d771327413fcc27bcb682b9124de27e798796cef2b07,2024-11-21T07:44:32.427000 CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000 CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000 -CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000 +CVE-2023-22331,0,1,037a445808f04446f7801b42fd459b4227ff538d0f13884a3a5cf76ce1c7643c,2025-04-03T18:15:42.980000 CVE-2023-22332,0,0,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000 CVE-2023-22333,0,0,e9b53e4821c1f5a5970f79e76ba8497a486f49a590930e00df3c607a1dfcba45,2025-03-28T16:15:26.470000 CVE-2023-22334,0,0,d90a341723c530fb9fa2b98d88c6032dc830412f76f79dedf9dc1ce4e324d81e,2025-04-03T16:15:31.660000 @@ -218335,7 +218335,7 @@ CVE-2023-22693,0,0,a76fed1b1882c1d04cb9338c8a84d304f65471ae8642d6d6344ef043e9cb6 CVE-2023-22694,0,0,96a7ca108cffbffffdc37b8a199e1e8d5f3cc17af9606c7fd391268918cdb6f2,2024-11-21T07:45:14.240000 CVE-2023-22695,0,0,2276bd1130c23d7e8cf596b8c7b6f09a53a4540ad638a7860c276c834e489501,2024-11-21T07:45:14.380000 CVE-2023-22696,0,0,ff4a78b05a2acaed955be175fefbf6e6548f1dc1f873b7fd4c89feaa94be012f,2024-11-21T07:45:14.507000 -CVE-2023-22697,0,0,21f8f2bc125ee9077cf7417f9bb8bcf7693310f431d57a5b20962a14de25e062,2024-12-13T15:15:10.637000 +CVE-2023-22697,0,1,80c99b0de3c1c2f2d82b84ede7ace1b3ab11d8b38cf50a68c0cdcfa2baa67cb9,2024-12-13T15:15:10.637000 CVE-2023-22698,0,0,e07bf487aac038f4440812e0c3fec1e32d7f0669b3691f296eb1f0139b2d9690,2024-11-21T07:45:14.643000 CVE-2023-22699,0,0,8d77cf8bdaaceda9949642af3b0c17cac202715660a348b5e3152cf21fe73893,2024-11-21T07:45:14.807000 CVE-2023-2270,0,0,88f5a20f6513829667681e37dd6b5395d3b65b46760485c6eb300e16ece54cb6,2024-11-21T07:58:16.910000 @@ -218952,7 +218952,7 @@ CVE-2023-23570,0,0,ae53d991ad0c75a8d614e639cfcf469a900c6650f6f42c86386439cb758fa CVE-2023-23571,0,0,8a49a84a526a246de40c6dc2d0c0c8d4f6fa8e117174b590fd0a9945ca3b6365,2024-11-21T07:46:27.017000 CVE-2023-23572,0,0,62cdba53fe6ab1c76ff42b801facaae235c9d9cc165d3a7ba35148f0a057c3fd,2025-02-11T16:15:31.730000 CVE-2023-23573,0,0,ba23d7cdf939fd80f7cd09d194e588844fcb4a2e3d1bb4517d52aca7a9ab82fc,2024-11-21T07:46:27.313000 -CVE-2023-23574,0,0,0516b94d54489499f78225ab67410933c805190def701f4d0ff62f5544c675e1,2024-11-21T07:46:27.420000 +CVE-2023-23574,0,1,6b8e1b9069b77ce53df3b97da459e099af7d6eb31ee0177031f7ab026f682263,2024-11-21T07:46:27.420000 CVE-2023-23575,0,0,09c74e176ccd36339557feac31d13abf673cd695d12689c5f877ea5e1bc7d72e,2025-02-11T16:15:31.950000 CVE-2023-23576,0,0,b405b358621de0304b34c52606701f079a0d031c87fbc51e9c9871767414aeb6,2024-11-21T07:46:27.683000 CVE-2023-23577,0,0,35e6d00d873e75d44ccd785241ea1e21f439594a9f2f964d4076d28e241d691a,2024-11-21T07:46:27.793000 @@ -219509,8 +219509,8 @@ CVE-2023-2416,0,0,acdf5b4886c4297fef66ae568a61d37a4ec99430d66c160077e079aaabd2a5 CVE-2023-24160,0,0,65cc2c933fa4f55a423a0b03c6f5849c561d8a239b685c27ac6c141c47ef1803,2025-03-20T21:15:18.357000 CVE-2023-24161,0,0,19907029bb78340b5658af7b04f0eca42537863c710b03f7f44f2a555d9f52e0,2025-03-20T21:15:18.530000 CVE-2023-24162,0,0,11863c535687637ee2dbdfe25ccb72b7486dd57b5d0f5f801e123d162a733798,2025-03-27T15:15:45.360000 -CVE-2023-24163,0,0,aa035c2303cd5a5d8779f197141ebaf2e9885d08baab1b71bf60b04ad121d4e7,2025-03-27T15:15:45.583000 -CVE-2023-24164,0,0,d303fa723310510602755ba32fb5fcb6b5e4a676c3697669b7c5f431f6035478,2025-03-28T17:15:25.417000 +CVE-2023-24163,0,1,611865d9a1baba04fb9571b52d121f003a24b8df91fc5d1a1948a42229660ebe,2025-03-27T15:15:45.583000 +CVE-2023-24164,0,1,e78f274e2865a090986631b5159253dd3d8b1568a5042d005544d12d5ac43220,2025-03-28T17:15:25.417000 CVE-2023-24165,0,0,03dff76c17555bb6c29c258dfa978088b2e5b049757339cbdb615672934a3b12,2025-03-28T17:15:25.660000 CVE-2023-24166,0,0,4f0a6ad2300ea02c8ba8111dafb492ed61c8ad80d5892d676b301694ab43f6b8,2025-03-28T17:15:25.883000 CVE-2023-24167,0,0,f32c0e36ea79ac410f4a4389e2141522b03f8df085a410e79f244d409ed30fc1,2025-03-28T17:15:26.117000 @@ -219715,7 +219715,7 @@ CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66 CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000 CVE-2023-24466,0,0,3ade13b517011e6ea3e3a970951167f326ec38d2fa2c6691fd38dec34c6d8f88,2025-04-10T20:36:16.743000 CVE-2023-24467,0,0,7982f600546bab39bd42019659f7a0fd56a7ab00c601fc289a27d7624ce8e2cc,2025-04-10T20:47:00.127000 -CVE-2023-24468,0,0,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000 +CVE-2023-24468,0,1,7ab1463157c514f895e1febccbd60fc61765f3f4221a6799e1fb55a86e003894,2025-02-27T15:15:36.287000 CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000 CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000 CVE-2023-24470,0,0,b9aed5a006801525507460b60c51f828a0cf2886ae2a907eb98e672ae9993898,2025-01-06T16:15:24.590000 @@ -220696,7 +220696,7 @@ CVE-2023-25666,0,0,86550a5bc2365842828e104139abea119cd36daf6b51660c6b9fed2be5124 CVE-2023-25667,0,0,7063ad2f427f3803430fb93cc6f69fb561dee21f54452abb690226dfd709dffb,2024-11-21T07:49:54.343000 CVE-2023-25668,0,0,eebc03a11305e809d7d2625c8d2bab19163084a693184a59b3839a32cfe9f97b,2024-11-21T07:49:54.470000 CVE-2023-25669,0,0,a1a153f751d4238e02d08ce633305b41bf47c0c848660b59b043656edbaebc12,2024-11-21T07:49:54.587000 -CVE-2023-2567,0,0,ec13c4c11dba459617a03c5ebb1060757a623da84d3068ddc2b9dcbb53b9ea1d,2024-11-21T07:58:50.747000 +CVE-2023-2567,0,1,d3c076f9076ab5a5e937f9e2d7629ec46b9ed784e85b3eeba6570e01951d1f35,2024-11-21T07:58:50.747000 CVE-2023-25670,0,0,cdf046f5b1bb9ff63ee3c7c960c05ebe4e2dd47ba3aafc9b34d8e460c1677321,2024-11-21T07:49:54.710000 CVE-2023-25671,0,0,4a04df5f48ac79a78a9eb3f1c52c5f83702728fa06807c773213fe5ef76a08c6,2024-11-21T07:49:54.827000 CVE-2023-25672,0,0,1f534fa7236af88be74b59bee042f672ef6350eeed69d11b3d886b80ed86d63e,2024-11-21T07:49:54.950000 @@ -220865,9 +220865,9 @@ CVE-2023-25829,0,0,4981d1ad6b856c06a6aae6bbb2108e3482b8f6f61a490e90e6a405dbd8c0e CVE-2023-2583,0,0,4bb61557a755cbf08148e6129e125efe080dbc974ae4881153e16d95d2ca1465,2024-11-21T07:58:52.463000 CVE-2023-25830,0,0,24a3e7e318b8cab18eb5a4234a96e9b9a31d21a002944d6caf6430122c15e167,2025-04-10T19:15:55.417000 CVE-2023-25831,0,0,5f7716f92aafc4e1e78da51a555d6cc915641d97529fda282c593508c7c65c9a,2025-04-10T19:15:55.533000 -CVE-2023-25832,0,0,e2b55481314b53a49fe1b20f16df2841f756dedbfcbde6b4dd44a7e3a5a9e6ae,2024-11-21T07:50:17.377000 -CVE-2023-25833,0,0,8fce20a3eb64f756a11f56e0eb645d0e2c6987d0dcfe8c4dce7451fb1e505420,2024-11-21T07:50:17.503000 -CVE-2023-25834,0,0,75938ad5306137e87207a6e9524aa097804ce9d93d5580f845c0fbed7e1df8e3,2024-11-21T07:50:17.620000 +CVE-2023-25832,0,1,844bc8ff20d4697b87316de9087d041acea8c69ce61a6715f266c6c79df1c4c0,2024-11-21T07:50:17.377000 +CVE-2023-25833,0,1,698b73abc06f258fe85acf970a703572c0331dbd0aa8f722b3ed2c093549618c,2024-11-21T07:50:17.503000 +CVE-2023-25834,0,1,07010995b1eeb4f64882fef05e7298e89b1e72cf323f5ca69e02791de1d75029,2024-11-21T07:50:17.620000 CVE-2023-25835,0,0,55664e0f9288af43664c6515c6b833eed52b0de008606b6ea4b2911385b418b4,2025-04-10T19:15:56.030000 CVE-2023-25836,0,0,1e0dc59cef482daea9e4c945ccd3dadf4a14e458c08f0cf31d20d37b0cba3503,2025-04-10T19:15:56.163000 CVE-2023-25837,0,0,bc9c0d546550b7452992782b425db1ff65d7b642a491783417d374bcbb39dafb,2025-04-10T19:15:56.290000 @@ -221036,7 +221036,7 @@ CVE-2023-26022,0,0,576e5f0f6952be7fea33a3af0b9bc788b240594ef65e6c1e4450d84714d69 CVE-2023-26023,0,0,26abc84935f754af7fb40d44c192770117e7bf2a1f21a8ad2442bab6dc7baea8,2024-11-21T07:50:36.917000 CVE-2023-26024,0,0,22f245e5d7f8d356d65270e373c0a205020f6fafb9786ca0336499517f95773b,2024-11-21T07:50:37.043000 CVE-2023-26026,0,0,7874e2007c5ad3d34fd3be8c2162885d24f86a4aa0e076319901bc82a2ded992,2024-11-21T07:50:37.177000 -CVE-2023-2603,0,0,c32844ca2ffcce1ab4cb26667debea03be4a58ca5f57272fb9e51d8152ef2223,2024-11-21T07:58:54.840000 +CVE-2023-2603,0,1,3d9fe66086f6a43f826187c40b7eb4c14ec0e91483a8fd52676e282968b81d9b,2024-11-21T07:58:54.840000 CVE-2023-26031,0,0,c454fb42fc399a5593def9bab2d255f7ebce4b7cea7061e4cad331d30dd9a2ae,2025-02-13T17:16:10.793000 CVE-2023-26032,0,0,dee827e3860b7d7e40dc77715e74c0090df78cf01fafde142c034d9d77a72b29,2024-11-21T07:50:37.510000 CVE-2023-26033,0,0,1f1adf2b99d41f1f245f081e47cae7773aae07ff22142df7bfc85fc87181f4bf,2024-11-21T07:50:37.637000 @@ -221090,7 +221090,7 @@ CVE-2023-26077,0,0,82651bffd17201218473c387a66287ae68908d2c8c6a570401ca6c223517e CVE-2023-26078,0,0,c3d7804ef5c232ff215416da75bb0ae90c43cc41842850d8baa070dc2dad30ac,2024-11-21T07:50:44.370000 CVE-2023-2608,0,0,15173476a57029e92a741b7bdf1508ad449142c8f8a5f0a3a32a4f190bbdec6c,2024-11-21T07:58:55.437000 CVE-2023-26081,0,0,bdce83397c7781427c71141a601292fe5ae19c993e887eeff096cae844f6684b,2025-03-18T15:15:45.960000 -CVE-2023-26083,0,0,aba9bf7c972afd8bb33bc72f375d2c594a1b390963634bc91e7a68ced4d516ea,2025-04-03T20:07:55.157000 +CVE-2023-26083,0,1,e4cd7139afb408b4dd116452688e184a016e4939465e4f951906ec0bedc2762a,2025-04-07T13:08:56.533000 CVE-2023-26084,0,0,f29ea9908ca76c74e4cf4f4c61c40c0e77064bff3f01fe5bc0cea1825cb8b652,2025-02-27T22:15:35.920000 CVE-2023-26085,0,0,070f82b5ed8cbadfda668dffef030aa493bdfcd59150161180436bf894b27e5a,2024-11-21T07:50:44.987000 CVE-2023-26088,0,0,688f57648edf87c96a58648e4ca44b9be9eaeb9635c1b9e3d9422fabd96cddd6,2024-11-21T07:50:45.127000 @@ -223206,7 +223206,7 @@ CVE-2023-28652,0,0,fe4235591b4c07f5e3485ad090b6ce9d4d95c115269d5c6ab90efc13f7f37 CVE-2023-28653,0,0,85425f9a644d94dcc88660335cf1fba4048b509d7b414b67f0faa690535532b2,2024-11-21T07:55:44.780000 CVE-2023-28654,0,0,131327885e5fa2643b72e4d86d04cdaa97dcfd352bd1c6dbe7aa3f5c6b65815c,2024-11-21T07:55:44.897000 CVE-2023-28655,0,0,6686d9a13539db5cf9c93492ef593c530700e40eb842775590ba3529e11a8526,2025-01-17T18:15:21.850000 -CVE-2023-28656,0,0,b0c726c71fe4956ca054f12b7053c690bc096002d5aa31071abe262f4e7f8056,2025-02-13T17:16:16.260000 +CVE-2023-28656,0,1,59c0a71a10465d4459305f88697c15a4390f7ca4be8b20b1ea9197616f7dd7f4,2025-02-13T17:16:16.260000 CVE-2023-28657,0,0,b598ea5dd934ee0fcc5ee876e12d99ee8cec046c6f6f43a4f6bea3784038d2c5,2025-01-09T20:15:32.300000 CVE-2023-28658,0,0,4721cc7813fa8c14291ea10a6bd934084fd896731e35e1047a44b653e020baa0,2024-11-21T07:55:45.320000 CVE-2023-28659,0,0,cbc741096a53ccb6cd5a2730ec48b97887b59c7c88f3317f88406de5687b2a19,2025-02-25T21:15:13.160000 @@ -223908,7 +223908,7 @@ CVE-2023-29425,0,0,814fe5e1aa624832ffc2ed99b98099c48ea7ef9954664d06b64b967413254 CVE-2023-29426,0,0,a9a0775e7a095f9af064d5f1ec1a7ec57d669fd9da8844fbc864cee60822b174,2024-11-21T07:57:02.400000 CVE-2023-29427,0,0,c3f185731551e1dc3b4381190c485869e1ff1bfac202fdc8aba63082116b271b,2024-11-21T07:57:02.510000 CVE-2023-29428,0,0,49cdf9ef740fc26cab7ecf6e9d04d03a319c9a844f70892c6ef6466b1cf3747f,2025-02-19T22:15:17.290000 -CVE-2023-29429,0,0,a18be79a2bb241485cf3750a94c94c9a68c7390136e699f5835dc35596f5d134,2025-03-19T17:24:57.587000 +CVE-2023-29429,0,1,21769c65193d748c895fe038973e3f37d0b85e5c48229e8b323d1a01c19b2cfd,2025-03-19T17:24:57.587000 CVE-2023-2943,0,0,482e2fca5bd06d4dbe1d1bfd18b1410422640f087316da4277d7e230c59463fa,2024-11-21T07:59:37.070000 CVE-2023-29430,0,0,3356f464c8766b2d49e0bc8f94c756cb77d8d1859e0ba398e889ba81f6670998,2024-11-21T07:57:02.740000 CVE-2023-29431,0,0,8a62b1704088a172061a7e2a7f64d6836eb4c818909be35339704b485675d24e,2024-12-09T13:15:27.283000 @@ -225689,7 +225689,7 @@ CVE-2023-32045,0,0,6806b381fb83d1d65b0304d5f2c111fb9450cb947867afbbdef666424f8c5 CVE-2023-32046,0,0,ad9c814cd77fb40a827998342e25977be47e487b98c7ca5bc0bf7c87b36aa482,2025-03-10T20:45:52.913000 CVE-2023-32047,0,0,dd872c626a54ae37928bc11d8a2d53e4e59d57c0e0636c20d31bdc391f716f53,2024-11-21T08:02:36.427000 CVE-2023-32049,0,0,c0b222c9974b6e1b631fa8a835aea0bd3842558529de4974dbd89c9a75ef3673,2025-03-10T20:46:21.273000 -CVE-2023-3205,0,0,f50a33d8c9cf94803a8f87e9e3439b490e3fb5def430be3c992f06dbc5b7bcef,2024-11-21T08:16:41.637000 +CVE-2023-3205,0,1,50c3646828134388f0e89125545b3a97a9759f53a21ad52dad825f46f2ba40bb,2024-11-21T08:16:41.637000 CVE-2023-32050,0,0,6e6eab390f48e9a9854dfb0c7f4d8bd90f21437b5a0cf5482c1b3d94019e4630,2024-11-21T08:02:36.673000 CVE-2023-32051,0,0,e28d488bef227a840144c7d3649e0e8b2a0cb4501b7002045c5ae6fe6cddd6e9,2024-11-21T08:02:36.810000 CVE-2023-32052,0,0,36fd2ce403493c09343cfecfbe07111dbce91049790b71367a67d81c5134fb43,2024-11-21T08:02:36.947000 @@ -225744,7 +225744,7 @@ CVE-2023-32096,0,0,bbeaf73d8539d9cf214ea340b6f097657de9e0cde8e9999b421657beb8d92 CVE-2023-32097,0,0,bfd934f464ec434450cd17572e0a166018a22064038de6343d70af053c6b81b9,2024-11-21T08:02:42.247000 CVE-2023-32098,0,0,f3bbb0c0f9c30551da2974b258c574eba3e97da0a7be2b8ad0b5cd0f0d1f0778,2024-11-21T08:02:42.360000 CVE-2023-32099,0,0,2316d8c1c11a7785542ff81306c35caeeb605be502312c6f59a1788b52fb6139,2024-11-21T08:02:42.477000 -CVE-2023-3210,0,0,a44a27980f1119993b4ba2a4ad3171a88d048418b269c9d84cdd59ede2b8d1e8,2024-11-21T08:16:42.243000 +CVE-2023-3210,0,1,63fa519620e47876f7b9b56d01dbd0381bec88c013505c524c317cc99e3766f8,2024-11-21T08:16:42.243000 CVE-2023-32100,0,0,54deb1963ec78b4310f99c3986f51c01cd673183a7e4d1c4091f179ddc11ab6b,2024-11-21T08:02:42.587000 CVE-2023-32101,0,0,1f23bb498c2e5d5864951fd3bf1409ba6cc545c6d017962f6b7704df4e3c9636,2024-11-21T08:02:42.700000 CVE-2023-32102,0,0,e9f669e32a168979a1e1f6ff39c44f1bb94c2c56bdec0b3a2bcbd0be97616d87,2024-11-21T08:02:42.820000 @@ -225756,7 +225756,7 @@ CVE-2023-32107,0,0,b5793e75f71371b8b6819f39eb03f5486732b0ba2bf9ce407a16cdea099c4 CVE-2023-32108,0,0,a934ffc0869767d2ad20cbf489ed2b68feb2f8c481d9bfda763b1daaca8eb204,2024-11-21T08:02:43.510000 CVE-2023-32109,0,0,3a4edfa6c3aa31ce79dc3464d8877bcae3fd1ddf0b4075d905032ec1aeed0b39,2024-11-21T08:02:43.630000 CVE-2023-3211,0,0,5c79f5a4ab5a20ff2e0ea2542823beb167db99bcb267301c9da9f52382558d68,2024-11-21T08:16:42.377000 -CVE-2023-32110,0,0,c56f591d1b9ebf82f565782ef9fcf1991f96a352778cbc1f827433756a699450,2025-03-19T13:37:32.060000 +CVE-2023-32110,0,1,ddc963d08bd424230713b98d49f7efb2591925cfd0f20314a06538d7f5c88ab0,2025-03-19T13:37:32.060000 CVE-2023-32111,0,0,1a327c689519230b35e18a611794e24d3e69479285b03916de59f343d5f0344e,2024-11-21T08:02:43.860000 CVE-2023-32112,0,0,2d658551346032135fc4df8eadb527925bcf203d0c4b6a1317eaa815c5079e00,2024-11-21T08:02:43.980000 CVE-2023-32113,0,0,eeb889f962c9abb8e1fc15bbf3a79439dddc270b385947deb2b48db8cf398f03,2024-11-21T08:02:44.100000 @@ -226111,7 +226111,7 @@ CVE-2023-32454,0,0,48d17944d6a0bb31ad2d767a9668953ff7f1a161f1eafe11c7e2a76038194 CVE-2023-32455,0,0,79b2af405e0269e2cbd01297eac5d569c49f95e0b5377d24e8dd1a02fcb45a3c,2024-11-21T08:03:23.333000 CVE-2023-32457,0,0,4f5291e05bbe67496c719ebc152de71ca0240eefc1a95c1d9f961b6070cba8b5,2024-11-21T08:03:23.460000 CVE-2023-32458,0,0,7eb230731ddb6d353e1bdcbfbc62cf59aed6c4567b70ee6a4c4264fc5d1d34de,2024-11-21T08:03:23.590000 -CVE-2023-3246,0,0,b5718c1baf02150759b60d8b09970200f91fbf00bf39cd024be1f42b5151972b,2024-11-21T08:16:47.490000 +CVE-2023-3246,0,1,bbc016930f562dd101d0ad06f0bf85d940a345708c9287f2dd3ac8f13119babb,2024-11-21T08:16:47.490000 CVE-2023-32460,0,0,5c573bb13d44bf9d15e062a2aff259f1475cdcde7b8a4dc29018666a18995a8d,2024-11-21T08:03:23.720000 CVE-2023-32461,0,0,d558ecad6b2cbb9d4c764307d93716e775c42b7d7d6d5a412ca5b0549652d633,2024-11-21T08:03:23.967000 CVE-2023-32462,0,0,711adae30e773fae9cb02d9743d41a081fa112c58b2165a349190b69dd1037c7,2025-01-23T17:02:15.480000 @@ -226903,7 +226903,7 @@ CVE-2023-33299,0,0,27187b22bcf5b692e8c22c11eab27d8b578f609f08467595ce9608c2ca052 CVE-2023-3330,0,0,79701b2c45499bdd043c812cb833ad5abf5c67d1a07608a303232abd8861bd69,2024-11-21T08:17:01.777000 CVE-2023-33300,0,0,e8e3405c5b6361a1b0ae303b471db9510f640f26dfa1345b18633e0ee1169b04,2025-03-14T16:15:27.203000 CVE-2023-33301,0,0,07e39c7bf3a5bc42efb1d0e586c8f3f0fcc618e7ae8db0cea8c4f55191f28f4b,2024-11-21T08:05:22.220000 -CVE-2023-33302,0,0,84a4253d4d09c0bc8c9df6dfb251ced8201180d3eee85b7d305409230a8d9ba0,2025-04-01T20:26:30.593000 +CVE-2023-33302,0,1,f24213eaede26656e615494f86edb7cca7fdff09eb14a42c15b1fb26850354bd,2025-04-01T20:26:30.593000 CVE-2023-33303,0,0,5ed83ae2fd8f092fd97b465a3e790ef17cec97f8c1f34227abaa3684eb09991c,2024-11-21T08:05:22.373000 CVE-2023-33304,0,0,e286c62da84928042225cc8f2918434951acd6f76bb76b4459304cd2bac3ec39,2024-11-21T08:05:22.530000 CVE-2023-33305,0,0,dbd1d893ac16204711a7d41b6ca1081ab6d21b9c33c6dc9a0e829a5e152321f1,2024-11-21T08:05:22.690000 @@ -227220,7 +227220,7 @@ CVE-2023-3384,0,0,43976c80ef1dd4016470fbdde9d42c2f2727e9da019d45b7389b90b07d63de CVE-2023-33840,0,0,24c35b3cfd8bae5bbdb3a25483622775cad57e6faaeebf192f416134d4238003,2024-11-21T08:06:03.657000 CVE-2023-33842,0,0,c5bea2c8cce160a3ae2f9cc68a17addb9e24eaef27051d9b083238e0b6ac73dc,2024-11-21T08:06:03.770000 CVE-2023-33843,0,0,476c7b0a6bea17291397a04dea52b748f1966f5c2d1096ec4295c7fc521e6a5c,2024-12-10T17:46:41.013000 -CVE-2023-33844,0,0,0924f75b64a960419df9bd2ce92f69570e8a8ef4ea13e89e536fbef6c8586c7b,2025-04-09T20:02:41.860000 +CVE-2023-33844,0,1,aeda9a3128ec326f291131b780d0b5736cafaf4f1fba5a03111db29526fd0db3,2025-04-09T20:02:41.860000 CVE-2023-33846,0,0,13983ff951169eadd9af866f17f0a334c05acc6a18f7269072c83cefdb2f3458,2024-11-21T08:06:03.993000 CVE-2023-33847,0,0,2e778aaa92ccd2733ae61402badf91cdc6c6046575e81a418cdfa443a705c6c9,2024-11-21T08:06:04.123000 CVE-2023-33848,0,0,f912ce44bd94a807d8ef6d7c826fd073f50b4dfaeda8b927dde92e31f68c3ba9,2024-11-21T08:06:04.250000 @@ -227822,7 +227822,7 @@ CVE-2023-34436,0,0,a52f77ff4f42a3172ca9550768dafa87476b7004abe076fb25d6baa1c4951 CVE-2023-34437,0,0,ffb79324976fbf84ac4d9e947b2be353dc963e1d633e0950540b6e05b6d482b2,2024-11-21T08:07:14.437000 CVE-2023-34438,0,0,b1351877679d083cdea48520114a3ba271110b3005df5aeab817e94a4af9fed6,2024-11-21T08:07:14.577000 CVE-2023-34439,0,0,12d92365a2152a8a9155546ccf2a86cf9c93fef7291f80b49dd113e259a0090a,2024-11-21T08:07:14.773000 -CVE-2023-3444,0,0,45ea1c2874b1f19720cd5cdadd30774e072dfbb3393fd7d1cf9abcbdc45755bd,2024-11-21T08:17:16.947000 +CVE-2023-3444,0,1,220a87bbe3078548160a6777a82d48dc37b4c465b19e91b67a6f77a1a2e33e38,2024-11-21T08:17:16.947000 CVE-2023-34440,0,0,8c67c57ddf649cb8b6d2247eb3253f51f17696d0e1baa8fcc1c13145071747f4,2025-02-12T22:15:30 CVE-2023-34441,0,0,709e6ca0756a1b647c79a79106806eec5ec48800f14208889233880446473911,2024-11-21T08:07:14.900000 CVE-2023-34442,0,0,c2b230e98e8578d0642c5ca12d198416aa93a1d597dd2fbe9c88cb899c4d004e,2024-11-21T08:07:15.040000 @@ -228905,7 +228905,7 @@ CVE-2023-36234,0,0,371f1a9fe6d1b1dc16b9d1ea10ea114e7eb692627ec7f646d52589df5fbb3 CVE-2023-36235,0,0,56fa8a6f0b0f2b4f0219461a84aee903f6020ec4f89b7326ea4f56a42f7e81c5,2024-11-21T08:09:26.153000 CVE-2023-36236,0,0,ed892a5be5cd89045bf58519030585ee3526284778a1f01ad439665801e2d638,2024-11-21T08:09:26.313000 CVE-2023-36237,0,0,66f4fa284ac8cd77d5adf7806a99441b2c7c7fb7455a5b3f41d46f4424732243,2025-04-11T20:20:35.777000 -CVE-2023-36238,0,0,6855edc7b830b38c07ef599563cbb5b398131b27fb716584864c8ef11cb4cd5f,2024-12-04T21:15:19.377000 +CVE-2023-36238,0,1,7f85af2c5277f56e583418b2230fd67ebb625f676cf55e1d0b9dcf0a01babaaf,2024-12-04T21:15:19.377000 CVE-2023-36239,0,0,f9d13b68c05b1055dba1062750873e061858f8074fa25ddf4d3138bb3886ad07,2024-11-21T08:09:26.837000 CVE-2023-3624,0,0,2025944c7157b8cf2d838f068ccc1caf2355db6b7eabc04395d11fb3bbfef051,2024-11-21T08:17:41.887000 CVE-2023-36243,0,0,2cf7f1307f09ea5aae10578d1b5ffd1b192d31d2c4846725f9e1202b3aec6be5,2024-11-21T08:09:26.983000 @@ -229077,7 +229077,7 @@ CVE-2023-36475,0,0,b017325b10a8934c12619269d31556132fd7cc445088025f2b2bd7f105ac4 CVE-2023-36476,0,0,dc62fbe5a620792447d054b0d95666d694ab39e51515417f6f00ea60a304dfa1,2024-11-21T08:09:47.493000 CVE-2023-36477,0,0,f69996b3250f6b4ce1fe8110fba2cf92145135df9709d2e0bf90f692720b0795,2024-11-21T08:09:47.600000 CVE-2023-36478,0,0,4ef7148439db00b0224b3844ff4dc49a5d55be13afaa6c81d6b8fd13b34b02f5,2024-11-21T08:09:47.717000 -CVE-2023-36479,0,0,531bee60ad50454ff2d3245a4a68b0f95b5e7215f1aa133686b5f145599f3edf,2025-02-13T17:16:42.313000 +CVE-2023-36479,0,1,39d77eb8d14fd4f29c52e920e786beb671b78f68da0db92de0dab1a341b1f64e,2025-02-13T17:16:42.313000 CVE-2023-3648,0,0,762293a94b55de42e08c73b0dae3f68223b1c5dffe8d4ddd45a9a447ef2d883b,2024-11-21T08:17:44.993000 CVE-2023-36480,0,0,3089643f25b3fde15dd5ecc6bc835da34d8a3c8c4281970be43738a87edfed6e,2024-11-21T08:09:47.973000 CVE-2023-36481,0,0,a1f11bd899f7223a119d506f944675048c6b91416bd86d3280c1cabfe78d41ad,2024-11-21T08:09:48.100000 @@ -229104,7 +229104,7 @@ CVE-2023-36501,0,0,c5fd1d48310551e06c32858d3409f4b3bb81cd7bf054db0d3372ef926c25d CVE-2023-36502,0,0,e9d4311f7e63b9210af8c1a166cb719dc6be2e97fafa60cc1a82e40b1b54f98c,2024-11-21T08:09:50.440000 CVE-2023-36503,0,0,fcdad8415d080aa47a84afac77e8960e774a0ec452ae2f7f9d9cac880e3ce051,2024-11-21T08:09:50.547000 CVE-2023-36504,0,0,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000 -CVE-2023-36505,0,0,5363f501da8bfc66e09637cdf5abf2bec037ea092c52ae679457d719d6a84707,2024-11-21T08:09:50.763000 +CVE-2023-36505,0,1,05584c8c0532ceee734cc162e76027172f85ec49c186dde7911d0d34737ea40b,2024-11-21T08:09:50.763000 CVE-2023-36506,0,0,6af22016e284031d53b3ef3f11af4b1bf92676c075b4e08e2aebb1352de367b9,2024-12-13T15:15:16.450000 CVE-2023-36507,0,0,860d90b5f40d8a7bffdd9335fefbba3d2a2e252c703ad45f15814d2a2853d7b9,2024-11-21T08:09:50.870000 CVE-2023-36508,0,0,b5e9cd7ff00e539cb1c5d4430e09c6663d3754240c253a68df9338197c2fac39,2025-02-19T22:15:19.237000 @@ -229867,7 +229867,7 @@ CVE-2023-37398,0,0,b7e651981ab1edf8c9f385a4e29c1c6abfd6a8d0d22fd2b5792d7c20e6342 CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000 CVE-2023-37400,0,0,f94e685742ec817d5407020ac26c99ac625870b02acacd04771125504e52e4e1,2024-12-19T15:41:42.607000 CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000 -CVE-2023-37405,0,0,89e9e753e0430fdcc8a2c3d05a5ab0d1915f26194f14de291e0867f5d5fc003c,2025-03-28T18:11:40.180000 +CVE-2023-37405,0,1,fa999b9038391408b3245045a6432c53904be0c954fe0e15573d1ff34a77c635,2025-03-28T18:11:40.180000 CVE-2023-37407,0,0,db2628f894cad232b13add07a178883e80242b9bada975cabe2f3c25aca23731,2025-01-07T21:06:46.840000 CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000 CVE-2023-37410,0,0,4259c5a1111c28363272e35fbab32b984c617cae11efedba0dfffe4bceca6df3,2024-11-21T08:11:39.267000 @@ -230265,7 +230265,7 @@ CVE-2023-37927,0,0,91c985b74b4cf0c20cf9ee2e34abb6e9d5e5bc09f1967cdc6aacd97f6165b CVE-2023-37928,0,0,dec776d364ef37b6e291aec9a18f90850b125ef62937fdd2b294a62c2fd46954,2024-11-21T08:12:29.503000 CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9718,2025-01-22T22:55:02.317000 CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000 -CVE-2023-37930,0,0,c318404004aff1ddefa8802200ce3e83c5514c0cf60c345bb8d7ba056b06ac27,2025-04-08T18:13:53.347000 +CVE-2023-37930,0,1,ee0b7bf9f719da84d97a4d7bb2e8a9b1cad54fc65e15675fcc7b19e1e1a9c48f,2025-04-08T18:13:53.347000 CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000 CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000 CVE-2023-37933,0,0,2f1bd770acf60f6c7e800508cf362e293531d59e8eb1b0ce483ebb596350a679,2025-03-11T15:15:38.480000 @@ -230609,7 +230609,7 @@ CVE-2023-38267,0,0,c2fcd29445458ac35c1d832e8a2059ebc40ca0cc0a0c87290f8df923a88d8 CVE-2023-38268,0,0,d933dfd659e14f431ff87f8646f7047159596c73501d930045054065bb2e8936,2024-11-21T08:13:12.910000 CVE-2023-3827,0,0,8dea99078cb1b2564223dae8712f2b6213cef9595285e781fdf0c5b249bed06f,2024-11-21T08:18:09.530000 CVE-2023-38271,0,0,912785beaeb32158de428f547a42997760d6528edbc0ffe74264a1e6bef8fb75,2025-01-25T14:15:28.123000 -CVE-2023-38272,0,0,dd0ec7330dbe67378f16177e3b2f33507e35e6db5c5b4e51bc974bce80617225,2025-03-28T18:11:40.180000 +CVE-2023-38272,0,1,2df300e83ef851d5f4e7007153eaedf23b6f87b0ba84275fccb6524733d067e3,2025-03-28T18:11:40.180000 CVE-2023-38273,0,0,3feb51fea08f716ddcb1d667a9154095016823ee6be4b709f047cd14310e71de,2024-11-21T08:13:13.053000 CVE-2023-38275,0,0,f230aec202c4cd33174bdc1218621d5d7a6ece56066ab25aab85bfe453826f64,2024-11-21T08:13:13.200000 CVE-2023-38276,0,0,ba9fab32a121dc0ef42130086f4b44807496059dba59bbea2f2970476887b688,2024-11-21T08:13:13.343000 @@ -230694,7 +230694,7 @@ CVE-2023-38361,0,0,5646b0dc24d6ba6ae916f311ff7d533fa4bb30c1b1c8f75f4f9f318ff84a8 CVE-2023-38362,0,0,63db9a756cbcd9154b49462038447e02050e91ecd2f3b6d2a3334ae6361cd14a,2025-01-07T21:24:06.857000 CVE-2023-38363,0,0,a591869353ec495b6ced3419001a4bc71a1d976d71be89cc15611c55d2ef9dd8,2024-11-21T08:13:25.203000 CVE-2023-38364,0,0,8e811d572c6ae14997b41396824245065fc1674c69eae1daee3876448a447237,2024-11-21T08:13:25.330000 -CVE-2023-38366,0,0,ded113241274003fba8830c4f1a452e2aa5158f888575680c38856152f7bed86,2025-03-04T14:14:47.390000 +CVE-2023-38366,0,1,0bd738f1878dd4d7a6cd2bf54ba870fedccf59fea156db0bbcabdbdc5a437900,2025-03-04T14:14:47.390000 CVE-2023-38367,0,0,8e11ff19f7e4c23c4db96dca61a0a70af44373ad57957e337c182f86bbc78df6,2025-03-27T15:15:46.923000 CVE-2023-38368,0,0,4e92073cc3cde9610fff149c73e145f08c12ba5fb261336c4db43e74a278b21d,2024-11-21T08:13:25.713000 CVE-2023-38369,0,0,20343162d9fbe7902fadaef9efe17c5051b8d190ce29e8425fee989b8cd2e50a,2024-11-21T08:13:25.863000 @@ -230713,7 +230713,7 @@ CVE-2023-38384,0,0,432bc4918ca36135512b55018dda0e35c3b42e4dbc1a5c07f3fe37017ce25 CVE-2023-38385,0,0,5d3cab033bba45025423f86e1a0659404e7528890b35519c19d613144e5855b0,2025-03-19T13:57:05.610000 CVE-2023-38386,0,0,9d5cbb957a142ed3d8a7a6c75890ef70fe7d6682dd46b0d2382f709cf8db1603,2025-04-07T17:55:07.990000 CVE-2023-38387,0,0,623d775bcaa266a5dc196962abc1582b099379588fb4d57e840c1c6cf4fa5e54,2024-11-21T08:13:27.520000 -CVE-2023-38388,0,0,9cb26bf3fa9bc4d7936e19c52d6924d10bdd5aa64565af0e3fbf58a49b358a9d,2025-03-19T13:49:31.673000 +CVE-2023-38388,0,1,834f987ae0107aa7445cac391c68cd743efbb08354797bb3536865c219b104c8,2025-03-19T13:49:31.673000 CVE-2023-38389,0,0,53d2268dadb48f9591f9849be4d6f9352278d753ebf289d9c3421edfea35839e,2024-11-21T08:13:27.780000 CVE-2023-3839,0,0,99e4f38992390f0792bd1d9c3f9258e68ba21ad7fd20cf000ca333b339e9434a,2024-11-21T08:18:11.323000 CVE-2023-38390,0,0,04540ba10d5b9db941783df86eaf593c37aa0ff8ebfe2841b802123d5603c4f1,2024-11-21T08:13:27.913000 @@ -231282,21 +231282,21 @@ CVE-2023-39056,0,0,138caab92e2efc8062af775508d7e9da7767ab9fedaa06d29c4baf2de6cf5 CVE-2023-39057,0,0,bdd90acc3c6b87c57ed383bd011d3bd7142875f6ff374aebae23cdd02da8b971,2024-11-21T08:14:41.677000 CVE-2023-39058,0,0,84c75597b71198694e3f67084f467cf2e6e13ea15654adf04afb367967dd5625,2024-11-21T08:14:41.850000 CVE-2023-39059,0,0,1d169aaf249dd774ea2b5abd0d79919c2b2abffcb04baa6f898227630123c5fc,2024-11-21T08:14:42.013000 -CVE-2023-3906,0,0,a5cedadf6f9f997d7bec7318f3a07d3b1486e60c5f17a2034ef1f9ab3364cc0d,2024-11-21T08:18:19.783000 +CVE-2023-3906,0,1,43a17b46239fb87a69316eb3392cd2514b1fb93188aec0a3a8215329ab01c3f3,2024-11-21T08:18:19.783000 CVE-2023-39061,0,0,b29b1cf147410f57071a97436f35b90a8dc3ea0efe6d4b06f99e59d55e127710,2024-11-21T08:14:42.187000 CVE-2023-39062,0,0,a69799f7d0a4aa84a4d8d8143286f1254b3965b303c65d00a9dab17a4009045e,2024-11-21T08:14:42.360000 CVE-2023-39063,0,0,59bec58b4a964df08768e8b76da2dd6c010960ff17c2477ef11a9e4b820c3b19,2024-11-21T08:14:42.523000 CVE-2023-39067,0,0,7c2869dfc102f273e0d2bd756d216e108f9757505fc388615320b8393911fc03,2024-11-21T08:14:42.747000 CVE-2023-39068,0,0,78042324453a3a47daed792062abf132a8e5ad3df36a9e95d6d9d453afb4fdd5,2024-11-21T08:14:42.907000 CVE-2023-39069,0,0,8a8cbdc3500a3d7367856db20584d97cc9930614b4fe6fd3c65b7fa7fea48a17,2024-11-21T08:14:43.067000 -CVE-2023-3907,0,0,aba3550a2413c3eb13564f33524ae4bf5c32831e08d9cc354628839829013854,2024-11-21T08:18:19.927000 +CVE-2023-3907,0,1,8cbdd4650ff8274989f92ac99892cd19dc275471f245143cf3d84e1e164e67f3,2024-11-21T08:18:19.927000 CVE-2023-39070,0,0,cd6c5cd1cb650d102e9cb86f954ff0b83699a2891b609c2b5477e32afe145bf9,2024-11-21T08:14:43.217000 CVE-2023-39073,0,0,fd47385843e24ff102964187512c931081304396305eac4cbaa4f96d35ec01ce,2024-11-21T08:14:43.370000 CVE-2023-39075,0,0,a9e4bf6691f22e74305634fb13389d537084810c47a3082d6ed9335f6d13a5ff,2024-11-21T08:14:43.520000 CVE-2023-39076,0,0,a8b8108e0efce66947b40e003df670e62a2d70f6f9cb3f9f6415439ad2cbe3a9,2024-11-21T08:14:43.680000 CVE-2023-3908,0,0,552fa1e9d9b6ebdbdf271fd069788c1d27ab4c3fc9bc78f5642dd2a0959cead3,2025-02-11T02:15:31.720000 CVE-2023-39086,0,0,8fd5a07bab05e2b79020430f0de41f2c2a4f0b5a42c484a42f367e3e5e01946b,2024-11-21T08:14:43.840000 -CVE-2023-3909,0,0,029b40c4dde79a38472ddbf7422f78cbba7185d42514f42515aadb9b1a9e5e9a,2024-11-21T08:18:20.067000 +CVE-2023-3909,0,1,6937148263e852eb651b2475d72cb2c857bdf0b7b7f5e3fe437f8d7339b18f80,2024-11-21T08:18:20.067000 CVE-2023-39094,0,0,6c0d713916d53365dff8241c45db4e83bc5bcd4c0cb063201233fd46abc002d1,2024-11-21T08:14:43.997000 CVE-2023-39096,0,0,f9deb7ef479626b342d6e662a93fd67893f470751e8ca92879d2e025bad23985,2024-11-21T08:14:44.143000 CVE-2023-39097,0,0,dd576abaf166e212545ac40b247cb399688c91a224387523990011a4ff9e2137,2024-11-21T08:14:44.290000 @@ -231377,7 +231377,7 @@ CVE-2023-39196,0,0,a65ce3ce09ab370e390ed71b7f02ef18f50124b52645fdcacda79475f5bee CVE-2023-39197,0,0,7622afd3fef93aa601dc56be5f18b0cea50e36d1efa43f7efaf2809bc82ae690,2024-11-21T08:14:53.713000 CVE-2023-39198,0,0,bd33d6f28c8ae984abf90546ad027ac9cf1e7c2def22fc922c1293ac68209f70,2024-11-21T08:14:53.863000 CVE-2023-39199,0,0,14869ae4105ad417e0524c8c999c01f6181039967208cddbc6adcf35c28d13dc,2024-11-21T08:14:54.020000 -CVE-2023-3920,0,0,64e95d0a7e9e577ab8a6d2add8afe6bdb620389a2c25e156fd4687ec8bd3e44a,2024-11-21T08:18:20.660000 +CVE-2023-3920,0,1,6c4325437b9b46a0b4aea0aa1bac973590542aa064f2d7190fdb637072bd0782,2024-11-21T08:18:20.660000 CVE-2023-39201,0,0,305e735a2b9e0869070066d97678727f45b4f518c34ca8bde9f401d849f4fa64,2024-11-21T08:14:54.173000 CVE-2023-39202,0,0,7defe6346dd394ec369322d886dffeedc8814e796ba178fca59e07810aa521d6,2024-11-21T08:14:54.310000 CVE-2023-39203,0,0,b7f100d09596807cfdb22b3177cf510b82e0b10519c5f21b400fc8422b061939,2024-11-21T08:14:54.440000 @@ -232240,16 +232240,16 @@ CVE-2023-40271,0,0,58b9e500b3335459e48d9510a81748248f4fb7e2ae6d2e1a1cced5bcefe13 CVE-2023-40272,0,0,18cd605c11e8b3c7f961e42afabc4389f379b038b590089aba46a1b532aad88f,2025-02-13T17:17:01.100000 CVE-2023-40273,0,0,9df40b02a274398d63e1d1e22319cdf26c00e3d6db49eb05f13f3cf140404356,2024-11-21T08:19:06.063000 CVE-2023-40274,0,0,0cc73049c8d9956251fb71d685c3599e0bc3145d4e28751af9e28a2734bce6ad,2024-11-21T08:19:06.283000 -CVE-2023-40275,0,0,795f8a68cf1a4a014393990d6aab8c15a775f12d26516823103f31c09a4baff4,2024-11-21T08:19:06.447000 -CVE-2023-40276,0,0,b208f036af089c3fd72d13a217acf02fd04e95cfa506fa53f41784737644d140,2024-11-21T08:19:06.680000 -CVE-2023-40277,0,0,89a8fede6243494934ad7271dc74288fba9ffc15e524311560124e2a2a51ba9f,2024-11-21T08:19:06.903000 -CVE-2023-40278,0,0,01075b79cf2793f1cab9ec768d9d9cadaba008bdc124c52ed920f968fcb6c4ad,2024-11-21T08:19:07.123000 -CVE-2023-40279,0,0,ca6ed592e548c0a34c5fd906ec23df883950786c9d3bae22af22733de9446572,2024-11-21T08:19:07.350000 +CVE-2023-40275,0,1,04dbf3fba2252f66112f9e9677aa09570baa8c14c024e89fbfede467748c48bd,2024-11-21T08:19:06.447000 +CVE-2023-40276,0,1,eb0e61c137ee9a09e909f727a65a1770199f165db277fe1cceb66ed8d91cd5ac,2024-11-21T08:19:06.680000 +CVE-2023-40277,0,1,fa6a17861166c3b882ee0f5bd33af5286dcbd16141873f57f13e79139331ece6,2024-11-21T08:19:06.903000 +CVE-2023-40278,0,1,d68309aca8e7652d1e6b51529d877aab27d49bdfce35711d76d044d5d48d1006,2024-11-21T08:19:07.123000 +CVE-2023-40279,0,1,53d18f9c18de21535fd04cda3d43409b9cce6af45438f614e16908e5e3af1a70,2024-11-21T08:19:07.350000 CVE-2023-4028,0,0,e371668464f4c8eae1d569b0c0c0d47a37ec5ee2caea789c23ca7173cb18770b,2024-11-21T08:34:15.500000 -CVE-2023-40280,0,0,92a7ae63aac48f1f0e1a5f933baf991eca77ade8cd76031a150827c3b0b57f98,2024-11-21T08:19:07.580000 +CVE-2023-40280,0,1,aafeef97c6caa9adca9a6287c0620bd77e597db1b0d9dd43d3f31dd729cc6c39,2024-11-21T08:19:07.580000 CVE-2023-40281,0,0,2b1967fd2299129e7658c6dec283a26e1de7f1934f9fe51581bfcd4cbbb260c2,2024-11-21T08:19:07.793000 CVE-2023-40282,0,0,3495f927d5ad5272c9834124fb4964646ea624e090ac7c537b5897b79aa7b7d5,2024-11-21T08:19:07.933000 -CVE-2023-40283,0,0,524fcb6a1359f934db59e261c8b7b62537d41c5da59af860543742394c163f77,2024-11-21T08:19:08.070000 +CVE-2023-40283,0,1,681b338db73ee5f9575775387f2ee47d603b6b3e45e461e477a0a32424a04c44,2024-11-21T08:19:08.070000 CVE-2023-40284,0,0,40ba64baed4793876d0e485c57177d63d9a0d12da7128802be6f21404b6b98db,2024-11-21T08:19:08.287000 CVE-2023-40285,0,0,22b4e095aff74d270c32024f39e10fa3d5174a6ea33b0ef27a5c9da66ff4b68e,2024-12-06T22:15:18.837000 CVE-2023-40286,0,0,a6a645b0a40f614cf14f6ee60b22fdd41c9e579772081f2191e4b7d4edbfca6a,2024-11-21T08:19:08.693000 @@ -232449,7 +232449,7 @@ CVE-2023-40489,0,0,f1e209a1f4267c4b2b87c3872b8196c087e7ccbcf506c378988b2bdfe0b8b CVE-2023-4049,0,0,64349c7d7728318992b9d8ac9bc063772f37e3ff89dcb54aadcdbc8bdf210d95,2024-11-21T08:34:17.930000 CVE-2023-40490,0,0,b305530e1cd192949fc426741c848a099bb11b4d204df0ebc5381f6e6d249826,2024-11-21T08:19:35.203000 CVE-2023-40491,0,0,2a908a50f6204b8e3c02efcdc72acad622579cd988ae66d3f56ae77f2a332961,2024-11-21T08:19:35.340000 -CVE-2023-40492,0,0,1e2c820f786ac4cbc2504f8b86b120ed0260685829e28ba8d52ed6cce83707b2,2024-11-21T08:19:35.467000 +CVE-2023-40492,0,1,7da3c9045db19ebe06d98c05eab6d0eced83054fce78fb659ecb4ea541397200,2024-11-21T08:19:35.467000 CVE-2023-40493,0,0,8c8c2798b046bd53589f6b4e0ad98e19ade803bf152c491c3f238aa122d46fc8,2025-04-04T13:47:04.490000 CVE-2023-40494,0,0,601b019f06f304ee99d6982b6230e27aea81e366cb541b7b7ac03fa3ad3dcb30,2025-04-04T13:42:10.263000 CVE-2023-40495,0,0,4b7f4a7a18cd0edfbb72d9a1c73805fee1bfa7493317bfefe3d89f67da52ca91,2025-04-04T13:33:58.703000 @@ -232660,7 +232660,7 @@ CVE-2023-4071,0,0,d1570cd8e5de21674eb56ced5baf1e4b4d6f5e7b1775a232b6650d930aa740 CVE-2023-40710,0,0,959cd32dd3309053644683852af75f54e7f0504a2fbb05692576d8e40d0552e3,2024-11-21T08:20:00.593000 CVE-2023-40711,0,0,2d5ade712403b0a6e9aed7ed6b2c9dc2160a2d11bb631b238edc9faaace61851,2024-11-21T08:20:00.723000 CVE-2023-40712,0,0,cb32102e0833d3a403e8e73da1c92184f831ca53431b273b937b777f68b00980,2024-11-21T08:20:00.877000 -CVE-2023-40714,0,0,3919b4b3b09d9719de68130f663e44dfa8ce54dfac4664cfd89b92b737cf2dad,2025-04-02T14:58:07.527000 +CVE-2023-40714,0,1,80f8216bff04cc57c434153f9ea81eeded33ce92f673b22cd17c12774c9c5c5b,2025-04-02T14:58:07.527000 CVE-2023-40715,0,0,9b82f6bce32a11d52998c3837893f22586accc5fbcdd9082b816961fa6907081,2024-11-21T08:20:01.023000 CVE-2023-40716,0,0,7ecd77813ace9674165f8c3e153ae06db3f5b61341afcf05f665c5e373f4f5d2,2024-11-21T08:20:01.163000 CVE-2023-40717,0,0,3ea5c6a500b9c9fd87189566e0ec5f73cb556caff243f9989a93f76d26e837d1,2024-11-21T08:20:01.307000 @@ -233324,7 +233324,7 @@ CVE-2023-41661,0,0,aabba384a10402738bd8f7dffc85cfe2570b1fedc35cf33e33aaaa7fb9642 CVE-2023-41662,0,0,fb74cfddfb769543d376256812b980aef10cce9def326445f4a6f84411457549,2024-11-21T08:21:26.550000 CVE-2023-41663,0,0,d2a405063ff50d5ff2d1f5348d7445bcf46081c5caa0be3ab8809b10e2572780,2024-11-21T08:21:26.677000 CVE-2023-41664,0,0,b690ab9305e0b7d598cac5af6eb692cbe51c6a9e031e503a0feb6e82746e3df7,2024-12-13T15:15:22.990000 -CVE-2023-41665,0,0,38820b1140441e11693f5d4a380cafa4fd80299fa970c02ffca1cfa2f4b9850a,2025-04-10T19:54:31.843000 +CVE-2023-41665,0,1,167707db0f27591800dc9076af9fe46f51c95ce9e1af7366420d05d7863a73f9,2025-04-10T19:54:31.843000 CVE-2023-41666,0,0,8bcf6c9a6a2a26538e49b376505228ff625982fd5866f26561dcd4fd2d3966fb,2024-11-21T08:21:26.923000 CVE-2023-41667,0,0,89442fe7b532b915f6c02556129cf2b9977e6ba95d140a75b4227cf9551d3b45,2024-11-21T08:21:27.063000 CVE-2023-41668,0,0,528928c240b2d4a2f047eaee411e5df454cd4702b654be8a59aa61a272b4fa94,2024-11-21T08:21:27.190000 @@ -233405,7 +233405,7 @@ CVE-2023-41743,0,0,300b87dc081073f4a60a49ce2968e64de0e216583e09a4eb0ad3f9fb1caf4 CVE-2023-41744,0,0,2bbc31f823b27294cf1bdd3bab2b59136c3c55b3bc2404622c3ac2471a0d0dad,2024-11-21T08:21:36.503000 CVE-2023-41745,0,0,42f3669b41c9732e50b7f81e6b99591faf48a9714a2e324a47e53dde5bbc4d40,2024-11-21T08:21:36.653000 CVE-2023-41746,0,0,7923996a887b453ba7564e95cb07619e8229459bf8d99a07d7353a2b244074e4,2024-11-21T08:21:36.800000 -CVE-2023-41747,0,0,dd49ac9a3f08f4b28cbafa9b6d89588b2ebeb3758e844a69c7d21c7925170ad9,2024-11-21T08:21:36.947000 +CVE-2023-41747,0,1,ed0915ab542b0aed6f082ab7bfabc2aeb3d247af9e4511090ef577e554c3f68c,2024-11-21T08:21:36.947000 CVE-2023-41748,0,0,931fb1991679398a5e77ba1c81acf6e68cc280f63d0b3c11632fd88826c7bf83,2024-11-21T08:21:37.090000 CVE-2023-41749,0,0,50b06e1ab4f25a324ae15269015548b2b635605ea2ed80ba0306018060b3d3a4,2024-11-21T08:21:37.243000 CVE-2023-4175,0,0,7ef3c214638e8e15c4c24188252482f2dc9a172659c334356c9ddd361c03b885,2024-11-21T08:34:32.953000 @@ -233849,7 +233849,7 @@ CVE-2023-42278,0,0,c6822e296d2947d17679e931a15b3040d5ded2ee4e2c57642de2294ad9623 CVE-2023-42279,0,0,81296cd4efac301fc85a695220ac1409ffbfc41f7db62fba143a3a85ea3d8139,2024-11-21T08:22:23.933000 CVE-2023-4228,0,0,324fe7b5e1b8dd90261b51fb78606cef50334ea9f83a5422ef00f7fc75cba541,2024-11-21T08:34:40.190000 CVE-2023-42280,0,0,8c7a3e2e7fa020287f0f7324a0478045181103321395831ce2756d0516830152,2024-11-21T08:22:24.080000 -CVE-2023-42282,0,0,038f3a5626282c886be7a45976f3c62c5828b06f6649aff9dc146931d2c66d0f,2024-11-21T08:22:24.217000 +CVE-2023-42282,0,1,460cdae217c34453c385e8dd954b8ae5b7521b517934eeaaea2a2c2658ac2bd1,2024-11-21T08:22:24.217000 CVE-2023-42283,0,0,4c17062cb48f6aed0478fe53bfcb9324adcb8484517a014cb0b5c041459000aa,2024-11-21T08:22:24.383000 CVE-2023-42284,0,0,851578539356c2386d7003174c272bc300f403a18586f17d1d2fafacf7cf91db,2024-11-21T08:22:24.537000 CVE-2023-42286,0,0,4f6b3a7e283d8e9d98584decaf6a829d0dc3239e1c1095d8ccf7dec731ffef34,2025-03-13T17:15:24.627000 @@ -234416,7 +234416,7 @@ CVE-2023-43017,0,0,122c46db58efad8d4f8364f8f50211335f6cf73be39b11f6bebbcb4a99a2c CVE-2023-43018,0,0,528f58deae6c549e549dcf81bacd038cffaf88ea9d368a67abc2f9e3fbdba417,2024-11-21T08:23:38.137000 CVE-2023-4302,0,0,ed360c060c8c310e7f648d1202ae17e96b7581f175249d24016d07fd3a8dbb5d,2024-11-21T08:34:49.190000 CVE-2023-43021,0,0,a0bbddf515c7615d7a21424b70d6ff3e77edd9d7b506b2ac8a8c4f0d835364b6,2024-11-21T08:23:38.300000 -CVE-2023-43029,0,0,655cc609929ff020d9be520e98af862e8392a971f724a5a35f68bb24288a7390,2025-03-21T16:15:17.240000 +CVE-2023-43029,0,1,b940065720bfec382c597b2a3d50072af4c35eeea4b6c59422fb9e807406e33b,2025-03-21T16:15:17.240000 CVE-2023-4303,0,0,93136eac9c8d08898447ae30a75a647fe33081ac4c7707ee720b73a2b46e8947,2024-11-21T08:34:49.317000 CVE-2023-43035,0,0,d24f53f7da9f3245556e1ffaec236ac75b88ba5cd9eb8aa2e36d9d78ea04326f,2025-04-11T15:39:52.920000 CVE-2023-43037,0,0,ca4d6edf3a2149bd1484b5e2b2a89c8a96b095369ecbaa860b0a12605f8c3364,2025-04-11T15:39:52.920000 @@ -234798,7 +234798,7 @@ CVE-2023-43650,0,0,a58db45a439ac389171294351e1676f8e3b19f43c4ca0dd74e89bd100175e CVE-2023-43651,0,0,f97e0017039e5eeabaa9c405eb329a865638fbd9c8648e13627dcdd3f27b4e8e,2025-03-25T20:15:19.423000 CVE-2023-43652,0,0,f3963c7f874670978ed15cbc8d814b7f15a15950a7cb595687fe5fc36d5ab0ae,2025-03-25T20:15:20.390000 CVE-2023-43654,0,0,e3be8068928da8c39e12c38f58317fddbbf738d6b1f02f1dac5fee73ced5ac70,2024-11-21T08:24:33.150000 -CVE-2023-43655,0,0,b853a21f45d70b057217ddc2597b18f12c4ef54dcb0a952d7c83abd9fe2f7098,2025-02-13T17:17:13.327000 +CVE-2023-43655,0,1,78b6a5c93310fb4fc12d254f4ea5176c8e86ad7e2e00e22da7b3ea823342c9d4,2025-02-13T17:17:13.327000 CVE-2023-43656,0,0,2c79f6ca1b42742f931102b6be6dfc87cc2927c52a9e2ce955c8cd381df2bc40,2024-11-21T08:24:33.447000 CVE-2023-43657,0,0,f91b26c63867f5ee8baf8b44671d1d7fff1750623997c113dd4051966c9e5adf,2024-11-21T08:24:33.580000 CVE-2023-43658,0,0,79f1b0e5d3c3d6843b743622b578b37e2edf80fc0a566f2e93b73ca9b62bbb7f,2024-11-21T08:24:33.717000 @@ -234993,7 +234993,7 @@ CVE-2023-43887,0,0,31f8cdf20cee004151efe8824eed0a410a6ef2601c1569140d2a5bff98362 CVE-2023-4389,0,0,b47be1de0e2057f0789d476d265fa1a03c74c360663a1a2955b1702d46578286,2024-11-21T08:35:02.823000 CVE-2023-43890,0,0,cb68a31bc65a52074c810b701f501d4d69ad1f8baa217dc001d781fac81bbddf,2024-11-21T08:24:57.940000 CVE-2023-43891,0,0,6f7ce08ab4a04c3f576ade90c359c007b99f484a360fb189855e8526f1f081a7,2024-11-21T08:24:58.087000 -CVE-2023-43892,0,0,bac81b0bf66b51ff1c58fd6fcf7d5de9214002c9a33886e41210abda3ef312c6,2024-11-21T08:24:58.230000 +CVE-2023-43892,0,1,675b9498331bb67ed1b041468fa7cf8de77ecb8b1434659041436fdc60115f0f,2025-04-04T21:15:42.630000 CVE-2023-43893,0,0,d31b4436e51c9a2e79dd40eb46229e4fbfb0a3a73a7b386f16667b16cc6ea33b,2024-11-21T08:24:58.383000 CVE-2023-43896,0,0,2c17c1ff55caef88adf2fcd0740a02b91acccde308b8f3a68a3c08ad3cd9a938,2024-11-21T08:24:58.533000 CVE-2023-43898,0,0,f1eb33554aec73819c67bd00608785d57d03548130ec7fddc88d5a4f8b2ba52f,2024-11-21T08:24:58.690000 @@ -235466,7 +235466,7 @@ CVE-2023-44469,0,0,3a7e5554ebd31a58605734c9c1d3416b43fcd3b35655b4b171464d18e5837 CVE-2023-4447,0,0,5ebc889f5a16410a2878657ffcb887cca2a6e743290f302c4e9b4af068cb928b,2024-11-21T08:35:10.570000 CVE-2023-44470,0,0,2862b0f39081cef95b026f969894566de715746bb2ae433f03340b509155cdb1,2024-11-21T08:25:56.723000 CVE-2023-44471,0,0,4b4e635be95bff9ba7ad414d098654cf7f2eeb4ffc19f3af330d58eb7c8292ee,2024-11-21T08:25:56.843000 -CVE-2023-44472,0,0,49d43556e9a19fa57e5f5eb03674809ae5de4fd9c61faa23b8b3dcd49b4987c1,2025-03-20T19:48:57.973000 +CVE-2023-44472,0,1,89f3269ea0dbc50417bc39deca75e6a54db53940814448de0f62caefaa3de591,2025-03-20T19:48:57.973000 CVE-2023-44473,0,0,8192a4726afc411a7fd89920a9d57564297ba07d91043853c19b27613d789141,2024-11-21T08:25:57.080000 CVE-2023-44474,0,0,cd759b60e27b01e8ea39431ff97fbdf5b5053f315aa832e5ed0e4a58f5f03437,2024-11-21T08:25:57.213000 CVE-2023-44475,0,0,89de910c63b6b608825810094c30ae563457d3ca6cccbaf219effd0c4c9c73a4,2024-11-21T08:25:57.333000 @@ -235979,7 +235979,7 @@ CVE-2023-4549,0,0,a25145aa7b3513261bfa120a0d69254d3544e66ca9ea395d1f6e2626efde22 CVE-2023-45498,0,0,5b041500e13e620bdefafa940488754e14a0258406f48ab10e8194644b42c5de,2024-11-21T08:26:55.823000 CVE-2023-45499,0,0,36ce20c9c219aaddde1f402c34fc4d1c95616d8eeb5fb0bf55cc7a46e5dd2f62,2024-11-21T08:26:55.987000 CVE-2023-4550,0,0,5adec826c039aee5c5371b41c9e952a5594b73647a4efa527532a0ef048d0dac,2024-11-21T08:35:24.040000 -CVE-2023-45503,0,0,a86d2bff741f59606c36dfbab826bb45b560ccf9bc03f599737b321fb6e91d26,2024-11-21T08:26:56.140000 +CVE-2023-45503,0,1,1bb09dbf55bf6cfc07b9639f1661dcd4e085e4ee7b6b9e75be596d3a0213ba62,2024-11-21T08:26:56.140000 CVE-2023-4551,0,0,d9d33acb8b6792ab41552f3d750d0b4a594acce9ee7bdad5288824f3de4a9060,2024-11-21T08:35:24.180000 CVE-2023-45510,0,0,5984212010fbd67196b68b7f04f6e900ad0ccac8678cc50fcc692f55b4e4733b,2024-11-21T08:26:56.347000 CVE-2023-45511,0,0,28359f8db4c0699c943a847d8af5d9d266158c928117bf662d7b5064f91cfd1f,2024-11-21T08:26:56.517000 @@ -236025,12 +236025,12 @@ CVE-2023-45592,0,0,df5a42348c5bb41dce114b43dad74f75474d49c7b7b6906e8823f16029bba CVE-2023-45593,0,0,a65fcccad9f079badb17bf065f7d0aeb5e15e6bee15061926417ab8782acdfa0,2025-04-10T20:24:58.750000 CVE-2023-45594,0,0,c6cf54503fb2fee9b6eda308fa27e7062e621945a4e26c37bb7be8dd26a40eec,2025-04-09T20:49:05.457000 CVE-2023-45595,0,0,de383c83f07837326ad53eb09c5aeef58cef33f1a0d631852827d9bb5c7def9a,2025-04-11T14:47:09.807000 -CVE-2023-45596,0,0,dc09dd861e8c99b466aab790e39a6ed4506455a10ecd5666f3b21f2e8a1b2d1a,2025-03-03T22:34:02.150000 +CVE-2023-45596,0,1,fba9431e4a211172aef2a87bd725e991479e2061db42c25e9527ae74591a7f8d,2025-03-03T22:34:02.150000 CVE-2023-45597,0,0,37bf15eb3360aee00651aa8e91e1221f498e5f95e3213d80bd5faa1e760a7865,2025-04-10T20:36:09.827000 CVE-2023-45598,0,0,54a7c70054f422ff06f54ec9a152ebbf4a2fb51fce4a607111f3ab959d9a8a9a,2025-04-10T19:17:40.870000 -CVE-2023-45599,0,0,b37cd3ae2c4e95f3c89abbb80090b3f9273ff0d35c9a0f4dbf601b04107fd8d4,2025-03-03T22:39:43.980000 +CVE-2023-45599,0,1,e0cb7dea20e0145e39ae6d07b188cbcaa493e459a644bbf363ca346510abe66d,2025-03-03T22:39:43.980000 CVE-2023-4560,0,0,069747aa049fecc2c32b7a98740d46723970397ae350fae2885e9c0865cd2dd4,2024-11-21T08:35:25.417000 -CVE-2023-45600,0,0,80a6f68d3d2c65a08c249e305b2e33b3d56a3c982514955c16de001dda5e3fa8,2025-03-03T22:40:37.263000 +CVE-2023-45600,0,1,8f8259d05ac9c3ce2c3d2bb15656e747dc3aded0a2f6242df2fff69805d3cfbc,2025-03-03T22:40:37.263000 CVE-2023-45601,0,0,9be2c976a80c394c048d74501f1e27f2f867f04649b7fbb1a380efa3164389f5,2024-11-21T08:27:02.457000 CVE-2023-45602,0,0,407f68d6d65fae4dc5460b1789b8e215567f55d452c685d6cea72aa2d28294d1,2024-11-21T08:27:02.593000 CVE-2023-45603,0,0,07017817b227329cd225d7b5522b22723167a751534d1e8700682ec7674a58a8,2024-11-21T08:27:02.757000 @@ -236209,7 +236209,7 @@ CVE-2023-45799,0,0,fbce8d6b8e6083d84c5d7edbbe14678e383d2ec27c519ae6436bbff52747b CVE-2023-4580,0,0,2e6fedc46e17e9bb887761bc88bf9102221bfccb4ad3a7e3778c6d8ef6b0be72,2024-11-21T08:35:28.417000 CVE-2023-45800,0,0,d7328d7a9272a88df9c1577e3ef40f343d31a30ba93d219d5a0f38aea6c38a10,2024-11-21T08:27:22.747000 CVE-2023-45801,0,0,a67a413e25124c757a4a9f30489d9ff6da3b3e5a4bcd558803cb7d4305360ce3,2024-11-21T08:27:22.880000 -CVE-2023-45802,0,0,a608d89ea80871ede78329abe4fbaf5820f2438fcb35148a10619453444d6d81,2024-11-21T08:27:23.030000 +CVE-2023-45802,0,1,17112710899dcd2409bf36ba6550d67172c5edb9463df862b93b7b98f367d147,2024-11-21T08:27:23.030000 CVE-2023-45803,0,0,52ec2f001c7b5763a62c03caee928f8fe97abfa49924f30fda8d4823b4e4158e,2025-02-13T18:15:32.780000 CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6f57,2023-11-07T04:21:48.277000 CVE-2023-45805,0,0,c5af310fe66f01d667b7fb5cddce1349736cd3217071ab78f14903c02f3aa58c,2024-11-21T08:27:23.383000 @@ -236279,7 +236279,7 @@ CVE-2023-45867,0,0,c5950548ba5293881c74b3a11f24edec7618fa48a1057b0edd5094fcf622e CVE-2023-45868,0,0,40b498079fd380f3efc8be05a7ecf8de93dab24618d65616aa0cb8c27082264e,2024-11-21T08:27:31.390000 CVE-2023-45869,0,0,23f1d911a5119687fbd5eb685444cfff4088a5040669161b4e3b33c43519c795,2024-11-21T08:27:31.547000 CVE-2023-4587,0,0,3a9fe164cb2df923f2f50272c67b53445a791eb4750e6133681ea24bca3943de,2024-11-21T08:35:29.503000 -CVE-2023-45871,0,0,7f1cf52edaf736e630906e07c1df7e046f3c28b685a63c5dd8f00a31bab17c2f,2024-11-21T08:27:31.720000 +CVE-2023-45871,0,1,2f15152276c931c6735bf93aa2e8764da5af78c8691b69eb3143a26b1c91cba6,2024-11-21T08:27:31.720000 CVE-2023-45872,0,0,4d24e71e460fe608650758386049867baf8ea95f6f98c472e7539440ca6d03ea,2024-11-12T21:35:13.113000 CVE-2023-45873,0,0,026c2bb393889c1cec762f096fdc905b0d0bd0f37c60e4bd68f52732c02e9b97,2024-11-21T08:27:32.103000 CVE-2023-45874,0,0,a4692ad9c798e61fd677030b1bd7f110c82de92bc2cee43fd68a8276d09e0562,2025-03-26T21:15:20.047000 @@ -236301,7 +236301,7 @@ CVE-2023-45893,0,0,34d47583aa874a16434ac109ff9dd518fabe2e54448ebb5851491e432f813 CVE-2023-45894,0,0,de880eceb832483892ce51848fc3a6ccd7f091e05daf6a0d09f260cfc28fd11d,2024-11-21T08:27:34.620000 CVE-2023-45896,0,0,0503b9b22798e4cd4d8981ed89b8ee903e8e6b034923c6ae49ae42f267306f0a,2024-11-01T08:35:03.997000 CVE-2023-45897,0,0,faa8fa863cbb8a3df0b16f702e5bf414a79ba0375c914b80b5eef0716f820658,2024-11-21T08:27:34.957000 -CVE-2023-45898,0,0,c8906771a10ff0d35d6a638762fef09cae8ae9f166e307bf158bf5e8ea33b4e9,2024-11-21T08:27:35.133000 +CVE-2023-45898,0,1,2c72fe0cf2698f58a8d60690d28085e3a39374b0d11c650b453cdc2209ee5767,2024-11-21T08:27:35.133000 CVE-2023-45899,0,0,4eaa89e132088135a262a155b9a208a643fa1600b346e15873d17b01faf07afd,2024-11-21T08:27:35.317000 CVE-2023-4590,0,0,12e804ec09e6e1f6a16ea46910457bff376fad8cfae1b0e7f548a19cb0522174,2024-11-21T08:35:29.910000 CVE-2023-45901,0,0,29d93ad7c5fc5601cc1a9b42d54ae0ac500ae2d55bc27f4e201173ee1b57b9ae,2025-04-04T15:15:06.847000 @@ -236738,7 +236738,7 @@ CVE-2023-46456,0,0,2786303d2070f5e27f6d6e6346f5c2f8465bd49d75d8a80ea65f28d1c4a7e CVE-2023-4646,0,0,31dd4a81e56c351d7993d67d54e4492de832a7fe7fba9f212811c7ff412f802d,2024-11-21T08:35:36.367000 CVE-2023-46467,0,0,ee69c138fc64569b4a2680db9893225c61f933d13844d37f2a2dec06c7a557fd,2024-11-21T08:28:33.127000 CVE-2023-46468,0,0,5b26955a3193c65b37c2ef9f9ef1fcaa89d93687b2a1cdd82f284f290e4995c0,2024-11-21T08:28:33.380000 -CVE-2023-4647,0,0,6463129d0426f284d966d814dd103665c36d0b3ec2bf5eefde80c040ae9fdd9f,2024-11-21T08:35:36.480000 +CVE-2023-4647,0,1,e9a3e4846e93a3b874aca1d52244d9e2d63d8580c2ec8275657d679e8af4961f,2024-11-21T08:35:36.480000 CVE-2023-46470,0,0,bc11e355e9c44593401ba9310cfe1ca146d12cb71553922456bfc5f1fd0e2c4e,2024-11-21T08:28:33.527000 CVE-2023-46471,0,0,64f27e5db9e3dc11dd6daa4f52e14d55665b0381020ed1c718166e021599e6b6,2024-11-21T08:28:33.670000 CVE-2023-46474,0,0,126d1d027bdc1eb12f6b118a041446f597fcf5d61c574e7c621f42e802cd9607,2024-11-21T08:28:33.820000 @@ -237147,7 +237147,7 @@ CVE-2023-4698,0,0,9dfe8d865c6a7f1aa233e49914d858db0f5052b28d0060d7fc9a19845c64ca CVE-2023-46980,0,0,dacb1018c155a0147f0608fc0394f59dd8f2f2f0512e453c092745a2746dd14f,2024-11-21T08:29:35.433000 CVE-2023-46981,0,0,026350644202b54d0cca0c15982b2b92ecf956938336a88c9fa0604ee3f1ed5f,2024-11-21T08:29:35.663000 CVE-2023-46987,0,0,229a1f390d396188d389c42c1c5da39c22ec617d23e459a8ad14ed7bcc5123c4,2024-11-21T08:29:35.810000 -CVE-2023-46988,0,0,cb4167d9fa2ed7334272ed30d5a28cc7b90630e53b908806d635238ee8716b99,2025-04-02T14:58:07.527000 +CVE-2023-46988,0,1,3f5d273c81dd7f5f78ed1a3f95b3b247867d5f8a42d1ff49bd68b3c8f1e8b43b,2025-04-04T21:15:42.900000 CVE-2023-46989,0,0,45791d629ccc30ec38a0335dae48670585df4009011aeab0a1590f09dc4ec070,2024-11-21T08:29:35.957000 CVE-2023-4699,0,0,65e91627f3db2e81b2cf04839985e20c3b1b4c4eb2f486d5e0771b5eef9626df,2025-03-17T16:15:18.850000 CVE-2023-46990,0,0,160645d54c54d888c229c9d1c24711089a9818f72a67e4f52929e8b3e327db4e,2024-11-21T08:29:36.120000 @@ -237753,7 +237753,7 @@ CVE-2023-47782,0,0,168aa140ada9a9a4dc52e9b2b31f2f1fbd0a53e6f37bf9d52df47b9b16ad9 CVE-2023-47783,0,0,0764a02ea893f1870e0b669cbf5c18393f0e0dd1519dc21a90562cfaaa6c0b52,2024-11-21T08:30:48.087000 CVE-2023-47784,0,0,0a8739a8b6d8614e03d8c9c9cce6c507ec66936d420324e8e1f006452793df30,2024-11-21T08:30:48.197000 CVE-2023-47785,0,0,62f856ae474b1d8599e0d1d4ad35e6c1294aa3b0815c564b0d994fa5a9cd71b4,2024-11-21T08:30:48.320000 -CVE-2023-47786,0,0,d45395c933c0ae0679ab6c70837743ec85721ce60af6c75b2c4221c20d7af590,2024-11-21T08:30:48.447000 +CVE-2023-47786,0,1,77e3b081777aebdc8c9531908a13bb8d5b4cfbdec6db825d9799e386cc0cd51e,2025-03-17T17:03:45.717000 CVE-2023-47787,0,0,b086488655583311368eb2de5294a1e809e070e5842d05073eb9738fcf398620,2024-11-21T08:30:48.577000 CVE-2023-47788,0,0,5d64bf940222c2b73e7ae5fa3e06118e7e8a61f4db6bc31f4f8201257ecf1cc4,2024-11-21T08:30:48.710000 CVE-2023-47789,0,0,6ddc1038c0f36450e940663f231dd2aacf8d6dcdb13b497e1eab033e9406800b,2024-11-21T08:30:48.853000 @@ -237816,7 +237816,7 @@ CVE-2023-47842,0,0,d8cdddad2e1ff4a906f4bdb5ba33e3efa8065f6c9d411a355ecb64a569138 CVE-2023-47843,0,0,52c3e8ba9365447b1d0ee677bfb6182daba4563fc1ff82d4384c9de166c2aa86,2024-11-21T08:30:53.840000 CVE-2023-47844,0,0,6d1743ee8d08f47c5eeaf003eb63b155e5b894f2e742a3945499f074b8ab548f,2024-11-21T08:30:54.023000 CVE-2023-47845,0,0,c5c0774170f52d5261df96ec948cddedc85dd51b50571ce872255eb2278a1122,2024-11-21T08:30:54.147000 -CVE-2023-47846,0,0,4a51ad180f7867d7b94803cf1626cfb41ba52a6759381500f8bc27bd668430d6,2025-03-19T19:03:05.937000 +CVE-2023-47846,0,1,482e496d2cc4645ce6db7cb038e27fe4d1efdc31ef826644cc46a550a93f81c0,2025-03-19T19:03:05.937000 CVE-2023-47847,0,0,f80d277f89340d3f25c3f3571c1e1816d2281f0d3883d2b6dd7769b5558c58b7,2024-12-09T13:15:32.370000 CVE-2023-47848,0,0,dd6561a8697fa838c81a10ffedcdbec1e7bc1da94ee56c2bae4bc9d57b70be09,2024-11-21T08:30:54.400000 CVE-2023-47849,0,0,85e7aedfb56e6545468727b38bfe281b3e7be4bf7a79abdf461699c048600399,2024-12-09T13:15:32.500000 @@ -237840,7 +237840,7 @@ CVE-2023-47869,0,0,b35b27c08772a831526de253648208dd2ef611c6306e6e622fe171b93bd4b CVE-2023-47870,0,0,90674fc91b00935ca55935ec9e84b5dee66e5d5688f9bbe6b4de4aadd6227527,2024-11-21T08:30:56.450000 CVE-2023-47871,0,0,cfdfec4a2737d45b346eac498c6969c85dd01b0c9f8e21357df31b1205cc6225,2024-12-09T13:15:32.767000 CVE-2023-47872,0,0,a6f12169ef04d4b51dfcd627c18e60f534b596ef65ec72eced96dd248e771f87,2024-11-21T08:30:56.573000 -CVE-2023-47873,0,0,c80cf9ac4caf0c82ceae2a097bcdcac1ea76105e772f3d559578e1e08400a4df,2025-03-19T19:24:55.360000 +CVE-2023-47873,0,1,666577992e385d2d3aa36a77379141236892f5e678b9787a7bc5d20693c2f220,2025-03-19T19:24:55.360000 CVE-2023-47874,0,0,c9c460bb8c45e037b6d94dc281a302aaac33bdbc40ad3bc34517c19b5f1996e9,2024-12-31T17:29:07.187000 CVE-2023-47875,0,0,dfa066e7628f4ad6f4d51d4f7df32367a25258bc741871f3618113c0e9ee150c,2024-11-21T08:30:56.943000 CVE-2023-47876,0,0,6289baa82f79bb3e0548172170021c28f918791e25a4b59fff372b2a1421f295,2024-11-21T08:30:57.063000 @@ -238082,7 +238082,7 @@ CVE-2023-48315,0,0,0ce5bcb1f61b32ec58364507f3c2670354de060e5ea10d1d1099bde646e8c CVE-2023-48316,0,0,8abe8345ecdcfca12500314184dab2cee64a3bfdeea16d453153a22c3e3dab85,2024-11-21T08:31:28.590000 CVE-2023-48317,0,0,26db5ebd55e51ec988e8aca2aa556839c0011e5a7eba6ca7e48fbdc0abd7279c,2024-11-21T08:31:28.720000 CVE-2023-48318,0,0,2fdf4678be6002539232f73901305f13b759dc0bae792701ce6d76118aaf1018,2025-03-10T17:45:44.900000 -CVE-2023-48319,0,0,5cb54430daf5a8d0e4cb53d14ddd7683733bec8122610dfd00aac43e8a52a443,2024-11-21T08:31:28.970000 +CVE-2023-48319,0,1,381ce5d0a0b69d6d2ad987c8da446529a977e79cc87492b0f481e67844d6b241,2024-11-21T08:31:28.970000 CVE-2023-4832,0,0,e6b2c1bc6eaa78a4b56b4804cc88c0571744536b4c97b319c2cffbe6a62608db,2024-11-21T08:36:03.957000 CVE-2023-48320,0,0,41cae7e6406d93214a5b8cc75fd41a289beab8affc1552fb80e64835a39f0cea,2024-11-21T08:31:29.097000 CVE-2023-48321,0,0,70a7326b8d4535c3125f55bb497795610837abbd5ca6e32455c4c9deae2ada8d,2024-11-21T08:31:29.223000 @@ -238759,7 +238759,7 @@ CVE-2023-49105,0,0,378c45d15abaa14598ff8e90cd71eff6da563ad06eae7e956f2068ffc7bf1 CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764592,2024-11-21T08:32:50.420000 CVE-2023-49107,0,0,15c6c78af987ac1a6fd2af8dde2078bdc1b6490a345e2093e4f040090109db7c,2024-11-21T08:32:50.550000 CVE-2023-49108,0,0,13fce593a34fb8b794d3785a1e07d4047563aba128c4a14dfb0063d6834d5fe3,2024-11-21T08:32:50.673000 -CVE-2023-49109,0,0,4e3fcac55647a0d8458b7ce0fedc17d893d94138b01ce3be63ca7bd3a380ee56,2025-03-18T17:37:00.060000 +CVE-2023-49109,0,1,ba8bebb6dbe6aa2dffca5db214ff3782fde42b9495b41790e73f3b5b50a421a9,2025-03-18T17:37:00.060000 CVE-2023-4911,0,0,8c7d09f1688a467d8fb9e5ce9f82cfd37b0f6673c8f041439a6fa24021dc3309,2025-01-27T21:45:46.857000 CVE-2023-49110,0,0,a1bbb45f4a96757275295f97a0674fb7c93e72998d5eb9340d7f0c83127b7f17,2024-11-21T08:32:50.980000 CVE-2023-49111,0,0,5d69d06a2c7e1a6f756073bf456e5d1dbac3d4b05a2908316cf5f6c8ca69aebb,2024-11-21T08:32:51.160000 @@ -238891,7 +238891,7 @@ CVE-2023-49246,0,0,a39e889fb2e93e91d6cc9821c6251558ccba6271a430edb7d19e90cb5f12a CVE-2023-49247,0,0,220538fab1017fc8798a6caffcfc69f4183b72999c8a79565731864e550bcf8e,2024-11-21T08:33:06.907000 CVE-2023-49248,0,0,65b743e0f24105ad4b6172550010e188c63e389f083561a3e29f7bbe8866fa7f,2024-11-21T08:33:07.037000 CVE-2023-4925,0,0,4eefaffa5744795223d19816c967470168d0e5c49509550a492fd496681c7eb2,2024-11-21T08:36:16.843000 -CVE-2023-49250,0,0,03eeeadb21eed30cc92cac40097cf560d1ad23000fe85bd5156a232e8a4ef350,2025-03-18T17:37:50.467000 +CVE-2023-49250,0,1,1a16dd114049544b7771a00fb91380a3c490a425735ca32df9129747f72eb960,2025-03-18T17:37:50.467000 CVE-2023-49251,0,0,01ca2beaf55c18d1be789df49fc505c84be3a39a54948a0d4102115385e1af49,2024-11-21T08:33:07.323000 CVE-2023-49252,0,0,31d6e12391faa1705447ae9df7eec645cf78cd359e8def8e22dbaae5739e95f1,2024-11-21T08:33:07.477000 CVE-2023-49253,0,0,6bcc1caa4fe1d5c3fb930e1e6d020cd5af57d2e223b7cbb7cd40bd8b4d0fed53,2024-11-21T08:33:07.623000 @@ -239067,8 +239067,8 @@ CVE-2023-49508,0,0,a06f67b805f448f282f17a49613360ae1ef3e331d48eb4a72cdc35f393273 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000 -CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000 -CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000 +CVE-2023-49539,0,1,6c85f4f200e20bd4c777adf972147c25f4a9e8d961c4276b41c8af1ec5d8f5f3,2024-11-21T08:33:30.410000 +CVE-2023-49540,0,1,b4ad883b4e45366debd9b3c672950d4d307aa4089e67211673decd60b3cbea8c,2024-11-21T08:33:30.643000 CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000 CVE-2023-49544,0,0,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000 CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000 @@ -239419,8 +239419,8 @@ CVE-2023-49984,0,0,8fde47656eaf23c1499783ecedf1880bc620212ebe787cb9504bc990dcf37 CVE-2023-49985,0,0,00e4511d313543a6f453aec7234ac951f249152a4d8538234e5e9f2fdf42c41d,2024-11-21T08:34:09.813000 CVE-2023-49986,0,0,2c447334fcc7b21c1634d5c903e312dc3dfab899b5f0c890ee24c364722e4826,2024-11-21T08:34:10.023000 CVE-2023-49987,0,0,b4e109e2508280ce944041d4910bd65d47d15ff58e2c03f58540ccf627f98faf,2024-12-05T20:15:20.770000 -CVE-2023-49988,0,0,c8f8200fd8df634ef3ef513b649eebaca387abf8f842830ac16f7898a75e823a,2024-11-21T08:34:10.370000 -CVE-2023-49989,0,0,318f82534f30c0c7891ccc3e1c9961b6e52b2070b74795eae182562f3baaa92b,2024-11-21T08:34:10.570000 +CVE-2023-49988,0,1,7f4feeeb5090f52cee9e0fea9bd057be66355dc26389a6e9cc8624d4b33eee9c,2024-11-21T08:34:10.370000 +CVE-2023-49989,0,1,6c36b53463df71184cde9425e1caa42841b51d3e951a373a6e44f726649b6eea,2024-11-21T08:34:10.570000 CVE-2023-4999,0,0,7e4a5a98874b3ec521ba696176f47c2ee08de90ad71124ef23b399a1dc93396e,2024-11-21T08:36:25.917000 CVE-2023-49990,0,0,852a1856dce9ded9ee777580b2a74b219da66ee05f1c7eb98b00dcb53bb32cb4,2024-11-21T08:34:10.780000 CVE-2023-49991,0,0,c2e0cd59db38ba698a2da6cb7cd66c4213aa234957dcab1572321e606eeb2d82,2024-11-21T08:34:11.013000 @@ -239609,7 +239609,7 @@ CVE-2023-50267,0,0,36863b37e2acd610822d4f35a8b9d5abcdb3a22c51b9b84ab7daf9ec2e976 CVE-2023-50268,0,0,50f7c522c5f8c148dff99ae2bcad7f2381407b298265ac102c5d6de84771a495,2024-11-21T08:36:47.253000 CVE-2023-50269,0,0,0e1957df039a56b0ade1988387baae8647e791ecdaa172e7a29f2e50d1816b94,2024-11-21T08:36:47.383000 CVE-2023-5027,0,0,1fe824df54b01e2336a5564d1b7eeafa86f4d4f9b0e9ece2e763d1cf23e9856d,2024-11-21T08:40:55.287000 -CVE-2023-50270,0,0,875447c471c85ea667c05d53eff0239c3c8049b5a59818290545525411158c8c,2025-03-18T17:38:29.743000 +CVE-2023-50270,0,1,c42ef7a1dd9d7ce264037b000b042e961679c8d52ed38fb862fec268165c81e8,2025-03-18T17:38:29.743000 CVE-2023-50271,0,0,5411a8317341660a0eb368d135720a62f340415b2935e8ff756b4fafb91dbe6d,2024-11-21T08:36:47.757000 CVE-2023-50272,0,0,cdc5b7cb0e03ef1a3c99a0370b439be2fd3bd1242223f4d0ecd35ebf66189001,2024-11-21T08:36:47.940000 CVE-2023-50274,0,0,e3968a6d9eae1df1f36f3b86f2d2d9bf4ad16d5427ae8ace26bdd39fc44c01fe,2024-11-21T08:36:48.087000 @@ -239634,13 +239634,13 @@ CVE-2023-50309,0,0,185b20daae769c5a48dd69a72bd545cdbb6391cf6749d35ae3bc12db56cd4 CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000 CVE-2023-50310,0,0,ee63583edc72c7bb2dd2fbd446b3bacc51b87b3209164901da3eca6b0c813dde,2024-11-05T16:40:57.533000 CVE-2023-50311,0,0,bfcc9d072f5a2d893dd33392360fe36f36ce6d9885fb951e98233624c4f9ba2b,2024-11-21T08:36:50.263000 -CVE-2023-50312,0,0,bdca00db65bde1d2baddecb642f7d2c08c37a82fe6fe98fec4abf3e614784cbd,2025-02-26T16:43:48.660000 +CVE-2023-50312,0,1,eeeb6dd6e8b76abbefa0798ed101ab26f15141355d8a8e074e7c94440294ae0a,2025-02-26T16:43:48.660000 CVE-2023-50313,0,0,a83e416401577e94df6dfe4b1b998ddd0a8952164aaa6f5ea90e36bebd23e193,2024-11-21T08:36:50.540000 CVE-2023-50314,0,0,ce35340ffb0568ccdcb723e50bf9507ce76dc59cc4416bfa4739778b544bd02c,2024-08-23T19:20:22.473000 CVE-2023-50315,0,0,625341a76fda8905bc70b73219527e00e0b32c20581d112bacaee69e8b51c52a,2024-09-11T13:38:26.370000 CVE-2023-50316,0,0,eb122daf450e022d1bccc5f0c68d1ffb71c6bcb82983fec4c5e25e0a0f0f41af,2025-03-05T14:36:44.903000 CVE-2023-5032,0,0,4ede5b17693a04ef49d59f95a825f1eb5b57b0f4b8cfa1778c1a2dc8be2d09df,2024-11-21T08:40:55.963000 -CVE-2023-50324,0,0,687d6b4cdd6bb152ff73a0cf328f4b59c982847138d10411d2660b40c160f552,2025-03-04T14:14:12.020000 +CVE-2023-50324,0,1,3448f20f16b1d641c81cbd951c7cc591b43f6864b67dc8df6d7a2d1e8955c6d4,2025-03-04T14:14:12.020000 CVE-2023-50326,0,0,bd3bc6fce1ffc5491df4da766864b97e8ced1cbb50bba99d705adb05a7f7ceb3,2024-11-21T08:36:50.950000 CVE-2023-50327,0,0,ea24efd3c93ac60674f80abc73347dc6e62767236216bec9494e0c05567131b6,2024-11-21T08:36:51.093000 CVE-2023-50328,0,0,c55487b62bda05a5c2ae7d76cd8d505ebd65e77df73e04795ba360723b0467cf,2024-11-21T08:36:51.230000 @@ -240176,7 +240176,7 @@ CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000 CVE-2023-51296,0,0,a7d4ee5e8f44765457bc0fe6bf38800e41e31ce4dc18736123de66a6bd0d0252,2025-02-20T15:15:10.293000 -CVE-2023-51297,0,0,259e32017d3880d84359337625e75418697cbc3ab770413e78ba396d638f740a,2025-02-19T20:15:34.770000 +CVE-2023-51297,0,1,31f201d3211d663b3d27eb0be5248e744a8f75e568d1a0be8d3660fa044b6139,2025-02-19T20:15:34.770000 CVE-2023-51298,0,0,7ed107e6d79560255accdb667ee4f73d19a9d9e7ddf7eb6b1951e5b2826f384a,2025-02-20T15:15:10.473000 CVE-2023-51299,0,0,a4b0fc25c44620e5e6da2c22d3b238661f52295854836c1b6a22070fe2bafe87,2025-02-20T15:15:10.633000 CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000 @@ -240660,7 +240660,7 @@ CVE-2023-51775,0,0,c4b49ccf1284cd05ee0709eff6552d822b49dcb9bd884a4380302c8ea4f34 CVE-2023-51776,0,0,f1aa40f2e2cbacd9bd530f05852d8c84137626063950ac619f0433ceb34061d1,2025-03-13T20:15:16.033000 CVE-2023-51777,0,0,2d4689e6e91a292c9aa5fe035d7fa67fc0f7166734a86ee397e1d23f51d1b00c,2024-11-21T08:38:46.883000 CVE-2023-51778,0,0,7af8da79981e8be652c027d872ca957b34fbc3623a14083e8a00324cfdf9f3c7,2025-03-13T19:15:40.497000 -CVE-2023-51779,0,0,66a5ad2b47091721e27d9e01ce67eeb3c0fe91ede867d125eb4edbdb5e60273c,2024-11-21T08:38:47.327000 +CVE-2023-51779,0,1,bb7c19fe478c3b9beb697e1ff8c64c50c8704e91dd414e5047c409dcc81e0460,2024-11-21T08:38:47.327000 CVE-2023-5178,0,0,82f6cdc6c6b4df28cd18afde84811c81410b45e223804c58dd49c6e223b255cf,2024-11-21T08:41:14.480000 CVE-2023-51780,0,0,10065d03b213c7efc9b7c9f0a4cf4f85ff2632533f21a9d2026c7b4f4376fd17,2024-11-21T08:38:47.540000 CVE-2023-51781,0,0,618b0443fbdf5daa945280e2e508251a6a99b750a64a347babf3ed706798cb64,2024-11-21T08:38:47.710000 @@ -240884,7 +240884,7 @@ CVE-2023-52153,0,0,366031e51e74dfc7b3cea9bb12c3260228422f15882e0ccb30221caf420d5 CVE-2023-52154,0,0,fee159a8d33e95a20001ea90c03a853f2f0fe4b9886c81b725f170f009997665,2025-03-25T16:53:16.827000 CVE-2023-52155,0,0,aadf58fc0fbb2e9b53c35be3378247f18419d9ef6064581f86faef6893940ac5,2025-03-25T16:53:20.547000 CVE-2023-52159,0,0,02be5a5cc129ad29aca45223f166a0dc90b5f63bf8518d8597c0a8da82ea519d,2025-03-20T20:15:30.210000 -CVE-2023-52160,0,0,19fb4e397a5f0157e35e2583548edfe6ba46e6d8b3d42ca883782c1d0672d7f7,2024-11-21T08:39:18.380000 +CVE-2023-52160,0,1,f06e55ee6341dc62e094534554332f6e755d7565ef3a64b1df78df422ee61cce,2024-11-21T08:39:18.380000 CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 CVE-2023-52163,0,0,d0db7f8714bd7c7bc69052ff4d565a82ddbfad80e4a821149bdfc65aa3f141d5,2025-02-05T17:15:20.950000 @@ -241330,7 +241330,7 @@ CVE-2023-52637,0,0,6525471408a491031c4de1ae8f72983964f519e08c54239f19df671c1d6ab CVE-2023-52638,0,0,20a013aef68eb0d77ac7b5a8af822be927436c665af725c4c31a359a523132cc,2025-02-03T16:16:43.840000 CVE-2023-52639,0,0,579dbcdfbd6af13a51f85bf72840c1b4fc290f95ccccb50fdb9da28a6c9e017e,2025-03-17T15:40:20.033000 CVE-2023-5264,0,0,3e616cabf1a089b6e6cdd95ca27e570fd2ac3366b640b4e1c4e5769bd4fd0c47,2024-11-21T08:41:24.370000 -CVE-2023-52640,0,0,8ab36630cf2f06b00061ad38b52fee04b65f9a53ce446d61a91aac4f6928b553,2025-02-27T22:02:14.217000 +CVE-2023-52640,0,1,72034f1b558636d51497dba07abc026f408c8c064c55fd43a5f3188b2e220f4d,2025-02-27T22:02:14.217000 CVE-2023-52641,0,0,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000 CVE-2023-52642,0,0,33eef23bffa3de9152ad66e1c6bf2b14f1390a574a7a5763ee95794ef05d26a3,2025-03-27T21:05:43.420000 CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000 @@ -241368,7 +241368,7 @@ CVE-2023-52671,0,0,8ecfbe6ee420301fa80dc2cf957e2651d63d7dac3a9057b746076a32db73d CVE-2023-52672,0,0,ee557de88431eefa7e0f6d26bad35904d3a324cf22b23196783cc688a6367d5d,2024-11-21T08:40:19.660000 CVE-2023-52673,0,0,2b49a094ed02d8ce875a94d41602995d8c486801028201280e70ec805567d7c4,2024-11-21T08:40:19.867000 CVE-2023-52674,0,0,0ee8ae7591f888daeb3ac9748cdbd6451aeaa51cd7d70161a9b681b5f562cb13,2025-04-07T19:05:31.447000 -CVE-2023-52675,0,0,ee64a1b35db5cb9fd4e69e422279d95b5016e6a2b0c9b0fe9ba65e92ef8903d8,2025-03-04T16:53:20.237000 +CVE-2023-52675,0,1,5601a7de6f6c5ed36699823a0810fc480cd76156ef654e57eb7420372f09aa4f,2025-03-04T16:53:20.237000 CVE-2023-52676,0,0,b5052d896eb6aa3d40bebd3433cbef1dbf5fef6664f492860c3bbc035891b00b,2024-11-21T08:40:20.363000 CVE-2023-52677,0,0,d53f7966a67dc8554bfd32a310b11c4d3cfff4fd17d44d1d08dc29544085cfab,2024-11-21T08:40:20.473000 CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425db4,2024-11-21T08:40:20.587000 @@ -241380,12 +241380,12 @@ CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a2 CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000 CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000 CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000 -CVE-2023-52686,0,0,4091afd065da811843960ad74dfced36b3ea70c8dc11de2e7a54242d21add622,2025-03-04T16:52:19.553000 +CVE-2023-52686,0,1,2967631abd85118e309062a2fec3cd903dc46da14d20c822a6e8aab5b950eb52,2025-03-04T16:52:19.553000 CVE-2023-52687,0,0,bbc8fc1dedb818bce118b2c7db04aab7b8059594413eb22394ab804738b96713,2024-11-21T08:40:21.700000 CVE-2023-52688,0,0,9dc230fe3db4a9be36210348538add296ace0ab48c31cd4e90194d9bd1a909f0,2024-11-21T08:40:21.923000 CVE-2023-52689,0,0,790089ccb5dbca94271b582a4ae66681f2a34b377a106c082c546248aa1dbe89,2024-11-21T08:40:22.033000 CVE-2023-5269,0,0,62ef4056afab45d0c95a031eeec681aea89f1a71d3adae5c7cfd3da3f7ee0ed9,2025-03-06T15:15:14.830000 -CVE-2023-52690,0,0,6cfcd65263ee0eab387b20c70ff3b6607f3721817ed8d0c8c74291958927be18,2025-03-04T16:50:52.247000 +CVE-2023-52690,0,1,275d83b6f3319b812835c495c9bc88546797eac06dae130e2577695da804d2cd,2025-03-04T16:50:52.247000 CVE-2023-52691,0,0,a64baa25fadffa1557a15dc817d7f8c834b516c14cdd512d500df9f6752c0946,2025-01-10T17:59:11.383000 CVE-2023-52692,0,0,35e83f69530051d0eafe3b62cf812c667004e80a63c768d5530a91d5f9405ce5,2024-11-21T08:40:22.410000 CVE-2023-52693,0,0,d1af7447a1f225b1702522258cdac1a9c0485e5f768f8d09ab764c280d778ee9,2024-11-21T08:40:22.523000 @@ -241444,7 +241444,7 @@ CVE-2023-52741,0,0,e094cb6d7949e9747b892e241771f0453892c45a739ad5b8d158747bb6e06 CVE-2023-52742,0,0,dcf30954d8fabdab5fd680401ef1008be31a6a0cfb68e9a64806fc115f0213b5,2024-11-21T08:40:29.373000 CVE-2023-52743,0,0,24474008a2d4a403beada0f7d4c53935aab14c11f5c2d46143b8959c21bd597a,2024-11-21T08:40:29.513000 CVE-2023-52744,0,0,7a3a1b5b261511bb66fcf29aaabee541486137c90ee2c22ba6c248ce3835f026,2025-01-06T20:40:45.057000 -CVE-2023-52745,0,0,b1db8b00eafc38d93e10c534cfa276323784119100d0704aa10ce64ad86e7892,2025-03-06T12:57:29.920000 +CVE-2023-52745,0,1,82529ff17d754b89f49938a691d8093b057049a5425b9011e4f4e858a5ef0ef9,2025-03-06T12:57:29.920000 CVE-2023-52746,0,0,d1866783dbdab5dcd64ba170e432702cd603886e3f1568f8fb4be3a6a56f37ee,2025-04-02T14:50:27.237000 CVE-2023-52747,0,0,89a1a7bcc5367ff871cada9f72228e4bee14cd524a7a7ce281e3ad78d5396323,2024-11-21T08:40:30.097000 CVE-2023-52748,0,0,2b830ddfbbba0c67aa7dbe55dc7af2c2e0c7de4c1479e35323f1e39833c237ea,2024-11-21T08:40:30.220000 @@ -241498,21 +241498,21 @@ CVE-2023-52790,0,0,cf29a624de21cf22cc512d40f0a593951c8cd9239711d0b8442ff032accda CVE-2023-52791,0,0,be484a6e97e5a1fc91f5818964596896eec93bf44f2a3ba3ebb847d5e9c824b0,2024-11-21T08:40:35.750000 CVE-2023-52792,0,0,2cc23cf56cc94d378ac71d87d803d2cb686a46236118e6b58b26100b7927b4af,2024-11-21T08:40:35.870000 CVE-2023-52793,0,0,1deada04b9b58b9a08cdc8b4e56907afa2f473e86ceaaf1b863ba75e6bd438dd,2024-05-24T05:15:08.403000 -CVE-2023-52794,0,0,ea393b2b5fd51632b132679d6588608aaa6c300baec25dc4188382cda270dc66,2025-03-06T12:57:21.027000 +CVE-2023-52794,0,1,035c8e0a2455620c9e4c5fe80ad3e4b38488dd3ae85fb2aca4bbf25c6f311736,2025-03-06T12:57:21.027000 CVE-2023-52795,0,0,4e485f41269e4ca02c2bb151f581018ee7564bf7c1a16986ad072ba672d15994,2025-01-10T17:59:58.747000 CVE-2023-52796,0,0,919ab49a1f7e861a493c89fa6e458020589d307e7c501ef2a28fc7f2409c4699,2024-11-21T08:40:36.233000 CVE-2023-52797,0,0,a8f1fd2b50ee0014f6c08ba16dee5539f5b8b20b0a40b1a44d6ff84573d23ca5,2024-11-21T08:40:36.360000 CVE-2023-52798,0,0,d38d76f222547d1a0a81b7eef6ea8a69a7cafdb743d5e8b801a2f120db28cab9,2025-04-02T15:02:42.717000 -CVE-2023-52799,0,0,18288670c0cf1dfdf71efd06f9ac08d2b7e5c8e15d91cdd23cb5a4c91ed8c22e,2025-03-06T12:57:08.793000 +CVE-2023-52799,0,1,e8a25400dab21e81dd518646afec3a3b645e77d480d66026ed2aa2f259fc3f49,2025-03-06T12:57:08.793000 CVE-2023-5280,0,0,0e31d757c38846a6f016aa4d2a0c766d9c944cae8392888fd9d4cf58ba1afdfc,2024-11-21T08:41:26.490000 CVE-2023-52800,0,0,a5e2937a620959608b4be345258603d10f5d86b1a66ae7cb82a2e09c8e03944a,2025-04-02T15:02:30.070000 CVE-2023-52801,0,0,5b98dabb91a64996963e5703242beae9ff05c68951d10e0b6e5aac9a17b65751,2025-04-02T15:02:19.823000 CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000 CVE-2023-52803,0,0,ca542d715af19bc455d62c41688c3fc24d4ece330c1660f25b0f2926b8cdad17,2024-11-21T08:40:37.290000 CVE-2023-52804,0,0,f63595acad5f021611a295b0c2137b6f281e5bf0a3b7dab20aa319bececcb019,2024-11-21T08:40:37.423000 -CVE-2023-52805,0,0,1dc852a8feb9c9f2c8a62b76a178d1a4041f7002bf7546fca113ff4124f9b384,2025-03-06T12:56:54.893000 +CVE-2023-52805,0,1,f7e320f9e19ca8544834202a6f6e235a568e3fab37596e9154416d09ff8129e0,2025-03-06T12:56:54.893000 CVE-2023-52806,0,0,fb65670f4d45809f58388ae1354ca1aa5879a8eee50756f04297590c93c61e8a,2024-11-21T08:40:37.667000 -CVE-2023-52807,0,0,0c46e863d9cf824ecd24314d253f92e76f2d2c228250bd95f3e5a1b5bdd5221d,2025-03-06T12:56:47.173000 +CVE-2023-52807,0,1,634f806fb5c1ac9c39963c0ab8c38cac69de57b27e72895e42738048691b7d1a,2025-03-06T12:56:47.173000 CVE-2023-52808,0,0,efd8d7bcb58f484b4b5e80898bd3c70762a13bd27971c0de98e557ec212b9f08,2025-01-14T16:32:53.767000 CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250bea47,2024-11-21T08:40:38.040000 CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000 @@ -241556,7 +241556,7 @@ CVE-2023-52843,0,0,d4f8bad35cfc21198f623b7db2be9e3dbf34745d3917a93a4d4c5fbf835e4 CVE-2023-52844,0,0,a7e14a9daf532eb5868d474d0f69d549ef8a094b4b2cb485a154c50d56936967,2025-04-02T14:56:36.550000 CVE-2023-52845,0,0,78076631f2c09e54b6918ff3820d4529f731f58b0a27735f2f430100b22df27a,2025-01-31T16:01:53.260000 CVE-2023-52846,0,0,80f2f7dbfdae0a1a37b9f3fe596676b4039695e57bc05e9b354f71e673c3943b,2024-12-31T20:00:30.687000 -CVE-2023-52847,0,0,8625e3663f101fcc3d48deb83d285dbbe99f4762360f5fbcb218b67bca2eaff7,2025-03-04T16:56:08.263000 +CVE-2023-52847,0,1,849f1f9c4c41addd5f9b720cf9d247baa4f47fe47943126d2667167e1a11e37a,2025-03-04T16:56:08.263000 CVE-2023-52848,0,0,459d324dbed98e7d46524ff0a5f74b9fe3a0775dc447bf711ba4b82011689cb1,2024-12-31T20:02:14.890000 CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000 CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000 @@ -241590,7 +241590,7 @@ CVE-2023-52874,0,0,00067276cb2812ff1d5d476327c93881ac0bc244cd0e16cccb0099434a630 CVE-2023-52875,0,0,78e33790aecd03a18997e6ce86f70a3b0359661e774eb191ed7e9bce65bec32d,2025-01-06T20:31:11.200000 CVE-2023-52876,0,0,0fe2a2041c56729ef164497ed0e5be99079b82c47eda1bde670e60b59d971aee,2025-01-06T20:31:44.213000 CVE-2023-52877,0,0,e88869d2a35190a68a5dd82409da20f8164374740684841b6ca39a4c084d7242,2025-01-06T20:32:18.993000 -CVE-2023-52878,0,0,799bed0082ac8bcd022f726500fe178dfd36ee9c2cd7563313138dfbb129d973,2025-03-05T18:54:43.777000 +CVE-2023-52878,0,1,44ec3920910d7cac93b0eaf3f92844da19a70768eb62016efaa9c526ae30159e,2025-03-05T18:54:43.777000 CVE-2023-52879,0,0,f4c534e013c031ad7d15df3ddad81f924f343df8401142d197ba3a5f481b60de,2025-02-03T15:46:08.837000 CVE-2023-5288,0,0,1d6e77372676e57c617889ffeb07f469824d9531d0d1350af6f8e45c46f3e22d,2024-11-21T08:41:27.523000 CVE-2023-52880,0,0,113f8dda8cd8b9846d9f1e2d1ed597fb40cac1e992da503c15f94daa1440d958,2024-11-21T08:40:47.160000 @@ -241642,26 +241642,26 @@ CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052 CVE-2023-52922,0,0,c0c533cab1b890c9ddd28104b3c93f77ed438991aa0572993808fb23246bbb63,2025-03-24T17:21:19.630000 CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000 CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000 -CVE-2023-52925,0,0,088a6b192a99865e539f8003179173ecf52f00cd52002c4bcc1210ba554f49e9,2025-02-06T16:15:37.110000 +CVE-2023-52925,0,1,913a1c75266762e86fa810543dcd45053b7824d7b7a27b83434c6ab1f48065ea,2025-02-06T16:15:37.110000 CVE-2023-52926,0,0,be726e8d867db0398655760a18498bca2c5b3b4ead0174d43085d3d2d828a6b1,2025-03-24T17:34:43.630000 CVE-2023-52927,0,0,6d599dad365bb7e67f673438af5dfa372d487d4eb250bc3e17972f667f082b77,2025-03-14T15:15:39.253000 -CVE-2023-52928,0,0,fd04e0dcb79d6542d69730389ffdb9bf7fd57244deb4b099ab5fcb78f079135b,2025-03-28T18:11:49.747000 -CVE-2023-52929,0,0,b44f4e9045a3182024d5d4876596bf536e2b0159a4d56993c6f7d4fe50ea66c4,2025-03-28T18:11:49.747000 +CVE-2023-52928,0,1,ab41d1474724aac9d8eabbecee59fe151fc9acd4b3d838e1cf4fdbab0e5d75ff,2025-03-28T18:11:49.747000 +CVE-2023-52929,0,1,7ccc3e81150553c31bfb0f821a37879eef8bcfb2d942d3b02254680021b3ca3c,2025-03-28T18:11:49.747000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 -CVE-2023-52930,0,0,cfdecdcf337d0f08c3d2c271231317f2a67072546850b538bc9d618dfb3dedd6,2025-03-28T18:11:49.747000 +CVE-2023-52930,0,1,09834934adb38fd030a4dcce207c01a5b6bbcac95df71f7d9d55036525ea8631,2025-03-28T18:11:49.747000 CVE-2023-52931,0,0,ca733bd12b5408ca8f62c7f49ef90e771226676884c3e4f6f6ee0fa23ad6d5ee,2025-04-01T15:40:49.540000 -CVE-2023-52932,0,0,370b17f77cb39efd72a19ee329a524793f8a80bf15b720bac1cb29e8861e6e37,2025-03-28T18:11:49.747000 -CVE-2023-52933,0,0,a20a3dddeca045a923a4c02d184cb23431fa0cc34e9ceed48c440aafee9a9b3b,2025-03-28T18:11:49.747000 -CVE-2023-52934,0,0,5598664670e3c3effcf56032db22b3628c4e49911b18f2b0b55951d32bbf38be,2025-03-28T18:11:49.747000 +CVE-2023-52932,0,1,0eb0ddda79e82551ac3fd901438a4d335745cebe59ab9f4fbd9739382114cbc8,2025-03-28T18:11:49.747000 +CVE-2023-52933,0,1,ad5cd297e29b7f18a95c513aa72648170a5c47efd5fbeb941f109799beb02dcc,2025-03-28T18:11:49.747000 +CVE-2023-52934,0,1,97cf60f329c8e96b86d997666cdee894d18ef39393a0cabc2d705e915ee27dde,2025-03-28T18:11:49.747000 CVE-2023-52935,0,0,7bea53668c12a460ec325707edfa430fb2755c80873f5262903ca9c5ad64c4c3,2025-04-01T15:40:32.503000 -CVE-2023-52936,0,0,fcc4ff10e778e88beb53d5a96307c574a7302722bb50064dc5d95e842b545b9e,2025-03-28T18:11:49.747000 -CVE-2023-52937,0,0,edecf32479212ae3c52684d3962c4e9fc6e3db6d7456f0de48f6d9331d702f65,2025-03-28T18:11:49.747000 -CVE-2023-52938,0,0,a0558123ce2f4938b96bce1e6f10581df6168e04d84d18a06bf35ff921eb8957,2025-03-28T18:11:49.747000 -CVE-2023-52939,0,0,1c9431de34c671c04f83dea8cfbb8e2bb6c6e1f361e65964c6cae310811cb2c4,2025-03-28T18:11:49.747000 +CVE-2023-52936,0,1,475e5d904f614f3a3d7ca5ae9f0b52f0fab4c3488114c7f42da0bec80102cd8e,2025-03-28T18:11:49.747000 +CVE-2023-52937,0,1,c30e9cd8b8bebeb8e191f6b5a7486154ea51eebcb8d93e8d1d20138a363cebd8,2025-03-28T18:11:49.747000 +CVE-2023-52938,0,1,1b79a3e0fd90d5c458092cfb7a761cee624ac1159964dbc647f4102f339c3b30,2025-03-28T18:11:49.747000 +CVE-2023-52939,0,1,773e199a66c37498240ace29389128ee8e0a19ed01a108192ef8308d5ff4307f,2025-03-28T18:11:49.747000 CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000 -CVE-2023-52940,0,0,9730fd09dcae621a80cd157d6ea6261991ecd9c88e1df25f3616d1dc50cc697f,2025-03-28T18:11:49.747000 -CVE-2023-52941,0,0,f5164ac4fd6a0cf4b87cae13a034df783e8bb99774f33a775fc41bdf73e304cb,2025-03-28T18:11:49.747000 -CVE-2023-52942,0,0,8b408a19550a3a5956b490982d0c991d792e6d649f6a73c182cf28cec2d73fa5,2025-03-28T18:11:49.747000 +CVE-2023-52940,0,1,c131d3a4619c764c9496cec9d021aef44739c6482b83bf4ae3061c0fa0babfbb,2025-03-28T18:11:49.747000 +CVE-2023-52941,0,1,439d0afd2ed070915fe56232ad14113726ff36eaf0915e4987a90869844af791,2025-03-28T18:11:49.747000 +CVE-2023-52942,0,1,9e761188624e494c36cf8f95252d52a092a6c47d36b20c237e04348c5b3dc7e3,2025-03-28T18:11:49.747000 CVE-2023-52943,0,0,6423f6a2f8aa2ee58556be17eceeabb16a6f60da2cbe4a29762953967a650132,2025-03-06T14:29:59.667000 CVE-2023-52944,0,0,7b3d195a5668ccb86b9de6bf2d56cf53d760b3892fffb5d541e08049bc5ec546,2025-03-06T14:30:43.413000 CVE-2023-52946,0,0,3d7aae165a174e48796900810af5199f23129c11121058d52b8cf76c8e8211b0,2024-10-08T15:55:07.543000 @@ -241684,70 +241684,70 @@ CVE-2023-52972,0,0,1cf4b1c86703527c5d3c02f6c9d59b9f14aed17c7f7e4b91cf714bef12b4f CVE-2023-52973,0,0,0fe2fd288e78183a3601d2a03b9d70c5ae5e43872c0622436710844fe17b2d00,2025-04-01T15:40:21.587000 CVE-2023-52974,0,0,d3ffd37eb98d59e7ba7e7ebb477271007f182f3ed0edfee6fbec907bfd78eeb6,2025-04-01T15:39:48.477000 CVE-2023-52975,0,0,d618879d4658767443c6c40cc8b0f21510acd82494ef8ec138beaa1743320c74,2025-04-01T15:39:59.800000 -CVE-2023-52976,0,0,64436742b96ad0b58bb9c101fb04cc408ec4141b7dc6f720555b0b573f8c354b,2025-03-28T18:11:49.747000 -CVE-2023-52977,0,0,067ddfde391540799c5b24c18b749cfd2619c2e24f2b287c22b832d2f0ca26d2,2025-03-28T18:11:49.747000 -CVE-2023-52978,0,0,56b1606540d4bc8e5de969f92b378aedd30c30a22d25ec2b7d1f3c25ac32ab64,2025-03-28T18:11:49.747000 -CVE-2023-52979,0,0,14693e2bda9d67172ec1238cb2602c118cc0aa6f30adec460416a9a48a53a588,2025-03-28T18:11:49.747000 +CVE-2023-52976,0,1,acc3e06ff1a1a9bdf6f27433e5ed70c124c400249f47579bc68259d18fff65cc,2025-03-28T18:11:49.747000 +CVE-2023-52977,0,1,c2f3f81d2ff843b5cf37ee54a2d99399ca56004d27c33bb778fa4685dee6b180,2025-03-28T18:11:49.747000 +CVE-2023-52978,0,1,77b0cb5de08f94ad239e099682b04398891399657d913ae7cf767edd81d6c9f2,2025-03-28T18:11:49.747000 +CVE-2023-52979,0,1,d68126e43962e9e8bccb17294759c8c61896f05995ab9c5f20bb38081595b8e1,2025-03-28T18:11:49.747000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 -CVE-2023-52980,0,0,d60ca9e1c2f3558f7f5324822c42bcbe8d2405428b3a0ff63a9901753d650fdf,2025-03-28T18:11:49.747000 -CVE-2023-52981,0,0,f9e19988e8d7e0e2b7ccad7123cbb5c36ec8433017953cb6b3122c84431fb381,2025-03-28T18:11:49.747000 -CVE-2023-52982,0,0,789f04c8978c6fd412f262cfec4560edc4cd77d5e5c1d986c3b586f8b80a02d4,2025-03-28T18:11:49.747000 +CVE-2023-52980,0,1,4641100b19aa28664d8b14bbb512164aafcca33a6f1cdb080c45653f95d87360,2025-03-28T18:11:49.747000 +CVE-2023-52981,0,1,f164a1046931069724d8fe6fa7ada00d7f4d44532953117d1bb939b180055dbd,2025-03-28T18:11:49.747000 +CVE-2023-52982,0,1,30c98da5b0d3cba53b29617cc14d1f3d3c24d3b6ba8bed093e2ac4772c7f7f5a,2025-03-28T18:11:49.747000 CVE-2023-52983,0,0,589747902ff20f77b06b594451f17383b3ae83a76bf4635803941881fca95b56,2025-04-01T15:39:39.127000 -CVE-2023-52984,0,0,fddafed66c7fd36c6ca5c7582564e857b0f2d1c5a2aa8b9095536e3c6aed5e59,2025-03-28T18:11:49.747000 -CVE-2023-52985,0,0,d2aa499774b0e3b68420b54d00e6f2219687cb2513fa5e4f3c209634fa5118d1,2025-03-28T18:11:49.747000 -CVE-2023-52986,0,0,7b3277008e4fee0a56e33916a5c0942a48d7619f41c6430571f77e622b076098,2025-03-28T18:11:49.747000 -CVE-2023-52987,0,0,90b209f0af8159d18a9f73b1cc144198e9548fa6f54ef2ca6897b8ac97bd2773,2025-03-28T18:11:49.747000 -CVE-2023-52988,0,0,e0b66590fd9ae4c681a2485aba9ec5964d2221ecfeed83d63db0e7f556439808,2025-03-28T18:11:49.747000 -CVE-2023-52989,0,0,52a88d9d88db16189a3f69a38893c55ac55613fcdc3f5c40a2752ad8dd4628e9,2025-03-28T18:11:49.747000 +CVE-2023-52984,0,1,058fcd40cf3f5cbbfbd88372c7ba4e760b9d638414b92a1b4251307b5a6d62b4,2025-03-28T18:11:49.747000 +CVE-2023-52985,0,1,226cdefb815da7db873f74254b5de46e04e0673ae055d0d4aac4ce9242239d24,2025-03-28T18:11:49.747000 +CVE-2023-52986,0,1,c90d00ebfc7354820b87326a8a7a883b6611f01676e8f7c32b1274f69b27addd,2025-03-28T18:11:49.747000 +CVE-2023-52987,0,1,c5e1e9f3b4e5fe67de08b148568be5c92affb2fd1a5ecd2260dc7bdd81bd3c7a,2025-03-28T18:11:49.747000 +CVE-2023-52988,0,1,64974c0e7116817a170649f5c06164984dfa6a514119a092233572ba804927f3,2025-03-28T18:11:49.747000 +CVE-2023-52989,0,1,479a6bd99a95c4262fd5f1fcf72e2bf572d7c819f3f994e80c5395b0ea10a548,2025-03-28T18:11:49.747000 CVE-2023-5299,0,0,d1a3f4df2181486873f0f83a21c7898914e70351cf79e1f3914b8afd11231fe5,2024-11-21T08:41:28.867000 CVE-2023-52990,0,0,bb86c04e0fc6e8f16463f6cafa01725a0b0f51546ab456c5f8442e81f7a8d739,2025-04-01T15:15:59.383000 -CVE-2023-52991,0,0,048a7057cd7a284d8bca35cd3b2a3f40692afe566a4f7c5784d8c6ed051c0c3e,2025-03-28T18:11:49.747000 -CVE-2023-52992,0,0,fced4e785d770c6d64a7aa770d24a4d0a42a321dc37a1c0180352e31931678aa,2025-03-28T18:11:49.747000 -CVE-2023-52993,0,0,e56a0c915faa353cc36fa3a44f618957120207496fd8e6ce53a6edf16c3bd918,2025-03-28T18:11:49.747000 -CVE-2023-52994,0,0,6f8e3973ab0c75e6f99a289a7fe6e5a370370bc0d6e061c2dcc1c6c87f2f5e39,2025-03-28T18:11:49.747000 -CVE-2023-52995,0,0,3450be16e743c7320484f99fbaaeeafb2b5db29cb85733df26ea163211a8c43d,2025-03-28T18:11:49.747000 -CVE-2023-52996,0,0,05250bf7698095c786a364ca7e7ee393c6c9200fd8c0c4ab06d9c65397e702a0,2025-03-28T18:11:49.747000 -CVE-2023-52997,0,0,b8592e8dad2ad2c4ca7984eb743ebc6880c883e1b5ba2232a93b667958d88b9e,2025-03-28T18:11:49.747000 -CVE-2023-52998,0,0,8a0e0141861ec02ce8cb1728b2beda1dfd72f476928974191168865ce8b01c75,2025-03-28T18:11:49.747000 +CVE-2023-52991,0,1,969f5c2d254a94151aec5732b8f284be0e4ac0fef7a984dc510ae1c3aea20012,2025-03-28T18:11:49.747000 +CVE-2023-52992,0,1,c10beb5dad054529a1bfcf777e18a3364b62d2d3d34c8cee7b0bde0c7b9efca8,2025-03-28T18:11:49.747000 +CVE-2023-52993,0,1,9b978b95ccf4d09e2dd526455fffca799ec2b5eb7e8fd4f8da061ce66bf07764,2025-03-28T18:11:49.747000 +CVE-2023-52994,0,1,1ff75977c8005f5c821641a722ffa9fb7e13762d8d91bc73a2f067bfef251688,2025-03-28T18:11:49.747000 +CVE-2023-52995,0,1,be59423b474dab9a548901acdba1c9354d6cd0e532291be4400cfe7c2c117071,2025-03-28T18:11:49.747000 +CVE-2023-52996,0,1,8a3b0d579293ac8d91183c568f373bb23e6e195adbda62b02973245a2dfffdd1,2025-03-28T18:11:49.747000 +CVE-2023-52997,0,1,95059563c41567fdf46a18dfe26049f09ae675a993cdb591d493cc6f08bc0bfa,2025-03-28T18:11:49.747000 +CVE-2023-52998,0,1,75089c9cce4ab3a0c18e717f81c57bfeb3714e401d0eeba4fcf460e613486b87,2025-03-28T18:11:49.747000 CVE-2023-52999,0,0,c47c5a7c7e0867204a05eeadf8e47e4caced899fb5b574e54b5be52b7bf70e91,2025-04-01T15:39:31.593000 CVE-2023-5300,0,0,eada94012fd708691ea3792cf6b054b3ad0de381a1556cd7e6c92c322c4e2e74,2024-11-21T08:41:29.013000 -CVE-2023-53000,0,0,9632b5437a33639ae5bdea166da0b07c486d69e261f4dcbd9eb8e726bab419fa,2025-03-28T18:11:40.180000 -CVE-2023-53001,0,0,a91161d1d506fb79f132835e65e9ab3e814b9a3118579f2149bff2b237603da2,2025-03-28T18:11:40.180000 -CVE-2023-53002,0,0,adb4ee1b81733808605e3ffcfe378f16378eafcd3e2be3a301e7a44c4ed2100d,2025-03-28T18:11:40.180000 +CVE-2023-53000,0,1,f59a8829a0ccdcbba3f932cab51fb0ea041b6e33c5c5d1c4e5d3c39cf4819256,2025-03-28T18:11:40.180000 +CVE-2023-53001,0,1,b6a903678c1b07275058a848f4e00b15a6dce8055208937f5a7bdb77b3824b40,2025-03-28T18:11:40.180000 +CVE-2023-53002,0,1,149ace9711fb7a1a600c8ab21fb921a335ea7079aaaa11b492084879e805ac82,2025-03-28T18:11:40.180000 CVE-2023-53003,0,0,73c428981fec29e4a875e87a912f01ad567ecc171414dac96d09c1ecd0eb315f,2025-04-01T15:39:21.640000 -CVE-2023-53004,0,0,747c2fc71fd076591cb55efd0c17065728d9f6d253331173dd18772533c99469,2025-03-28T18:11:40.180000 -CVE-2023-53005,0,0,60734d1ae84b8caac0fa6dbebc943d89c43bed998836117cebf0b3578305a9a4,2025-03-28T18:11:40.180000 -CVE-2023-53006,0,0,eb2d1df964798c37801c9c6d1bcac92526e93a19d7995566ce15dbd221352d1b,2025-03-28T18:11:40.180000 -CVE-2023-53007,0,0,4d00aafb2f538366bae683c0de0bb46b6e0c8961b971bc3896fbc43391c7f256,2025-03-28T18:11:40.180000 -CVE-2023-53008,0,0,f49c69f7fa7758e097573549692a81d4f33fb9b90feb8a2063eee115b1254af8,2025-03-28T18:11:40.180000 -CVE-2023-53009,0,0,5d734ebd5abe25488f8953d3a92e71e20b187943f24aaf46dd7d36bf0fda14f1,2025-03-28T18:11:40.180000 +CVE-2023-53004,0,1,d6197bc4698b4ed12438c065d82a268b1221c7bc349e000c57f9a68376380897,2025-03-28T18:11:40.180000 +CVE-2023-53005,0,1,f111c9c7d3a441977e100c0fc8ad8f1544094c5eadd70cf60523e8cc9224585c,2025-03-28T18:11:40.180000 +CVE-2023-53006,0,1,4a8069a0acde5f74bbf6393525f41d070305ba246b0b479b4e3579c4f137d925,2025-03-28T18:11:40.180000 +CVE-2023-53007,0,1,ae4fb5367fcd4453e3edd834d39577a94df4f6c7b07e41d165d235d42a84b652,2025-03-28T18:11:40.180000 +CVE-2023-53008,0,1,d53d0e7b00a4f9a02677da5fc3adba8a7c874f062c6dfbb410a4afecea8582dd,2025-03-28T18:11:40.180000 +CVE-2023-53009,0,1,3c3d7127a4a46f0d1a90e872d760d3bb8bc72b3acd9230099643ad3464010d7c,2025-03-28T18:11:40.180000 CVE-2023-5301,0,0,ac60950f86a7eeae1a1ea58a38a18c6b554295268d2845c8bddd96b04d5ee196,2024-11-21T08:41:29.153000 -CVE-2023-53010,0,0,91507a5e4cbaf68f5d87fea97214ae0b28293d8b322e6de90cfe985a3aa2425f,2025-03-28T18:11:40.180000 -CVE-2023-53011,0,0,a73d91b3f8742ec06014a262ffc3d216e08e9c88b26a659829a02f25c9d0932a,2025-03-28T18:11:40.180000 -CVE-2023-53012,0,0,30b63ebbb89e30515fa2c8fe6eacef670536a885cf4d40e1e6bfaa9ba60f1081,2025-03-28T18:11:40.180000 -CVE-2023-53013,0,0,3a2efef3d99c26af70fb411c08d0ec340fa36aa8785a6d4c87dfd91b07247e74,2025-03-28T18:11:40.180000 -CVE-2023-53014,0,0,48ca1d725018c220cef9d465339aec8b747846d32cb76e114ef07316606c3e24,2025-03-28T18:11:40.180000 -CVE-2023-53015,0,0,01410fc5864a732e2c49eda128e83b2824d5796c5ff82b46cddb164e966dccd4,2025-03-28T18:11:40.180000 -CVE-2023-53016,0,0,d233a3222801e22b704250914afeb20e53d024261de448a206f4914dca110fda,2025-03-28T18:11:40.180000 -CVE-2023-53017,0,0,5d0e1c91de408010f7cf86ef0ca89052d4765e5ec36aabf4e8a05f99c9bf9fca,2025-03-28T18:11:40.180000 -CVE-2023-53018,0,0,bfa1e1bc5aec93a63ecca26a0c2e2fe472bdd7dc63e24e269eeca6eb09d0df52,2025-03-28T18:11:40.180000 -CVE-2023-53019,0,0,0a11f24c3956b4106c3451c938f6e774614a6b166350e77f8e081f04d2201f24,2025-03-28T18:11:40.180000 +CVE-2023-53010,0,1,8be5c56f20098173b08c1945530ce299aaa2141d1e8686a29170788c825b669c,2025-03-28T18:11:40.180000 +CVE-2023-53011,0,1,fee293ee44d6923ccdc679cdb6da09dc1afe89bcb9e196ce392fa4c63ceac548,2025-03-28T18:11:40.180000 +CVE-2023-53012,0,1,20db874967f2e2a35cb541dd77c4889068086af85346455691ade5b530584b7b,2025-03-28T18:11:40.180000 +CVE-2023-53013,0,1,503b1b6e5dab39faae3d979422b5d716ae58d130377076618a92ad21b83ec26e,2025-03-28T18:11:40.180000 +CVE-2023-53014,0,1,5f467d3ba47a4bc2f09b6589abc4d1750c4de18089ca2b13741436131ae9ef9f,2025-03-28T18:11:40.180000 +CVE-2023-53015,0,1,07cf7d7a63758ef810fdbc76248839bf67d131bc78edde2655da25f67b61d439,2025-03-28T18:11:40.180000 +CVE-2023-53016,0,1,2512372ab22486c40c6c0f1047c08e62270c0b5f3cb1d9f14b9134d81bfebf26,2025-03-28T18:11:40.180000 +CVE-2023-53017,0,1,da443aeedb10aa3326e0d40499bd6801ba1fe2c53a937b4323434aeea7e33d55,2025-03-28T18:11:40.180000 +CVE-2023-53018,0,1,fd874bda9401d213512d4e5ac34e3a74f80f5dc1f09eea930f78ca2bd714bd05,2025-03-28T18:11:40.180000 +CVE-2023-53019,0,1,bc78062ebca534ea96cdb0db4033c76b947a55aafb57566a42238f13b52cba25,2025-03-28T18:11:40.180000 CVE-2023-5302,0,0,0b22a053fce6deed6d5e5a202f69ebfca3fc6dde094fa45bdf36b6adb6a02384,2024-11-21T08:41:29.287000 -CVE-2023-53020,0,0,e54ff8548cf1035ef6ecacbb8368f3eae9eef5e48c304e8e5677b9d7a966e873,2025-03-28T18:11:40.180000 +CVE-2023-53020,0,1,66eba5ebbf33ba537984c4d7ee0bff26cce3863e0dab195dce672058f4d94b4b,2025-03-28T18:11:40.180000 CVE-2023-53021,0,0,d18203a7515a18eebf7e570fae00e8582c48864cd56b806bca0c6c2b0456019a,2025-04-01T15:40:10.120000 -CVE-2023-53022,0,0,3da2004e6a7bab3d973e8fac0e8f8514f68935a9edc12db49a84bf835c305b9c,2025-03-28T18:11:40.180000 +CVE-2023-53022,0,1,12958609399e70002b3aabdcf38f67e5c5a137c7b72dbfaed1fc50c7f5fb8524,2025-03-28T18:11:40.180000 CVE-2023-53023,0,0,ad0ea17b988c0681c23b9ed73e004750d32fc4e5ad9e2327fb070aef9e1c299a,2025-04-01T15:39:10.740000 -CVE-2023-53024,0,0,64cdd18d0a37f4c77c346e6cc228790b28e9bf0c883eea0f518f78509767bb67,2025-03-28T18:11:40.180000 +CVE-2023-53024,0,1,d83c79a9e188befc7588e03155f005f9f9f2f2f79d0e6ca341644af4842597ee,2025-03-28T18:11:40.180000 CVE-2023-53025,0,0,efe3474accdea92345a2022672c62759bac3b200b8dfffbd0c62ed08000e6db2,2025-04-01T15:38:53.187000 -CVE-2023-53026,0,0,62f95c0d26f996360adfd89d95c5a590b84232cb52dbe3d771dc87df17882c21,2025-03-28T18:11:40.180000 +CVE-2023-53026,0,1,e4b364e95a9206cba4159d4db47f37733a5d7a4bfb01b7a58bce80777a38ddf7,2025-03-28T18:11:40.180000 CVE-2023-53027,0,0,abe52dfb43bbd686e3fe35e91f50766f811247cd5855fb2a0edd84ee7dec5768,2025-03-28T07:15:37.860000 -CVE-2023-53028,0,0,b723131ca32130b6d751e61037574827f34459d6ba0f1feae02cf3a18aec9f8c,2025-03-28T18:11:40.180000 -CVE-2023-53029,0,0,8271d5c922bdcee68062f4e5cad31b86872ea6d15aadbd3c11eb0d5ae5ed675f,2025-03-28T18:11:40.180000 +CVE-2023-53028,0,1,4f57d054ace65ed0fb085a86a53547f27c6e6ca3ce3ea89c04b87d935b0c7d97,2025-03-28T18:11:40.180000 +CVE-2023-53029,0,1,57851a20a611c1aeefdd45aa9d18f37f4985fdfd202db3c5594a7dce60b632cf,2025-03-28T18:11:40.180000 CVE-2023-5303,0,0,1fd7805db54c4356f03291c90e402ea807b85aec18298fa337830f7108304fe4,2024-11-21T08:41:29.423000 -CVE-2023-53030,0,0,788038f29754934cf8a7d107b1e863282abd843e488e93ec458788e41ea43e25,2025-03-28T18:11:40.180000 -CVE-2023-53031,0,0,35e817a29aace85e68206dec7c3d140600a84fe28ddcc7db662b6885e5e89dc5,2025-03-28T18:11:40.180000 -CVE-2023-53032,0,0,07dc07bacaad15a9c2642a0e9a655faef0b056d73b290ab0d482fa8bca1ebcce,2025-03-28T18:11:40.180000 -CVE-2023-53033,0,0,b079d88687802d1434f03552f891cde7060dd97b0716879386756e7b1455ca6a,2025-03-28T18:11:40.180000 +CVE-2023-53030,0,1,7320bc84c92d9cd5305cb9754d3855bbc3a7e674b5b3eb1dc52e95195833c936,2025-03-28T18:11:40.180000 +CVE-2023-53031,0,1,451f86f2688662f26c32d2314d26df257466645907dd1d2b936cba64435fc9c3,2025-03-28T18:11:40.180000 +CVE-2023-53032,0,1,93ff98cea1dccacd110dbd1baf1362d079a1c6c42ed51d528b776f30ae2b7a78,2025-03-28T18:11:40.180000 +CVE-2023-53033,0,1,8d057d9c44ce98261c228cb81506be1f3f8f50bb5bf9b573d71aa33383f2883c,2025-03-28T18:11:40.180000 CVE-2023-5304,0,0,0c927516ecfa012da696090d08f4ca4cc85e3e04790de8eb26a492ef0f0f359a,2024-11-21T08:41:29.560000 CVE-2023-5305,0,0,a8016335a5ce7a2f26964ae5271ac31340d697aa75d3cef2db4225bce24964b6,2024-11-21T08:41:29.717000 CVE-2023-5306,0,0,476b3821b61b469afa7b1ea84617d24f0cc2f50c242f49afe4eefd5e4bb959a9,2024-01-02T16:15:12.483000 @@ -242238,7 +242238,7 @@ CVE-2023-5821,0,0,ecb7244d5a986f4d473fbca5b69327d65abcfb78f948cf202491660920dfdf CVE-2023-5822,0,0,8c8e1857ce4331d0c9f44b86c9674bf6266bb147bdf9707c799089e4c16a943b,2024-11-21T08:42:33.790000 CVE-2023-5823,0,0,6505dbfae39f989a655be0e6df3a3e1eddc5fff6958444be63dd993457afb38a,2025-02-19T22:15:22.040000 CVE-2023-5824,0,0,3e276b346e3abdc1f056840a28085adb6ff0c19a2603135bc4c3cbdc1391c029,2024-11-21T08:42:34.053000 -CVE-2023-5825,0,0,4576a3d81cac9ae284e8d6b94460afbfd25da2bd8ce20d02bc18fa311290cf10,2024-11-21T08:42:34.227000 +CVE-2023-5825,0,1,22d9e90388dacba67ee8f4eb858746acef0fa684b6ed469e230e2314df16ae92,2024-11-21T08:42:34.227000 CVE-2023-5826,0,0,c75336461e525722aa453cda8398330ef11a98cb70f326c22395b8598ab8492f,2024-11-21T08:42:34.370000 CVE-2023-5827,0,0,91a679716a6c3e591fc9e2a1f46aabd86db1835399da6b6024f41352c2935676,2024-11-21T08:42:34.510000 CVE-2023-5828,0,0,d507886682f6095fcee9d5fae8226b0058d086e6211ba841f392dd2b0cd68b7d,2024-11-21T08:42:34.680000 @@ -242400,7 +242400,7 @@ CVE-2023-5989,0,0,a78cc9c0b47ba0e64491d91939e577fc68c13043d87ea9e6cbb65ab00be2da CVE-2023-5990,0,0,d8636460013d81561d75321d4eca29771b7c0b472c3ac8164e20e4e79608a6b1,2024-11-21T08:42:56.103000 CVE-2023-5991,0,0,5994b91a7bcafb560c3db2b198798e1c8ba7fbf8e3b7824583749eb6aa3b37e8,2024-11-21T08:42:56.233000 CVE-2023-5992,0,0,764edc002a480ee8d13c5c7e4518108b2dc88b6cab4bd72a3046ea4f3840d9b6,2024-11-21T08:42:56.353000 -CVE-2023-5993,0,0,069de20c0c98f9adc382751df9ad0ea6a3ad568a1c2750d33b1eaaa63780a805,2025-03-04T19:06:06.813000 +CVE-2023-5993,0,1,551935941c2f24a9c8a326382737e3ec12ad464828682529ed88283ca2f3166a,2025-03-04T19:06:06.813000 CVE-2023-5995,0,0,186aec097709754ce11416ac941160b935cc9d301d3a1c4ed45eb65c565d18a3,2024-11-21T08:42:56.657000 CVE-2023-5996,0,0,2ef4eb71d4f52756fc81dd28e5d694685ca3c6e06dc394abf18df054f57e6035,2024-11-21T08:42:56.790000 CVE-2023-5997,0,0,5edb59333917a38c7b27862996d1da7c614954f16407a701255c21d3947aa9df,2024-11-21T08:42:56.963000 @@ -242447,7 +242447,7 @@ CVE-2023-6043,0,0,4d42ba0e4248fe66359ed05a1105448d1de43c6b28a8a42326e051bf553c2c CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000 CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000 CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000 -CVE-2023-6047,0,0,8346245556da8f8494199d0db060767ebd0e6231ec0b0ebb0a9924640c15eff5,2025-03-19T14:28:26.253000 +CVE-2023-6047,0,1,868eb42a71d0149629e023fc0079068a8fb59df13b2c61959658fd336ed1c500,2025-03-19T14:28:26.253000 CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000 CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000 CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000 @@ -242567,7 +242567,7 @@ CVE-2023-6166,0,0,de40cab13226fc3a92ca9361475d99b65bb2eed68708602bdbb4ecbf1b9266 CVE-2023-6167,0,0,40d3ec27d9b0055c38ef6f22120af94263f65eda0cbc440a62c9d306729e2f21,2025-02-11T02:15:32.743000 CVE-2023-6173,0,0,8634f7cde759ec4cfe152ff6b8eff6414b8058cb0047304e9ecb3cb756457be5,2024-11-21T08:43:17.440000 CVE-2023-6174,0,0,8202d68042e851574342c6e234ad7826d155ba57f9979e258eeaa69907dc00ac,2024-11-21T08:43:17.567000 -CVE-2023-6175,0,0,041cdb70c4cff9691bfeac504508b577e5b1b5384e19332215b8daa4b67f4cb0,2024-11-21T08:43:17.703000 +CVE-2023-6175,0,1,aee9f35efdaf23b99a960ac70376c8ba267a253bb5ee1f06b9a0701f22bd87e2,2024-11-21T08:43:17.703000 CVE-2023-6176,0,0,d001ec7f6759b44f75f894939a621cec68ec3c323c3f7f120dec6bf8c0616a50,2024-11-21T08:43:17.830000 CVE-2023-6178,0,0,53c4b8e17bb3cb7e98f96298f7f1835ee5cac131cbb951e551f9183ad603e828,2024-11-21T08:43:17.970000 CVE-2023-6179,0,0,37fc50f9ef3e632c601df786cbb60f36d22d29635202d6257053590fdb67e886,2024-11-21T08:43:18.110000 @@ -242880,7 +242880,7 @@ CVE-2023-6527,0,0,f83b98db9940fc2d07ac6bee8934ba7dfadea973059a49837e3f07772d0918 CVE-2023-6528,0,0,e5808da770e68ec72828be023621b1cdae2dbfcadf3e368652daf09efc602185,2024-11-21T08:44:02.193000 CVE-2023-6529,0,0,240c5593c284be620aaef4c418f20fc5ee1fe4c5e2d8935497486f145436ed9c,2024-11-21T08:44:02.310000 CVE-2023-6530,0,0,6f6b7111ffff4aa2a32fd22d58df5a9d56d9283836487366f9b29be0cd631a98,2024-11-21T08:44:02.440000 -CVE-2023-6531,0,0,54793083e035f7b9b7be9b1a21de5d2a6097d34d6de0d09a87f4373b05e676af,2024-11-21T08:44:02.570000 +CVE-2023-6531,0,1,2d6149ae0c8a10dbdb11207763b3720a41951691f853d6aae900ea62fb8245ce,2024-11-21T08:44:02.570000 CVE-2023-6532,0,0,d9926ad424c052962b5b1c19ee0cd594cdb74f71af8a29a173c2e62d0ede5027,2024-11-21T08:44:02.720000 CVE-2023-6533,0,0,94b2775938efdf62fa530a653e964befea9fc91d5aced53f66c24a709c90ad33,2025-02-12T16:57:31.787000 CVE-2023-6534,0,0,6efa39132533c0da6b2d4f0f7236d9f304ec2707e39c52e825f0a23c7bae1a70,2024-11-21T08:44:02.973000 @@ -243046,7 +243046,7 @@ CVE-2023-6727,0,0,7bbd3e1513b451c00bdb1e60d5521ce4d0edecad79d485652e420462189820 CVE-2023-6728,0,0,d5cad901337cc4f13c12b57aeda30d9bb062a3112003e6a2837c11a6ce7a609a,2024-11-05T20:35:16.583000 CVE-2023-6729,0,0,2086303b3eb3fdf0b43c4f9d5042f89ed6b56bc1b32daea71fb38f406001fdf0,2024-10-18T12:52:33.507000 CVE-2023-6730,0,0,22067958a8780ef63fcf2d5dd8344cfe89214cadcc1e42b0442beaf8085d13fa,2024-11-21T08:44:26.450000 -CVE-2023-6731,0,0,7efba57da37daf1efe685fcc06455399a784f857344b3bf1384575d933011f3a,2025-03-05T15:16:45.610000 +CVE-2023-6731,0,1,2942153fbc00009823f4b03aabea6b8e217fe0ade4f421285e18b47aa4de93d4,2025-03-05T15:16:45.610000 CVE-2023-6732,0,0,f4818ab892836c726761fbb1f6979409df88c74e546c8095c628beec8a815e3a,2024-11-21T08:44:26.687000 CVE-2023-6733,0,0,3253e9934cdbad22d3f5bf18ea41de714a7571ae0a9c69b303a3f5309983ec5b,2024-11-21T08:44:26.820000 CVE-2023-6734,0,0,f702cfc07dd4f70df68ba07e813e6841d7b4220f597a5c694e7bd72e1e10c540,2024-06-05T20:15:12.617000 @@ -243253,7 +243253,7 @@ CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d CVE-2023-6951,0,0,5cf81bbb22b08bd5b560463dd9595ff1b504507f72343e9bcf9ea7dcc9ded4e0,2024-11-21T08:44:54.380000 CVE-2023-6953,0,0,e3148f54ace7102cc1d1855a57ee7588a45b42a9470f40348979b8e5a6fa722c,2024-11-21T08:44:54.530000 CVE-2023-6954,0,0,87eec9d8a7d1d4f7a21fe0bbd97c710f1708d0f75d7960a297d83c4cc61eb89c,2025-03-21T19:16:22.783000 -CVE-2023-6955,0,0,b511e736eb1492e80ab280a40a08f55d678952ba2370b7bb1d7689f096e2ea91,2024-11-21T08:44:54.833000 +CVE-2023-6955,0,1,6a651484610368fe70f3374eca3c9f0c198fcea15a2b7edd8250009a7dd2fbe3,2024-11-21T08:44:54.833000 CVE-2023-6956,0,0,5a2b668004fecf802df77f05304bc63d47f9be8a32adf14edea244199bcfda67,2024-11-21T08:44:54.980000 CVE-2023-6957,0,0,cb1ff440e5334bce772d063adf3231a9100fbe70520d0f63d8b214d93c538fde,2025-04-04T15:45:18.910000 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 @@ -243310,7 +243310,7 @@ CVE-2023-7012,0,0,5c1ae12587a689695a3c07cc39f89391bb45d6735687677ab3130a98835fea CVE-2023-7013,0,0,7b6b201772be0aba336e92b627046a6ba51720df3756a6d97030ef66c2c200f0,2024-11-25T19:15:07.563000 CVE-2023-7014,0,0,653f0c93c2effce325dc59ce969f80644077c8f621b768b2909654e991fcf9ec,2024-11-21T08:45:02.353000 CVE-2023-7015,0,0,837f8928d4bacdb4165fbe97df8f427b89ba4e7dbf94ab46f05c311c8bd92391,2025-03-05T19:20:58.760000 -CVE-2023-7016,0,0,1f41248eb581424dd045591c88df835925964b93d5d1b13ab9ee3e1748d5d343,2025-03-04T18:57:43.117000 +CVE-2023-7016,0,1,f9669269817ff79bd80255e475f39b8d7b628d9f32d8cc26032e9f2535a2efc7,2025-03-04T18:57:43.117000 CVE-2023-7017,0,0,a7d76a9613a406592ea0d3b77deef438f8a559b81e5dbf4800b4015e18fbcec7,2024-11-21T08:45:02.830000 CVE-2023-7018,0,0,1290b1c32659b3fcd542bcca682f3223abc0de7d6b3c98e245baa0204fc8197c,2024-11-21T08:45:03.013000 CVE-2023-7019,0,0,d5593188720056230c3acf1620e5e2ad03ee71cc5f934f9bd3fe8cb3fa8c2202,2024-11-21T08:45:03.143000 @@ -243614,7 +243614,7 @@ CVE-2024-0056,0,0,d8360f90b74f6700272d6a41f327dccded97d4f47b60c5e947d2cd48410872 CVE-2024-0057,0,0,6911ea0a6f9a974f33a2bfc84d09461fb97baa310549b7b23ec7e50e49e42a98,2024-11-21T08:45:49.400000 CVE-2024-0066,0,0,05604012307c9d015bd9a1531897b8404a84bf60ae836acbab80c90bdfe9713d,2024-11-21T08:45:49.587000 CVE-2024-0067,0,0,122e4a6c98538d37b86233a014d02728b12f029189e1509f4f04f30898bea208,2024-11-08T09:15:07.517000 -CVE-2024-0068,0,0,88cb23992dd106af3741038d1abe843909a88bea983c5a09b6a1c0ee7b3c9065,2025-03-04T12:38:59.057000 +CVE-2024-0068,0,1,577e51889ab8ed789aa7431869f15ec2ad0dfebc47291f449399da9d5b676f28,2025-03-04T12:38:59.057000 CVE-2024-0069,0,0,f3ce66513994f3ff028688e20278f0458e6258ba59cf74f690ee7dcc06e666da,2023-11-28T00:15:07.140000 CVE-2024-0070,0,0,cd3a46a295206562a4be32633daf482f59e1d323193385e7677ae8b6c52e190f,2023-11-28T00:15:07.183000 CVE-2024-0071,0,0,808cfb1ed41fb74862eab9e1184017d34215c208a5fcb988910ce14258a73f83,2024-11-21T08:45:49.967000 @@ -243687,7 +243687,7 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 -CVE-2024-0141,0,0,6b015ad29f50271c839485b28dbebd09a4398d73d3a210a13be8348c710bb6f5,2025-03-05T02:15:35.990000 +CVE-2024-0141,0,1,37556756128d3dbb3a7a504ebd796074a371b35c6a1337714b3d20be7cce300a,2025-03-05T02:15:35.990000 CVE-2024-0142,0,0,ab91e4f89023d5fa0e0918df6d387ffb7317705e556bb93dc7ee303e05180788,2025-02-12T01:15:08.230000 CVE-2024-0143,0,0,373bc5cf4b7b47e3878a4267a11415b51c043adff18c18154b4310affb61efbf,2025-02-12T02:15:09.253000 CVE-2024-0144,0,0,62b9924272d497b69906b0eab483f0a669dd3b052ae52931761b3c04972ef923,2025-02-12T18:15:20.557000 @@ -243736,7 +243736,7 @@ CVE-2024-0193,0,0,6220902bc14f1503ff2dded369c39a69fc976c2b711847037b79014afe200f CVE-2024-0194,0,0,7d33c63c40ca62941c9fa952cdee085f0cbd98a2df2405ded0a2be19225eb87e,2024-11-21T08:46:02.327000 CVE-2024-0195,0,0,20d44a923469cd72437093c52a9988a6ea0c329c670153d613e10fe01c1f003e,2024-11-21T08:46:02.473000 CVE-2024-0196,0,0,9823935c03d4905ecd0aac681f11a8cf50cf5fa955b018828d278fc5a0ceb6ca,2024-11-21T08:46:02.607000 -CVE-2024-0197,0,0,d7d6e5cd2bdd4530cd113d274a8bb23e6af8eeaa77b693efb82b05905668ea05,2025-03-04T14:29:57.050000 +CVE-2024-0197,0,1,85524ffca8730b437e3b59d241cd358698f496075293ac7d2157758827ee41e5,2025-03-04T14:29:57.050000 CVE-2024-0198,0,0,a2d5c350d46809c58c4bca5ec74025c194925554c84f4522a21684d3d8763bb9,2025-02-11T02:15:32.910000 CVE-2024-0199,0,0,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893aef3,2024-12-11T20:12:49.670000 CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000 @@ -243749,7 +243749,7 @@ CVE-2024-0207,0,0,2f8199e7587e0ab7fd695f2e21796f49ca2a9c52404d11018e2d7fe3fb4b03 CVE-2024-0208,0,0,c48034d32cc5e3825676980fa833995caf0072eaa3255befb81ec0b9fa8eaab2,2024-11-21T08:46:04.067000 CVE-2024-0209,0,0,d62ad56c5f5181d0170dae51eedcbc8ff0c56f160e205412087b3cfaf32cbef8,2024-11-21T08:46:04.213000 CVE-2024-0210,0,0,3e3263d06e9e2414d005bdf018e3ac186b89d2c16fdab7f3f6d450605a18e935,2024-11-21T08:46:04.343000 -CVE-2024-0211,0,0,cba7f91b6e6eca016e0b5acf8a3dde27ad80c63d0f232ccc878ad059bab8ac42,2024-11-21T08:46:04.477000 +CVE-2024-0211,0,1,db139d3ab8a09a067c9b9f5b5cd4990847e57ddfdc32945b1d21f8f8d3c5fdf4,2024-11-21T08:46:04.477000 CVE-2024-0212,0,0,784ab3b2f20d203077325210d85dfb226b3b60fbbe17d80b9e980ad16507df45,2024-11-21T08:46:04.600000 CVE-2024-0213,0,0,a3c9ab11a6a0368595a21ae168a31d99ac28221226b55ad6e7d8e169ef3ce09c,2024-11-21T08:46:04.773000 CVE-2024-0216,0,0,e4bd8121abd9e5a805c6628369bc176788e2422a7cbd79b7611977e63bf24c1d,2024-11-21T08:46:04.897000 @@ -244108,7 +244108,7 @@ CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000 CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b24224,2025-01-17T19:25:52.137000 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 -CVE-2024-0590,0,0,5d43e345aab2651485e3778b8c2f005d492c86a97d9baa3867b48f94491f4d80,2025-03-04T14:53:30.107000 +CVE-2024-0590,0,1,5a91a4518e821bd213b61bd270a67ec03a2987e340d81ba2d03380a780690c4b,2025-03-04T14:53:30.107000 CVE-2024-0591,0,0,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000 CVE-2024-0592,0,0,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000 CVE-2024-0593,0,0,f4e7a74601373b533789dea3664523c6cc99316255f76051d128ea0eea35276e,2025-01-31T16:36:29.673000 @@ -244138,7 +244138,7 @@ CVE-2024-0617,0,0,efd125e5b2fb1e127ba81b6d2e9a7eb42489f0212a325253773851856ce45d CVE-2024-0618,0,0,c8d16847fce9f2cb03aec797634d2ee65c6d6118d484ea1e5f62d29664b2ea49,2024-11-21T08:47:00.750000 CVE-2024-0619,0,0,4ede4c2ce234de077beb2d58c2dd52c1638a5586c5e1ad672034f0e43cb50038,2024-11-21T08:47:00.873000 CVE-2024-0620,0,0,01a806fc8fc8f79aae8137b86300824b12d7d0439315b4c96502fc26c172ec9e,2025-01-27T17:28:48.890000 -CVE-2024-0621,0,0,0b1c4c7364ef8f60d37d2cb6af1a936e3aadbc51182be20f5dc68a071222ace3,2025-03-04T14:54:09.050000 +CVE-2024-0621,0,1,df10e693e2d8b5dcc4732ed10505f0ed105646e45bd6fa31bd50babf9dca673b,2025-03-04T14:54:09.050000 CVE-2024-0622,0,0,bef0e087ddfd4a0233efb4c38eaf0e60aea1ba239bed5e5e8e26c084ac2ea3e3,2025-01-23T16:52:07.417000 CVE-2024-0623,0,0,dd5f29435e15338dc985fb5551595a6e34d69131f116d209222d2e5d483144bc,2024-11-21T08:47:01.423000 CVE-2024-0624,0,0,09352035dee59fe02f2fbab48ef8ce9be3c361adfb9ff0690caac0c5912794a6,2024-11-21T08:47:01.550000 @@ -244171,7 +244171,7 @@ CVE-2024-0654,0,0,f5c9c0cc6adb45c4ee4ccb32c94a93e5b4b752ebb5ff8e90536da2b68b43d7 CVE-2024-0655,0,0,b45ce71828f08de5e906828c46c08f690573b8e416f2e010774f774288516f19,2024-11-21T08:47:05.057000 CVE-2024-0656,0,0,95391c4536a389d37f451ebd2930637a96631797f5ee6bd41f68ef3899f9f6f3,2025-01-27T17:24:42.410000 CVE-2024-0657,0,0,b5ce6fbcc9ad9c2ff39fcf9e66939ed62391e858e4a9f088a94fb15f49f59acd,2024-11-21T08:47:05.317000 -CVE-2024-0658,0,0,f74f9aefeaeb5245a684a248c1812cf2e08cc5d207cb1a9ddf70ed3dd00df397,2025-03-04T14:54:47.043000 +CVE-2024-0658,0,1,b0a1bbaf24e296084b592f2596f2e0af7ae3e12cad700b6ecd397820f046f86a,2025-03-04T14:54:47.043000 CVE-2024-0659,0,0,b99e9ae32a582135e50e1efb67fe922b2ab11594e1e54191377ba5a214c9819c,2025-02-07T19:44:53.660000 CVE-2024-0660,0,0,40e8f123bc8b6f1561e3260fde23503a0610cb7a90946a4987ba73f8e90e7d44,2024-11-21T08:47:05.710000 CVE-2024-0662,0,0,433dd086e0aa2793f2d2e5659eb88ded93f9c7d18e42a95ccbfc57766429463f,2024-11-21T08:47:05.840000 @@ -244209,11 +244209,11 @@ CVE-2024-0694,0,0,dc9fe628f2a11097b105f7eb57210979fce97a3cb1f54662a5d4688094bad5 CVE-2024-0695,0,0,473e62fcdac89c4d11adf50166cbb6d0f9f9346399cf546335c44cfbfe767100,2024-11-21T08:47:09.900000 CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8b6,2024-11-21T08:47:10.033000 CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000 -CVE-2024-0698,0,0,1cd0e9e76f6b290e1fd798d1310e5ecf99d0d744165599a478eec84059433537,2025-03-24T14:21:24.423000 +CVE-2024-0698,0,1,dfc223142d1b6e1c1214111332b143718c590c593c550f1450ad91b62a5bc5c4,2025-03-24T14:21:24.423000 CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000 CVE-2024-0700,0,0,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000 CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000 -CVE-2024-0702,0,0,8f188433617440c395271a11dbcbf4dcaca0b59f7d1a73b78fd1621eb7de756c,2025-03-04T14:55:15.130000 +CVE-2024-0702,0,1,61e4aca2a60ed58eae3836289ec29859bf70c4a30c7c154c5377251abe69c830,2025-03-04T14:55:15.130000 CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000 CVE-2024-0704,0,0,a1f858ac7440853e6eb3815ddb83c901d10a15321e15c2aa01e99aa9a6669df5,2024-02-01T15:15:08.080000 CVE-2024-0705,0,0,5bf931a358cabda70b8b80f0cb82ca3341575ecda7a2685b6d892e9aebe15ff1,2024-11-21T08:47:11 @@ -244326,9 +244326,9 @@ CVE-2024-0815,0,0,4b48fa62b68f9d4915113bd6c0ebccf09f122ed10ba946ee3d412ba34dae1f CVE-2024-0816,0,0,764bb2ba28dec5666965844d3deff23ec78e8b1c5fa1c9e694f8d924ad8cfa84,2025-01-22T22:58:56.180000 CVE-2024-0817,0,0,79c2eec505d22aead47224b53a9c2e068df438f1d52be883946254dc680d4358,2025-01-19T02:26:02.377000 CVE-2024-0818,0,0,1ecdca876ac7b8c205efea3fd760a642a7add31ef04065171b218853ae473a4a,2025-01-23T18:50:54.023000 -CVE-2024-0819,0,0,731e8817088cd1ee5ced14464442e8e4688552fefa05d502769108623c7bbc73,2025-03-03T22:44:40.623000 +CVE-2024-0819,0,1,6c4769073400ad9f1b7c96988dffd1300c209149c4603d4e71f65ea79347a287,2025-03-03T22:44:40.623000 CVE-2024-0820,0,0,4e13342bbafe8959bddd512575b086f7651799d4567070a3932c9fbfa5e96071,2025-03-28T20:15:20.160000 -CVE-2024-0821,0,0,0309e0327feca575950b35c4babb105cd254349c55dacded0b80fd99f550ecdb,2025-03-04T15:02:41.160000 +CVE-2024-0821,0,1,b2d8d7abf1ef8917f788e64245523b78bca4cbf5f425b5c24f32ecbef1c83776,2025-03-04T15:02:41.160000 CVE-2024-0822,0,0,ef76e16156f0ac7ca3043141b54dd9d9595137069497b8b98eaa4426b49c0d84,2024-11-21T08:47:26.913000 CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d0967,2024-11-21T08:47:27.097000 CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000 @@ -244471,7 +244471,7 @@ CVE-2024-0974,0,0,30450b1e1be60ec4560e59f53aeee211010a354cbda6e8888e0d09007531d8 CVE-2024-0975,0,0,927902427c81e78a820da29ca78a14e906507ae17eb4d8834d59df87d8387cd2,2025-02-07T01:11:02.703000 CVE-2024-0976,0,0,c79dabcd2e4b14a1e26c7170d6a384930b136ebbac47519fca77529002b6ebdb,2025-03-07T19:56:59.733000 CVE-2024-0977,0,0,35ddbdf47de5d8a387b9c11235d17fbe38212db92abcf7af4a134a44c909b461,2024-11-21T08:47:56.303000 -CVE-2024-0978,0,0,e3f8bca7a1684963d814074e47e8e910b9852260a4fda1fad3f70c0dde41ae5c,2025-03-04T15:03:24.707000 +CVE-2024-0978,0,1,c29db56d4cbcff371feb5b983796db5db7ffa0757eb67c47f7bd179abfdb4c9a,2025-03-04T15:03:24.707000 CVE-2024-0979,0,0,baa5d9094fbc29dc7aa565142f1c9b80958eef1deb5e225475c26bd3e852a37c,2024-11-21T08:47:56.553000 CVE-2024-0980,0,0,0b0cf2cf274aa5011f1334c9bf9f827ad2c15dd7211176348585ac6956002ccb,2024-11-21T08:47:56.703000 CVE-2024-0981,0,0,ff5d0045d5a8a398c8154a7c935f4019293c97480e88e5858137ddb0060d7f11,2024-11-21T08:47:56.900000 @@ -244774,7 +244774,7 @@ CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee1 CVE-2024-10300,0,0,71f89392a82bac9e3a1118d602fedad5aa8e35f49fa5cc5e5782fb8c6482f21b,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,3d2ee5c748542f3efcde40d90c311550627d3156c0575f82911af7d8dec82c11,2024-10-25T18:47:54.033000 CVE-2024-10305,0,0,c796e0a9a1f8c346431dc8391644400d6ff87d94b0f13883aeae274109208b98,2025-02-11T02:15:33.200000 -CVE-2024-10307,0,0,8709ec9ac15f8fc4b1c392d32fab513d01cfa7e3d63da071fd890983e60b66e9,2025-03-28T18:11:40.180000 +CVE-2024-10307,0,1,b3c6596e9363272e01afbca3eda91cdf366d6168437cf679755595a795028a90,2025-03-28T18:11:40.180000 CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000 CVE-2024-10309,0,0,c3b06cfa7dc37203816d2b3718e47926115a5ae85aab2018d71ee2aed22785cb,2025-01-30T17:15:17.370000 CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000 @@ -244964,9 +244964,9 @@ CVE-2024-10490,0,0,4a4e4a08646346a5f6feeaf95c30f2410bbf3f4738b2d07bd796d69484a52 CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000 CVE-2024-10492,0,0,7f8940123504b47e7360ed943050a0eaf7d86e6d3f4447616bea276ef0817dfb,2024-11-25T08:15:08.453000 CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000 -CVE-2024-10494,0,0,706981e017eb8bfa513b0bb68d07a008595f0ee22b605a330a5107657668cafa,2025-03-04T18:40:13.210000 -CVE-2024-10495,0,0,f5b5912ceccea5fb82e8aceb601ed281f502cd0ea23b832ceef339162db4abb9,2025-03-04T18:37:45.737000 -CVE-2024-10496,0,0,742905e542d32cc3861f7b9ac7b92d21e8453c4de9ac40ba008c92ae70484186,2025-03-04T18:35:39.467000 +CVE-2024-10494,0,1,ec65bb62445d1ac9e4659425646f78d9a810560e8c667bc7ef3a87a006079e70,2025-03-04T18:40:13.210000 +CVE-2024-10495,0,1,61eb284488098464dcb80db86ee62914f924b9e87c86a002bac1af55a0417674,2025-03-04T18:37:45.737000 +CVE-2024-10496,0,1,d573864421f6af9d3652fc49ffb8f80bc45a66bc538be258cca3815a0a7d57fe,2025-03-04T18:35:39.467000 CVE-2024-10497,0,0,4212e0181580f29e1420db9a5e909d78265b1843b32c34455084331c49d5efd4,2025-01-17T11:15:06.980000 CVE-2024-10498,0,0,b6e36d63c386402ac4020d318693fe8dd16c04fbe0ab182bc1ac943bb311d11b,2025-01-17T11:15:08.340000 CVE-2024-10499,0,0,17b74beb086be3ec64eefaa097e37e1d1fc71a291b6b0e133ea9adf1d4040a72,2024-12-12T16:15:10.113000 @@ -245031,7 +245031,7 @@ CVE-2024-10554,0,0,77b518cf496c369446032aa51e95e1773993c55fb4b6f7378ff055c879fd0 CVE-2024-10555,0,0,c0c41d706222adae224343df415ec56327197387e8b3f526c30bed44f76590a1,2024-12-20T17:15:07.037000 CVE-2024-10556,0,0,04893ef6555133c7fb4a065ad7ee40a556bb83716f5e6bb1e4354bd00fe9ad00,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,b747d74cc2db5316ba1b28eca3b4e6b47e90682d5ab526a26512f546950fed33,2024-11-01T20:48:56.980000 -CVE-2024-10558,0,0,ad1847fc477a2fe4318758523abf754a4468336577af91283111954adc8d0880,2025-03-24T18:15:18.403000 +CVE-2024-10558,0,1,f7bc57cd2705e73d7facedb351b3a5d35e478ca4eb17a2c2aed5e9e295b1cdb8,2025-03-24T18:15:18.403000 CVE-2024-10559,0,0,3df68a401f94f372cc0644e814846c232e3d36534e5337d5a3ca74316065d1f2,2025-04-03T11:15:40.150000 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 CVE-2024-10560,0,0,8adf55958122948a4afd80434b423104c69f54624404d4b204761e087036ee99,2025-04-03T17:37:24.173000 @@ -245133,7 +245133,7 @@ CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96 CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000 CVE-2024-10658,0,0,59c355ccdbdb5bd7d187726f02bf0d66e0585fe05188237a417f240cb1df426a,2024-11-04T19:46:45.707000 CVE-2024-10659,0,0,8f2b10caf8dabeb6e892951cda6e14b0c555447044fa18a1e0f998953acf6bae,2024-11-05T17:04:55.647000 -CVE-2024-1066,0,0,66c21716feb38a48d8d9683c0f9a9090d6fe7ad4a721397011cbe216014eec98,2024-11-21T08:49:43.170000 +CVE-2024-1066,0,1,e5906ef2c2a880429c794bad136f9b9a150ce05d70c2bb41665469c6b92cd7dc,2024-11-21T08:49:43.170000 CVE-2024-10660,0,0,0d1db00ebbc8eee74945888e16da206ea400511483214be85aa9b5590dfe879d,2024-11-05T17:04:45.093000 CVE-2024-10661,0,0,465b6695bccdc8f1a33c90652588d8def49e6ceef8f964bf43514d006f0a2276,2024-11-05T14:30:37.787000 CVE-2024-10662,0,0,46683ece41f9c56808609a9d20699483705efa11ae3175da2eb7291d6c063cd0,2024-11-05T14:30:16.847000 @@ -245182,7 +245182,7 @@ CVE-2024-10702,0,0,b5bae28ad49dc3fc514d7656713ba6f4bc898a4f9e05342602a4e18ebf911 CVE-2024-10703,0,0,13bdc2fe496f97bbadafead3f0234b3c7b972462672cbd5af7823d6e2f6d471e,2025-03-27T16:45:46.410000 CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000 CVE-2024-10705,0,0,d9ed7dfbd93f39275a245485013f732374d0e600783f5361f2946a662c0533a1,2025-02-04T20:08:12.543000 -CVE-2024-10706,0,0,3ec222f321cd144b9747414b2388ca8377b75fdd1ec931604f451b9a1a761bac,2024-12-20T17:15:07.260000 +CVE-2024-10706,0,1,210d33f496682b4d880baa46776e7e7ce2c5d586e9f63174707439ef75162aca,2024-12-20T17:15:07.260000 CVE-2024-10707,0,0,35d45b41db0f2870421a42ede9f2de90d82dbc5a2a219940da2f1b1a855c12bf,2025-03-20T10:15:18.280000 CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000 CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000 @@ -245304,7 +245304,7 @@ CVE-2024-10816,0,0,26285e9b2ee00beb2b7e65eb9860b931d998a377d6a13b3bf8cda452f0b65 CVE-2024-10819,0,0,34845500044f54130f5d3f61513cf2c85a7003d9825456f3b5b68b725d22d2a4,2025-03-20T10:15:20.010000 CVE-2024-1082,0,0,15848b2b0524454d542c04087dfa80d78199ba8d7edfbd0b12b87db452374b0f,2024-11-21T08:49:45.430000 CVE-2024-10820,0,0,bf9d28b16e948ef83988df033dfb0ac82ff3713b45d4528e33ad22cd94422f74,2024-11-19T17:38:16.363000 -CVE-2024-10821,0,0,093b8ca21272dfed14b2aafc67b02159056ba539162912e8c8e35cf57cef5e38,2025-03-20T10:15:20.130000 +CVE-2024-10821,0,1,a06049af5baec65a9e073daca39e5d1e1757cc8551fbadaf879cd41fec9a56c8,2025-03-20T10:15:20.130000 CVE-2024-10824,0,0,3d683116bc21053ca9f7e105b2f8cac8a991e43d9f78bb89f7563b702edf42ea,2024-11-08T19:01:03.880000 CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb805,2024-11-20T15:01:19.507000 CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 @@ -245568,7 +245568,7 @@ CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355 CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000 -CVE-2024-11088,0,0,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000 +CVE-2024-11088,0,1,f3b8a1597d15de7a0eedac2ad485a95581e90858e0a798f2ac37387e87407282,2025-04-05T00:35:39.907000 CVE-2024-11089,0,0,0f46a9a629be88f215b4a7ad0d79575a4e3b0caab898de683427fa2e5561e411,2024-11-21T15:15:21.500000 CVE-2024-1109,0,0,a7b1e71489d6774ecfe851782646b725fb9b27ab957ae0f8b7f311d63d7950f6,2024-11-21T08:49:48.980000 CVE-2024-11090,0,0,c176ccf3141a40259cf6c4995f025e29b8341ceb796ecba9c85f772827fb28cf,2025-02-04T20:03:08.833000 @@ -245635,10 +245635,10 @@ CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1b CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba9086e,2024-11-19T16:57:05.407000 CVE-2024-11153,0,0,2321d1793b69525de6f4a4d3f88085fe7c8f1bb3b37043628cd90ec3588a5ec0,2025-03-05T12:15:33.287000 CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000 -CVE-2024-11155,0,0,b7062c0b399995063fe2a625442bd6626c60aa76fcb13e89717b66c8ebee721d,2024-12-06T19:15:10.730000 +CVE-2024-11155,0,1,045f837e6cbcb7a3ea123fa379a6246311d550bce4cfae48e56104a60d5bfd67,2024-12-06T19:15:10.730000 CVE-2024-11156,0,0,ea1fe2a973d15fdece4824e57dc16a1bcfe810ffcf2d9b4d711f82a25c787244,2024-12-17T15:52:01.670000 CVE-2024-11157,0,0,df33e9a0f4a9b390ecb9240cbdbdf1c3e5a1def95dca302c1c42721e22c790c9,2025-03-13T16:15:15.230000 -CVE-2024-11158,0,0,90d1f5431316de4e5164ad4c13673478a83b35d27c44350036e17b315f9f9f00,2024-12-06T17:15:07.970000 +CVE-2024-11158,0,1,0ec2e032c800eeccdddd66a360ae2c93b294138f148b8ff83949f00ed1c4087a,2024-12-06T17:15:07.970000 CVE-2024-11159,0,0,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277cd8,2024-12-06T20:15:23.937000 CVE-2024-1116,0,0,7d8d96f7c323e069e605409b474b2bd18744f4c3487afdd2599b3edaac1467cd,2024-11-21T08:49:50.050000 CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000 @@ -245978,7 +245978,7 @@ CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000 -CVE-2024-11504,0,0,3d011481272d3efdd0bf092d503537af38ed5d282bff89afd4188d56fc0d1587,2025-03-28T18:11:40.180000 +CVE-2024-11504,0,1,08041e39ea114511fb2c8f0bd997f2ba562d5b23bd65b19966d39dcea8b037ea,2025-03-28T18:11:40.180000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000 CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000 @@ -246072,8 +246072,8 @@ CVE-2024-1159,0,0,eb3cea64f953819b25c713636566da1c2414aeeb8f257fad9b5566b88ad761 CVE-2024-11590,0,0,caeac09bb5b20fe8dea9fa95c615e70bf28830237e243eb3d0c5ee3574308edc,2024-11-22T22:00:59.297000 CVE-2024-11591,0,0,2c6f54d5dc8f3c01dc610e203d02715f78339bebb9b288f9d4cd1dcd7c570614,2024-12-10T16:55:46.527000 CVE-2024-11592,0,0,4aa073ddb9f7ac943424652284d442a8e2b76e26b8bf5535f4259218c76dda4a,2024-12-10T16:52:43.287000 -CVE-2024-11595,0,0,a5112dbb9cb2e7f356d3cce7d0ed3c3ac245c3e9a2ca11df8391a68c97c97211,2024-11-21T13:57:24.187000 -CVE-2024-11596,0,0,6343cd2138cc057262127834530bb4e7d4aee6e59c66c3eb257ce4b183831bc4,2024-11-21T13:57:24.187000 +CVE-2024-11595,0,1,368f9d257a3258cd2cfeb430bfa9cd65faa2b173c1478a5b363db75ae346f997,2024-11-21T13:57:24.187000 +CVE-2024-11596,0,1,e8aa1b45b172187bf880365770e3db217b477e04f6a9bdade0eb2b0a7e3a955e,2024-11-21T13:57:24.187000 CVE-2024-11597,0,0,02a202263b5ecf26ea23624593cf12d47f7cf0eccc4d2aae83c90ae1078007e9,2025-01-23T20:02:22.257000 CVE-2024-11598,0,0,4c9ea68ab008ad54c4649b6db219ede4f98d4df1bf8b53deea7aecef314d9926,2025-01-23T20:12:36.087000 CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000 @@ -246186,9 +246186,9 @@ CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7 CVE-2024-11699,0,0,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000 CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000 CVE-2024-11700,0,0,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000 -CVE-2024-11701,0,0,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000 -CVE-2024-11702,0,0,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000 -CVE-2024-11703,0,0,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000 +CVE-2024-11701,0,1,f6940069f0517156652148641b41d18687c1f5a9bb107cc96ef023d9ab3f4718,2025-04-05T00:36:49.380000 +CVE-2024-11702,0,1,4d1864fa16526c5528782ef2c7a824c57bacfaac339143f94fbfc7deab0a885c,2025-04-05T00:41:30.300000 +CVE-2024-11703,0,1,d53d8f54ff0653d342c4d3f6b4c7a8e39cf2d3c8aefaffe438b67e04923ea462,2025-04-05T00:46:01.770000 CVE-2024-11704,0,0,4fa09d89c318faf77ba5c529c202e65e7e689ccb5c52ec0f113ae3e40b856d1f,2025-04-07T19:40:06.320000 CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14 CVE-2024-11706,0,0,8718a0bef26f1edd737c6fd9169f4652793b53f3b28a484c2dc877f26ed8f860,2025-04-07T19:39:00.667000 @@ -246411,7 +246411,7 @@ CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5 CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230baf1,2025-02-04T19:40:29.057000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000 -CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000 +CVE-2024-11916,0,1,500508263ebf6681369098cbade6d838d011bd142dad016cfcd133718c4190e0,2025-01-17T20:58:37.443000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 @@ -246512,7 +246512,7 @@ CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23 CVE-2024-12019,0,0,0f7a1ea913b0a02f0ec47078c5937b126bc080f3be46a32e0bdc7fc16fba8ab0,2025-03-14T18:15:27.230000 CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000 CVE-2024-12020,0,0,c0d6c6af387492d3dc90a21c48eea05ecb81c5912d598881f193476f9547d895,2025-03-14T18:15:27.370000 -CVE-2024-12021,0,0,5a86ee2f5b6aad57015fbe42fb2827acf75c8e3af35a75f17d812abd26368a6b,2025-04-01T20:26:30.593000 +CVE-2024-12021,0,1,0944d42019272ed5b30e0460e163601fa051af022267864d96191aa561a3703a,2025-04-01T20:26:30.593000 CVE-2024-12022,0,0,4b0c4a5413ab235f6d4162bb8baa2320652f2e63275aee3944d2530558cd3296,2025-01-17T17:15:10.533000 CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000 CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000 @@ -246537,7 +246537,7 @@ CVE-2024-12041,0,0,c51c944b4ab8d6d44c0744754eaca5881989f4294856b597a5c3096c28461 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 CVE-2024-12043,0,0,0b4fdcede937ae84ff81a2ab905da8f11d94e67d0f40a0aefefaaf9cf7c57c04,2025-02-05T18:52:58.717000 CVE-2024-12044,0,0,f8805736393e1d725bdb301c51b4a2946a605e5cf1302a017bc19fcdac922fb4,2025-03-20T10:15:26.387000 -CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 +CVE-2024-12045,0,1,bc26debbb601f67d65ad2ded254f61659851b784651276bbe7f6de82406bc60e,2025-01-08T08:15:24.683000 CVE-2024-12046,0,0,b1c5edbe1744b4677b76c567c6df32419a96f24a9c141c0fb388cffd7e9f48a8,2025-02-04T08:15:28.583000 CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000 CVE-2024-12048,0,0,58676679aad6b8810e11290d85012f1d5f0bfd9887870ec3a51c47706b8702e4,2025-03-20T13:15:35.717000 @@ -246677,7 +246677,7 @@ CVE-2024-12185,0,0,975b0295005cc5955b9925b7a20bb9136be5baf3a503474a5900e589b0a34 CVE-2024-12186,0,0,a3a2f89f0e19c80e2e5cc4a8ff7a5d77a7430d9b062ec6bab99d9f9abe591e75,2024-12-10T15:52:39.487000 CVE-2024-12187,0,0,4a844d03d68a4e06ce2a1a379aacf008f6bdcb7f5e319040d5c06ff4167889c5,2024-12-10T15:25:53.537000 CVE-2024-12188,0,0,9702305b8f0015578ba3ceb8cde5544e4b20624c6e0765df7683122b0a9ef1ae,2024-12-10T23:18:39.680000 -CVE-2024-12189,0,0,5dc91b7c8e816bfceaf82373c217f6abbab8f811f4d197b57858cd4e1b6366f8,2025-04-01T20:26:11.547000 +CVE-2024-12189,0,1,61080a9a0c6f576615f249fb249e8c6161e1fb1278826af9db46295e8ac8fc57,2025-04-01T20:26:11.547000 CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000 CVE-2024-12190,0,0,f59def6c5438b2fdb25e9a5c4a956c2ad1ff335359e4248bbab6180b030429a5,2024-12-25T04:15:06.310000 CVE-2024-12191,0,0,decf8076f32c1928128e2ff4dc81f9e10ad9e51891262b9b14e4e2aa15156b11,2025-02-10T21:15:16.270000 @@ -246728,7 +246728,7 @@ CVE-2024-12234,0,0,9d7c148e7c35f36f4580b4a128d450b09697f800037d82d3b96645ba0e596 CVE-2024-12235,0,0,1b9217e41b2b4723af445305407853fb5a0c5e02f0a9c2103c26ae5a09a851e0,2024-12-05T18:15:21.660000 CVE-2024-12236,0,0,b5c1a87bbe8dea428f435adb5a2c9fcd4e1ff8d7a50399d9373f060b6f2665c5,2025-01-30T09:15:07.970000 CVE-2024-12237,0,0,bc9c0d4c537bace6ba73f5084a4978adc8d5b928619c3c4d0e52cb7bef9d5351,2025-01-03T23:15:06.473000 -CVE-2024-12238,0,0,0b2506120279c72470fe6ced119aba981e066d08bdac68bd9b96e39e9d942dde,2024-12-29T06:15:05.487000 +CVE-2024-12238,0,1,3ecf677854232d6dac8093d1a2c09c44579ad2f41fb0ac31e7a406ef538426ce,2024-12-29T06:15:05.487000 CVE-2024-12239,0,0,9e06b69c7a181e1eefc355ae61f69756351b8110a900b4600cfed048a6e987d1,2025-02-28T22:55:41.940000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 @@ -246824,7 +246824,7 @@ CVE-2024-12331,0,0,6c6e9b90da53ab4f2635b2c568c68cfa4d017be1088f155d7e21d426ea9a2 CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4dbf02,2025-01-07T05:15:18.687000 CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000 CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000 -CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 +CVE-2024-12335,0,1,eeca78c8317a814f826d56ee540d8dc839b681e179f3600a01323f3602cd3147,2024-12-25T07:15:11.980000 CVE-2024-12336,0,0,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000 CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 @@ -246857,7 +246857,7 @@ CVE-2024-12362,0,0,ae85a03598fbfa73b68d0a04bedecd83a853b0e7800585aa3682db4fd46d2 CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000 CVE-2024-12365,0,0,e44342e05a0b6e2262a493fac9edc68519495d51c0acf8bc24f40ad738356cb8,2025-01-16T21:31:22.633000 CVE-2024-12366,0,0,bf8b8c2c212f453e6f6d5dc642f1270129eabc7111c7a613295f8bc64058885c,2025-02-11T20:15:33.247000 -CVE-2024-12368,0,0,616efa4374cedc2fd8eff89035e74132b885b6e2817dfe0854a272f0f85104b9,2025-02-28T15:40:59.097000 +CVE-2024-12368,0,1,cf43f2f55bc00689e177d5a51be5bd5730dfcbcf801633d096fc0bdbd9cefb9b,2025-02-28T15:40:59.097000 CVE-2024-12369,0,0,fcd74b43ea72489fd8099497c673c3afa2054b03bb7ec4819b8a995ebe30e685,2024-12-09T21:15:08.203000 CVE-2024-1237,0,0,73d890f90445a3f466d07e44bf460923510366d9a99dc79ba53fedc006c8a010,2025-02-05T18:13:17.037000 CVE-2024-12370,0,0,d98e18bb49c3fbc75f1f7f6601e58a6353c9748a641846c6cbd7e3ecbf6b2cbb,2025-02-11T21:42:23.220000 @@ -246901,7 +246901,7 @@ CVE-2024-12407,0,0,90207e0ed6e0318c2d7902b5431b42ac4002510e342567216f54a8133c610 CVE-2024-12408,0,0,c9a97800ebdc971055fe039c0934b7c899913355f0545cc6cb71b6253bd484f6,2024-12-21T10:15:08.067000 CVE-2024-12409,0,0,e847ed1f48853bbc2767cacc80dc2012e33203b6c61d7daad8a6cadd0fa93d1e,2025-02-18T19:15:12.230000 CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000 -CVE-2024-12410,0,0,7b3a6422724cdbc26db638cdc2441dbe807328015775cc98d1b443b547e39667,2025-04-02T14:58:07.527000 +CVE-2024-12410,0,1,6e6ba64eb5101ec944ec4fd65ad13a79efe57b0af8f3d5de1078790b5ac33264,2025-04-02T14:58:07.527000 CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430e47,2024-12-14T05:15:10.437000 CVE-2024-12412,0,0,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000 CVE-2024-12413,0,0,fdd057a05387c9ace72d4ba4316c6065bf29813d0f1c7f4a169e0a5a81de204b,2024-12-25T04:15:06.607000 @@ -246968,7 +246968,7 @@ CVE-2024-12473,0,0,206297f672a09c7681b3d1cbb4c368e1c0a3b16d868ed8e1c0293957039b0 CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000 CVE-2024-12475,0,0,2f8326227abf89a4a2831662ce583580a9308faf5c2c5bd3ecb436043a083ae0,2025-02-25T22:46:02.480000 CVE-2024-12476,0,0,06d3aa7d2355b9fb548ba30903d1f2d17b1d51111a3fbced38c72a71808528bd,2025-01-17T10:15:07.013000 -CVE-2024-12477,0,0,bbace8208053823277c892b6d1ba4d60f4008332a6fe6f49d3ecd1f53ca5a943,2025-01-22T22:15:08.683000 +CVE-2024-12477,0,1,1aba73bab80b5f82fe24b2f1ca82daeb2d76802917998c39031ac4b5551fbb0d,2025-01-22T22:15:08.683000 CVE-2024-12478,0,0,bb1ef88a917aed790962755c18f5940408d868b49157724e8a00ba6d33e99a63,2024-12-16T11:15:04.890000 CVE-2024-12479,0,0,59070be7fca9f3511d05b51e20d8f96c462832f58b753a650e6e12660dc52a08,2024-12-13T17:10:45.860000 CVE-2024-12480,0,0,a5279943aa44c6186255f31a29a36934ac4bcd60912bfb832e65da71fe2d3761,2024-12-13T17:11:08.800000 @@ -247112,7 +247112,7 @@ CVE-2024-12615,0,0,6e994a8d3113ca6f9de4c4e061e53b865bfdcf07b29aa5840c39b6ffd2b32 CVE-2024-12616,0,0,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d4476a,2025-01-09T11:15:14.970000 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 CVE-2024-12618,0,0,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000 -CVE-2024-12619,0,0,9f9cc126bb24586c4e3847aaa23cabdd52d5badf7cff48b47c69b42fabbd75ff,2025-03-28T18:11:40.180000 +CVE-2024-12619,0,1,c135efe49bc54a65b210ac3910c9ec0f31c15eac116a9fa427f7a5713903f14a,2025-03-28T18:11:40.180000 CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000 CVE-2024-12620,0,0,e537581ee6f9b9e41db6bae290af071a0bca6c5bd387497ad5b828939e579290,2025-02-24T16:41:10.847000 CVE-2024-12621,0,0,c2adae066a86c184a771a0d948073e2bc06ef58867852e158c90f4e2e54ac114,2025-01-09T11:15:15.417000 @@ -247239,7 +247239,7 @@ CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f137 CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000 CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000 CVE-2024-12769,0,0,b5368017e96ce32a9b18390391bbbcb6d2ce8fb1677cb33cfd32f497086549fe,2025-03-27T16:45:46.410000 -CVE-2024-1277,0,0,1a185a3e5546740a0eacb8b77e1cad6738d582479b658b08c14e8d4535b09c19,2025-03-04T12:34:06.490000 +CVE-2024-1277,0,1,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,70f859d44122fb4ca5be07280e50277d8d4fcf200f73d5f17311f294bd9e06f4,2025-03-28T18:08:42.730000 CVE-2024-12773,0,0,4a158210ce8f04e63a0cc5644404dce0edf638a1d39d2ff2dbf8f403280ec7de,2025-01-27T17:15:15.290000 @@ -247284,7 +247284,7 @@ CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7b CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000 CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 -CVE-2024-1282,0,0,5158a8da364348b0cf28f6d47c1abd3521fd61d472e834665661391c3cff07a4,2025-03-04T12:34:50.210000 +CVE-2024-1282,0,1,00e6b7d0db3003be7234526bcfeb289f6d65969f62936d31830f4d6667ec76e8,2025-03-04T12:34:50.210000 CVE-2024-12820,0,0,45b6723e9c1b44ca3e61d8a258723af6e37ac081e68cc99cb2f3cdcda2cbdc3d,2025-03-06T19:00:07.550000 CVE-2024-12821,0,0,3c81a8bf2d7e8d351e723ae5f33b72c075b01bfc879f777afe77fb5b91672b23,2025-02-28T22:29:04.163000 CVE-2024-12822,0,0,dbb8b5e7ae1f3badb68b038755cd1a1ee39ca8c64a8242669bbaad42c09fe6db,2025-02-28T22:31:24.053000 @@ -247343,7 +247343,7 @@ CVE-2024-12876,0,0,321b13efcabf74dc7c36f7d793dc2e63dd6020db9b51b3c4d9cfb4e699901 CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000 CVE-2024-12878,0,0,b64e1d2b2d1550ae633bcf2c37a6e44f5ae55d86c6146ff799e23d8870487b64,2025-02-26T16:15:14.863000 CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 -CVE-2024-1288,0,0,117c06763a684336992889da5e694ce73e59971d9390b4484f61d4512103be0c,2025-03-11T16:49:51.733000 +CVE-2024-1288,0,1,f65d82f0f3401e6c3b37cf86abe50d115a30a2e51f53089ab6d7d1c62acd16af,2025-03-11T16:49:51.733000 CVE-2024-12880,0,0,480f5927ef00adb6af2aa669bfaae99fa4615b802f8b65355082e5f2de1ffab0,2025-03-20T10:15:31.467000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12882,0,0,4e2400baabe31430279d5d180a1f4f9eacf4c12faa50c261f65ceed0ccd3d55e,2025-03-20T10:15:31.593000 @@ -247368,7 +247368,7 @@ CVE-2024-12901,0,0,9090f7834bc3c030e72169daa1c979a89e62ab4d337c41ce0895aac0a7fd9 CVE-2024-12902,0,0,f67161e0fccba6773f5846cbc230324e550643d0923f7ba0e7e1a11f1d4a5be7,2024-12-23T11:15:06.153000 CVE-2024-12903,0,0,934e7684198b909838e52981ff3e91a85ceaf2d8442d1b9996709c268c32e282,2024-12-23T13:15:06.390000 CVE-2024-12904,0,0,671a7c9940a0c77cd61b5157b9a25d05e94a81dd74e911832e959fb41cee16f3,2025-02-11T02:15:33.927000 -CVE-2024-12905,0,0,b209e6b6aaf991ca76541233f397edbc039b7ead9d264ed41845b9945ae55afb,2025-03-28T18:11:40.180000 +CVE-2024-12905,0,1,831b363d80d945d90131f323ffb73efa9e2f3ae68cef4aba4297c3626a1560f5,2025-03-28T18:11:40.180000 CVE-2024-12907,0,0,888eb59eb672b880a00352690cbd4fe68b3b4bda1cea5583ad3fabfdc05fe373,2025-01-02T16:15:07.690000 CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000 CVE-2024-12909,0,0,f0d6494e68aae34d5cb59a938816f9aaacb68f060b0a770985be4948c8337bac,2025-03-20T10:15:31.833000 @@ -247394,12 +247394,12 @@ CVE-2024-12931,0,0,149bd4e0add6e0679573f60259b81781779baa123f30a1517e77b63a9682e CVE-2024-12932,0,0,c681d3079b1a2f2f4f8228daccca6861ea4114eeddfc7771ceb480fdd104272b,2025-04-03T16:32:27.783000 CVE-2024-12933,0,0,b575b56fad389bd2b8b9d0b295915a5e6fdf14f3711958448664d49acdbea587,2025-04-03T16:32:21.660000 CVE-2024-12934,0,0,6aab1f5172491e0588632ad5e23dd62096ff6c67c02dbabc3a810088be5b9230,2025-04-03T16:32:16.503000 -CVE-2024-12935,0,0,48a14a4c2bd2dce28ae51f575dfbb7f9e0a6698e889d6c704e96b01fa17bd482,2024-12-26T18:15:17.483000 -CVE-2024-12936,0,0,55a88043553c5923597bcf986e4110069d325651f25f2116527bc44caa830005,2024-12-26T17:15:06.487000 +CVE-2024-12935,0,1,be5f538971cf641d3de16e7ffa11e65bb516e54affca22f37cee0da4c4015e88,2024-12-26T18:15:17.483000 +CVE-2024-12936,0,1,5f0101fe9fe3282fc0d099bbc49d2cc4dbbb2cb976a3994ecc347f957c2985b0,2024-12-26T17:15:06.487000 CVE-2024-12937,0,0,878380153bcffcb876f8fba7505b2214be530656782fbc4be3b53ce4c4ac9502,2025-04-03T16:26:08.950000 CVE-2024-12938,0,0,2812278ef070ebc79ec53504889f36e0cdd454c1b1a74262e4b7e9590c2e04e7,2025-03-01T01:12:28.353000 CVE-2024-12939,0,0,993578973114d9e6f9ce6908b01603984894f1b4935991a79a259647bce06068,2025-02-18T18:45:17.713000 -CVE-2024-1294,0,0,e4ea0510443eb2f529746a78e4977d1275087062f91e87d596dd82a3a6407430,2025-02-28T03:14:12.087000 +CVE-2024-1294,0,1,b0fb1b56b94265649850cd0be6659a54d4963b6a50bb7c62a2724b9eb7a0df3a,2025-02-28T03:14:12.087000 CVE-2024-12940,0,0,12c06318c92f767217836d290d995071f043da37b390579d1b80650cb5b93cce,2025-03-01T01:09:25.350000 CVE-2024-12941,0,0,9afd815f1fb71d28d889ae9ad124b22190934df24177dfdcd147ca3fe5289b0e,2024-12-26T08:15:05.117000 CVE-2024-12942,0,0,43d18e1a158086aa66eb6d3d17636dcc19f4c7c2eb12a24556f32823fde1864f,2025-03-01T01:08:21.253000 @@ -247585,7 +247585,7 @@ CVE-2024-13120,0,0,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff CVE-2024-13121,0,0,eea054139dc60b1a73e646e7a0792d046eb2c33404d8501622a8bb165162f3ee,2025-02-19T22:15:22.250000 CVE-2024-13122,0,0,77e34d80ecd6908bce1c85a3e1360e3b1b030ad651b2fc284239dd9c9d22a937,2025-04-01T16:45:41.430000 CVE-2024-13123,0,0,df42e8e42749b5a8c6908c4b6c441af2a6f72eb093877cef9c540fff7be6f099,2025-04-01T16:45:18.953000 -CVE-2024-13124,0,0,ea4c2220c7d6318b73b613eda5bdab02d5b315085d9ea970489d43e4a96e2502,2025-03-24T18:15:18.530000 +CVE-2024-13124,0,1,37626a55eabedece09aba2804779aab3cf58c5a3763de80743d6c573feb35e04,2025-03-24T18:15:18.530000 CVE-2024-13125,0,0,bcf9d3da81b0bd561483ac7c7c16f4aea5f6f77159bd25d7d228b3f63d6a7f5c,2025-02-19T22:15:22.390000 CVE-2024-13126,0,0,a51a604346bb3adc09be5c601e03c4731caf9a8d2c2e374570ff0566bc03c00f,2025-04-09T13:06:59.020000 CVE-2024-13129,0,0,b0eed5efae58289046079d42bcdb7ee605946275886670758de35d713757689a,2025-01-03T22:15:06.677000 @@ -247678,7 +247678,7 @@ CVE-2024-13216,0,0,8e20e17dfd694aa546f801508f99d3bd9309e38995daac8ba087dc79f8652 CVE-2024-13217,0,0,e2f1576470a403c4c322eaf84f49407b9b0e9fe8f3b8ac7d9a07e62cb25ef208,2025-03-25T13:29:59.130000 CVE-2024-13218,0,0,736a417e7ed45050eae9deb79d9652565957633e7f9fc080af183435381c7945,2025-03-14T17:15:41.140000 CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e3fe,2025-01-31T16:15:31.617000 -CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000 +CVE-2024-1322,0,1,c325522ff804a0b1e70113aaad90113a37ba2b45208bb33566cc39919592d43c,2025-02-28T03:12:58.057000 CVE-2024-13220,0,0,f84b4793755f983afa8464e9b5816c148eefb72a55b02fd3f5c9f09a7619b731,2025-03-20T15:15:41.193000 CVE-2024-13221,0,0,cbd1a7d3e900c883178aa5ebf5e7730a05696e4d330353970b2ee62e177da934,2025-03-14T16:15:28.530000 CVE-2024-13222,0,0,58f0085a1407de24c3cbe5e9312e8772fe787b4e9a861aa13f1a7dfd4a9c64f1,2025-03-19T14:15:35.370000 @@ -247812,7 +247812,7 @@ CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f79 CVE-2024-13343,0,0,640200c7757a0fe07b53b1ed98de77b765153c818110e07c8a501ce037c2ed28,2025-02-24T16:21:30.933000 CVE-2024-13345,0,0,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000 CVE-2024-13346,0,0,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000 -CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f0474b,2025-02-03T16:15:32.580000 +CVE-2024-13347,0,1,8197496b84b4f63e5f628ac44a938501b5b9645038227a34fbe39dbe2ebdef45,2025-02-03T16:15:32.580000 CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000 CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000 CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 @@ -247835,7 +247835,7 @@ CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a8 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 CVE-2024-13369,0,0,47ecd3c90365b0b8806608698978244aa8d9548459c2826cb276965402432233,2025-02-21T15:26:29.267000 -CVE-2024-1337,0,0,5c5c07a9bfa1dc8d169a96b7aacbebd3cd5971363d54b30537dbb5fee91863f1,2025-02-28T03:09:51.360000 +CVE-2024-1337,0,1,67ab2ae5ba7227092b2862049e05c55182efcd02809849022cb8119b22a27098,2025-02-28T03:09:51.360000 CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000 CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 @@ -247864,7 +247864,7 @@ CVE-2024-13396,0,0,d40dddb5bbef2ceb0d99779812d043b82b74e26f4354d1873d73eeffa8629 CVE-2024-13397,0,0,02f1ca5e9655c42bfc977bed181f9baeb574d1f47ee120196f480f736b1319fc,2025-01-31T03:15:10.240000 CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000 CVE-2024-13399,0,0,ae1b981aa62bfabc1644fd540791945410e14b2403d65b8acc8ef844a056874b,2025-01-31T03:15:10.470000 -CVE-2024-1340,0,0,339f581c5224773389319cbfb088f51c34b24f1a4fd4c6b2211f944a5f591339,2025-02-28T03:07:18.087000 +CVE-2024-1340,0,1,6886d26322c423faad4d5ed0f4d327c7ffa99437d1827aa70db75bad69fd4fd5,2025-02-28T03:07:18.087000 CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041bb43,2025-01-31T18:02:33.637000 CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000 CVE-2024-13402,0,0,db457dd570c17bd968983c250540c2f0f860aa42fcba30a4c9ad5087ce248556,2025-02-27T13:15:09.947000 @@ -248023,7 +248023,7 @@ CVE-2024-1355,0,0,b2f1b87d4539641a8b428dd70f8c417d220c7c7d389eb6cfd2926afaae656b CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-13552,0,0,727d2501f561c703e4b830bea73318d02ecb82132ce891ff47b177cb8690df66,2025-03-07T10:15:14.493000 -CVE-2024-13553,0,0,a65c4cc91a3aeee777f49380d5d3bdb3ff1ba285f8a4384a7c0c1120414efb86,2025-04-01T20:26:11.547000 +CVE-2024-13553,0,1,fc34eb8b04ebb778014f453c84f0e04315f0445d962dd61427960899b5ae7fc2,2025-04-01T20:26:11.547000 CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000 CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 @@ -248038,7 +248038,7 @@ CVE-2024-13563,0,0,7afda43f88427dad437c50be6603e252baea46e3fdf123d9d97727e766d85 CVE-2024-13564,0,0,b852ed41c482550afe0a693c7be7c11cdc0c6f8336e2a90e2b042aa465b4bef9,2025-03-18T12:34:33.997000 CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 -CVE-2024-13567,0,0,af5124607ab72965b24e40d721bc6f6e0673e73f82615e2918903f293201ef7c,2025-04-01T20:26:11.547000 +CVE-2024-13567,0,1,d123d65fa99071e0741ab501c15c4c7f9d688ac84bc56954eb217f3ce4092780,2025-04-01T20:26:11.547000 CVE-2024-13568,0,0,9e74afb56722f02929d754afa7c3b344f0fb3d262b0b29f693d93e682755b19b,2025-03-01T05:15:14.883000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 @@ -248106,11 +248106,11 @@ CVE-2024-13633,0,0,154ac025533dc4d22621ced91d1656294a3c76555b1d7464cf0f1a7ced0ba CVE-2024-13634,0,0,3a323150b4c672f679ff6d2026569072ef08434fb46bd62064336239f23843c3,2025-02-26T15:15:23.103000 CVE-2024-13635,0,0,72c2bab5f06df20fdaf7c4bd81c85014b0b9c32cfde55efe3a5894715555d019,2025-03-07T10:15:15.840000 CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000 -CVE-2024-13637,0,0,417e656cd175761b6c1dff6eaee7ea434863457d7e8498133f796e8abd0daa6e,2025-04-02T14:58:07.527000 +CVE-2024-13637,0,1,5d96c6bb89522516f8706e1f1a01dd67a2444134b1fd629ae29bc2f5d7eee5ef,2025-04-02T14:58:07.527000 CVE-2024-13638,0,0,102825141d2069590b877d41fbbe41cbe336a1c875bf806d99f6a64fbfca78e8,2025-03-06T17:51:06.313000 CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 CVE-2024-1364,0,0,fd4bd6eba90d7f41047ff82dad65588ca674f369d2f73bd4690b89c16b94b692,2025-03-12T14:15:31.377000 -CVE-2024-13640,0,0,7f34d3422aed3857ae3791188cff4b37861ce3e25609ad91123be3efb9e6d5d1,2025-03-08T05:15:31.673000 +CVE-2024-13640,0,1,5a5eccac7caa55cf5fdf480caf93bfcbf485102a71745e42001a8e8a33130503,2025-03-08T05:15:31.673000 CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000 CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 CVE-2024-13643,0,0,976eb3748a453f62f41c154b29792936c30855f6728fa73bdd9cf169ffa6a36c,2025-02-11T08:15:30.450000 @@ -248137,7 +248137,7 @@ CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee CVE-2024-13663,0,0,880b175977ec5581b5d821dbb9009cc924e13e2d7908761bee2204a2ca2d3bbd,2025-02-19T08:15:18.433000 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 CVE-2024-13665,0,0,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000 -CVE-2024-13666,0,0,11cd7d7ac8c2c3e8719f427520890ccdc83f7381875b982c5697a9c4c49e5425,2025-03-22T09:15:12.897000 +CVE-2024-13666,0,1,a2a374b6667dbaa9be6cba76ba376abcf611fd49799ae13c87b0c04343f2ab4c,2025-03-22T09:15:12.897000 CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000 CVE-2024-13668,0,0,0aa823d70154307ada9bfff204a4316560eeef4889173c7fdc8de71c057d0df0,2025-03-07T14:15:36.520000 CVE-2024-13669,0,0,b3c7083f070a0710b4b0ac270ba8bbd5fc43c0200ac36160ad8c8a961f1508c6,2025-02-26T15:15:23.263000 @@ -248232,14 +248232,14 @@ CVE-2024-13757,0,0,ccb7a6dd11d4f3a00241b911576f2d2b0b833a36cb6cbd17683d86a523afe CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 CVE-2024-1376,0,0,f3bef9ed04fa637a76758b7b63eb5f91e0612d4cafba79a88ae6f6e89404ed7f,2025-04-04T18:08:49.257000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 -CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b478,2025-03-22T07:15:23.743000 +CVE-2024-13768,0,1,98379c397f501dcf4792364c8a3bec91868546b3864a78b46d3fa555e16a7570,2025-03-22T07:15:23.743000 CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 CVE-2024-13771,0,0,78dfb02d91ca05c22b83526f5bd3a521e54cc499bf63c37fe482b93e99d97dd3,2025-03-28T16:18:52.857000 CVE-2024-13772,0,0,1d5961251148beac7ef936803d48aea86b346d1b5b12d83fc965e64f4e204bde,2025-03-28T16:19:00.850000 CVE-2024-13773,0,0,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000 -CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000 +CVE-2024-13774,0,1,e6ae1b409727feaef83d8ef3920cb55c315f293b5e235e9cdd591e9ba27fa7cf,2025-03-12T17:01:06.413000 CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000 CVE-2024-13776,0,0,20f64b8670fdb502155216546590f4081a375727609cb9bbffa1c6d17ad9695f,2025-04-07T14:17:50.220000 CVE-2024-13777,0,0,e95e92048e929c187fcb10d876bc7666966c67f194b150a2f5d7dbd9a477d6cc,2025-03-05T10:15:15.367000 @@ -248315,7 +248315,7 @@ CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0 CVE-2024-13853,0,0,9ca5b506400f425411ffb8429a460dbc391b9bc3b23f95ab5f1bff90c22fd613,2025-03-11T14:15:20.417000 CVE-2024-13854,0,0,d546b4011cb7a879d631b5e14f00464bdf3706d88acddc9b236dbcbf49b536dc,2025-03-06T15:09:48.423000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 -CVE-2024-13856,0,0,82813b2412d02f1f9447ca6d4d141ffeeec9a227ed7a621d3693cd8fbde92170,2025-03-22T07:15:24.070000 +CVE-2024-13856,0,1,462630dbe313079a265012d0664950c02d3f54ace5d9ff5887b881e2c21bf6d9,2025-03-22T07:15:24.070000 CVE-2024-13857,0,0,46ee278a60377dbc07bab8543c121955c1e55c1b4db20bc16d6c8ff0081c7969,2025-03-07T10:15:16.293000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13861,0,0,34658a07016fc50f2677e11dda86dedaf14c85bf06440713981fa80fd99def9e,2025-04-11T15:39:52.920000 @@ -248435,7 +248435,7 @@ CVE-2024-1441,0,0,8427bdbed4e9c41538195739a095e1f356570f9911eb0d388312919c634303 CVE-2024-1442,0,0,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000 CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a7e,2024-11-21T08:50:35.827000 CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8dc,2024-02-16T17:15:08.710000 -CVE-2024-1445,0,0,8152fa29c1785a9121bcd86f2b5d145f131a0e12776bb4b821cf262ae342f61b,2025-02-28T03:06:40.330000 +CVE-2024-1445,0,1,d81387bac82813d0ac5d619695a9081cd06ece6a7ef6def044c75ccae3f8d105,2025-02-28T03:06:40.330000 CVE-2024-1446,0,0,5289495e85da9fc9040a80e29268b7f36f0c851dfb3fca66c534797f931b9ac9,2025-02-07T17:47:02.493000 CVE-2024-1447,0,0,2a09d72fdee6c85757279985d988197847bd82507b736f0e94f302f592a1c680,2025-02-13T16:49:07.203000 CVE-2024-1448,0,0,5526aa130c96da8910caa6efdc03c8520a1309b057f2df26b50043d1ed6a5fd2,2025-01-08T18:38:49.883000 @@ -248462,14 +248462,14 @@ CVE-2024-1468,0,0,493e633ce8cf100bfef1d08d0903f698bbdb3a968c742556b570e8bd4e3af1 CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000 CVE-2024-1470,0,0,8f3d9e30e6356f6f03333fcffbe645c7bf7c4fc576142a7e721ae6cb68df2804,2025-02-14T17:24:17.347000 CVE-2024-1471,0,0,777aec2b62d8d0522847f5c8ad1ffb32c1bdfef2816c32249a594f8d812bf3ca,2024-11-21T08:50:39.250000 -CVE-2024-1472,0,0,593c5c88248935b38d8bc270b49c466696a468591761351bb4a10275c97146a0,2025-02-27T22:40:46.877000 +CVE-2024-1472,0,1,7c450b2d4027d22a358b9c3ee7e1cccb02d7c3148c72dc4eaaa55a3e7e58dc2c,2025-02-27T22:40:46.877000 CVE-2024-1473,0,0,12bc01d23f0f4006d4cd9068f8d7be107a40e23c5527983747b4948d686e1c5b,2025-03-24T14:44:29.747000 CVE-2024-1474,0,0,daadec47e39f2f44b7199c43a754dd51ef7d732e2acb33666807f90722fd7837,2025-01-02T13:58:35.287000 -CVE-2024-1475,0,0,7e529a880d46e414bd5f047f8a63bafbd14e3985a6a0fccfcbd403918470f93b,2025-02-27T22:33:02.830000 -CVE-2024-1476,0,0,f9a001a7ca25fc8c88c5a70a9911e03cd3724effb31daf4187c778e14a9f4f95,2025-03-06T18:01:06.013000 +CVE-2024-1475,0,1,babdd8c0ea11526583650cd4ac20dcccb8b07754c44f8d5e3f808808809028f0,2025-02-27T22:33:02.830000 +CVE-2024-1476,0,1,14f7a9af04992ea5e4808f92df907bfd36d25ff854362318b62d5ed3d26f0f69,2025-03-06T18:01:06.013000 CVE-2024-1477,0,0,74348eadb6214ad07d05d1e235932a474c51a995984a56d966fc8b6d5d3bb97c,2024-11-21T08:50:40.047000 CVE-2024-1478,0,0,9b2c9ccb149f278f720fe97b0937c0a2f45e9dd8ea2423171dbb0d6662d41386,2025-01-08T17:07:21.747000 -CVE-2024-1479,0,0,db92e4900f98c38da13e1aec930127099a8bbb5edd6d83478caeac429864e1c0,2025-03-06T15:01:37.443000 +CVE-2024-1479,0,1,96bbf70f70c9bcd5fae3f544eed1ac7f432f1a388d428cf551c1b797d660eff8,2025-03-06T15:01:37.443000 CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0fd,2024-11-21T08:50:40.430000 CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000 CVE-2024-1482,0,0,60272768c52b423065e24b6229c88409ec8bdcb6bc81af7dfbe638244c7c7d48,2025-01-23T19:53:54.957000 @@ -248481,10 +248481,10 @@ CVE-2024-1487,0,0,aebdd5f3f1083df308828b055ff6cb7e14b71d622cdcc0aee79f8a72bcf909 CVE-2024-1488,0,0,87b67663f673aa06e31f51e3daf989abdb6c485653633f988a8d4b2028a2524e,2025-01-30T22:15:09.037000 CVE-2024-1489,0,0,9abfdee93e5295c3172f9f07a55698703bc777f666e4cafe6273a737c79fcb62,2025-04-03T13:13:02.067000 CVE-2024-1491,0,0,d70967d622773fff19c9093c078311d0c0317938407098534f36b503281d0d6b,2024-11-21T08:50:41.773000 -CVE-2024-1492,0,0,05895c37c815f6c11820fd0c8c555e7a68233c1283a69a827b947259a78ef8d7,2025-03-05T15:57:17.980000 +CVE-2024-1492,0,1,2f9ebac6bb5ecaf044099f5a3a1390caccd2fe7d23baecf4910cec0bd60bac94,2025-03-05T15:57:17.980000 CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000 CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000 -CVE-2024-1496,0,0,6064ceab811a755e9326ed5fa06e348d87e74c3e111554b948bcbb04d4664f39,2025-03-04T12:35:21.553000 +CVE-2024-1496,0,1,5a47b3a840e54ae7c7d15b407cd91cc047d15c945ec253a091be828c3e176ee4,2025-03-04T12:35:21.553000 CVE-2024-1497,0,0,bbe3250bf4479120430c0f29b882afc9852aab2e448bf41f0296f987b62a68f0,2025-01-22T21:00:03.030000 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,0633316f47685281ee22de44984ee86e019a3a966e3a05caf35512f407ac2251,2025-01-22T20:58:15.017000 @@ -248549,13 +248549,13 @@ CVE-2024-1562,0,0,1d6819170215a7c372d713175fe11e23023b90700b4f23bf88f8ae8ba6ba6d CVE-2024-1563,0,0,3bbe9628e5eb9d42770c7178f1f369146e12844946493e94f9aa84b3ed67a42b,2025-03-27T15:15:48.940000 CVE-2024-1564,0,0,84ceb93463fa25d921ef01feb499d06d312a061c27da82d4c95abef3e4e86329,2024-11-21T08:50:50.673000 CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f67,2024-11-21T08:50:50.860000 -CVE-2024-1566,0,0,c769a5b1c6632ae4d8af17935781a29a2d6b4efe9f12d46d04060dfe3841716b,2025-02-28T03:21:16.857000 +CVE-2024-1566,0,1,19229fee43d76a12f78941a8b8afe76459e8e587ee3503bc72482e098a960207,2025-02-28T03:21:16.857000 CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000 CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed14189,2025-01-16T15:34:31.447000 CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000 CVE-2024-1570,0,0,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000 CVE-2024-1571,0,0,5fbb92daec88f02dd557173685a13ae9dad08ef3d0f0fb4831efff21414d8ed9,2025-02-27T14:55:18.610000 -CVE-2024-1572,0,0,e7907f55c2b4076717f5c35d22ffc87cc65c5df2655fc26871165e57fe92b0d4,2025-03-05T15:16:25.020000 +CVE-2024-1572,0,1,b4ce857b0ff0af4e37b6ac1a6b1ef432f3a1d613103d7692d173928e3f6c6559,2025-03-05T15:16:25.020000 CVE-2024-1573,0,0,55326b48e714bd45f8a7f03a13179fac399e55741cedcbe359268a4ab07b26b6,2024-11-21T08:50:51.837000 CVE-2024-1574,0,0,4b773e15e20eaa265c844cea28d7f429a990bf0f316d61c1be91dcdcc753dad5,2024-11-21T08:50:51.953000 CVE-2024-1575,0,0,47396d8f2bdd90814814821ab28fd5bb094a96f06ae089ffd65db5fdbabaf2a4,2025-01-22T22:33:15.853000 @@ -248567,7 +248567,7 @@ CVE-2024-1580,0,0,b4c85f804f3ce2bebc9a67ff4f8729e521ce8a5ac9e2676ae788d23145f50c CVE-2024-1582,0,0,b464a7d153c2341a87cab438d3cbd89bdc0b71381693f648c2e94a9e1b3f1c2d,2025-02-11T15:57:12.813000 CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e06,2024-11-21T08:50:53.187000 CVE-2024-1585,0,0,71ae3df5898ed1d800d67a7dfb8fb2405deb4fb1f3280ed74a24204758d911c6,2025-03-05T19:19:46.430000 -CVE-2024-1586,0,0,d57c818aba605692857b8a35b32d1b940effc9e4cce5f547504161c2949193b3,2025-03-04T12:36:37.443000 +CVE-2024-1586,0,1,5b6a566c25b4e63c19ec9d7aecd32a6c90ebf906e55951e32add9318b78a0c8f,2025-03-04T12:36:37.443000 CVE-2024-1587,0,0,351e6218f77b476bad7a82134ac9936d1eb8a589e059606c9b4f041676eb3a6a,2025-04-07T13:50:02.350000 CVE-2024-1588,0,0,a1aa523f4dcf5313914b401109afe06ae5b407d4667f0ad12f7a9b5c3e0bdccd,2025-03-28T16:18:52.937000 CVE-2024-1589,0,0,3828cec5ba897ab5ce440048677ac8f1e63575e630c777982dc0f31348db94ab,2025-03-24T17:19:10.643000 @@ -248587,14 +248587,14 @@ CVE-2024-1602,0,0,56ecc218dd37ad215a177db8079488241e64c43dc3bae7eec42fdf1bdb8477 CVE-2024-1603,0,0,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 CVE-2024-1604,0,0,6948e42ad454d9c75129f2d535fc4eb245afdd1c22afff76e86465241e36fb86,2025-03-06T19:37:43.470000 CVE-2024-1605,0,0,5a04c56bb880a03107a018c4fad8602e1dc834ac8f57bfb03ffc4f79cea975a3,2025-03-06T19:38:40.183000 -CVE-2024-1606,0,0,9d9f1fac651b6bffb1eb04a22629a4891182b78296aa410f60baf74c74d02899,2025-03-06T19:38:53.547000 +CVE-2024-1606,0,1,561bd8bd76c85d5363d13b9716a999db804447eaa7430f5c9309d6f3a1539b31,2025-03-06T19:38:53.547000 CVE-2024-1608,0,0,9fc9a95fa8a302a1292a98f8c5b179f47af8516752ad8ac3c0a828530b462a4b,2025-04-02T20:11:33.327000 CVE-2024-1609,0,0,fccce712d5b51d64f058f686add884943b63cc50b1aa573fc5b42dba9ff87c96,2024-12-25T04:15:06.750000 CVE-2024-1610,0,0,d5812a4c168fe77b942e08446c0de47072455d9314c53f81af852c4034bb9f3a,2024-12-18T16:15:12.060000 CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af689,2024-11-21T08:50:56.193000 -CVE-2024-1619,0,0,3ac2ad5560e8d0067ea4ce05d0693cb096b3fd625732308d07ab009ed654b43b,2025-03-04T12:38:06.733000 +CVE-2024-1619,0,1,7cb397741eaf7ef50ae32ff5e5beb0289ca44700aeec303c9327a5ea8f370d67,2025-03-04T12:38:06.733000 CVE-2024-1621,0,0,4f71e917a983b004200d9504ffd2175f3bc02a73b7994fa10c0feba74dd0181d,2024-09-17T14:12:41.620000 -CVE-2024-1622,0,0,2bc154345b16071bc233085fef47a37caf6f01b95216a34b5eee10d95425eff4,2025-02-27T03:16:29.710000 +CVE-2024-1622,0,1,d2eaf292f5335148f077596f8ca3b44d91a6a38a1c9575f27a87d34b8b70b8d0,2025-02-27T03:16:29.710000 CVE-2024-1623,0,0,b2e5e662c61a9868684fca32a759fa17b6c737d7b9e7c4f311786f8aea592fb4,2025-01-23T18:10:39.310000 CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000 CVE-2024-1625,0,0,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000 @@ -248678,7 +248678,7 @@ CVE-2024-1706,0,0,d0c8041ce0cefb77b49ce5911bc472cf73b5517101234b9b397318997b4dbd CVE-2024-1707,0,0,8b177dd84964068124b25151fa05eaa10522c84fd62677e60183bb4544b4aace,2025-02-12T01:21:17.617000 CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000 CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 -CVE-2024-1710,0,0,03b0301c04615fd11703e265ee09a925b1e771019388661955ff9ca3056da38d,2025-02-27T22:13:12.060000 +CVE-2024-1710,0,1,d38cd0e4ca55775ec9b5c61cce7229b2d8c0637d8090eb42e53aebdc50b6a6ec,2025-02-27T22:13:12.060000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 CVE-2024-1712,0,0,fdebbcb1d7b1c7ec991ba78bfd8ed7eed39b0c0d983fd7e0a307d27d960b06a6,2025-04-08T16:31:49.733000 CVE-2024-1713,0,0,2c4b0a7ec23a0438b0f7f0a179c6acb91b550ffcb40b7c7185413e8a48111cad,2025-01-23T19:18:07.843000 @@ -248687,7 +248687,7 @@ CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e6 CVE-2024-1716,0,0,9071d172382b58d2d56e01c889ae6e33397cfcf61eae965493f6ee5942820f8b,2024-11-21T08:51:09.123000 CVE-2024-1717,0,0,c3adb19f25e9ee450a585b7bb91ab43887106c17932e8cf3f974c96db2950633,2024-11-21T08:51:09.260000 CVE-2024-1718,0,0,70746d52697ce738d10ef4d93f461374c829b5e4c0cdb84c66e02ad290238127,2024-11-21T08:51:09.383000 -CVE-2024-1719,0,0,b1be477187ddf3210ba9eb0ec4a92e8b3036ba2300349981170c9fb8be1282f0,2025-03-21T17:48:31.470000 +CVE-2024-1719,0,1,bde9fb58fd4a170c8e13bcef23a5d86c68e3c56233da5b3c458caa1c354d0af9,2025-03-21T17:48:31.470000 CVE-2024-1720,0,0,ffaa3e4706968a22cde548a2c01de699ce397eccc11d936af06b490c297ae578,2025-01-21T16:55:34.067000 CVE-2024-1721,0,0,d0c914e77af4545b0584eaf250ba5ee3ac40626828eb6c5198526b9da864dd02,2024-11-21T08:51:09.737000 CVE-2024-1722,0,0,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000 @@ -248725,8 +248725,8 @@ CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f6450 CVE-2024-1754,0,0,1a62e04cfc963db540100c68219b255ef7962cf0c80d59371fd17c6fd5a6366b,2024-11-29T18:15:06.763000 CVE-2024-1755,0,0,a7ea4e5076a3c70d07f1af2be88a686318f2826b2707f5d9b21f454fe91f58c3,2024-11-21T08:51:14.617000 CVE-2024-1756,0,0,1fee8b5c3ee36b111ee85a3b990a1a617db166801ae5311bd331c34be629666e,2025-03-20T20:15:31.060000 -CVE-2024-1758,0,0,2090925a76f71054d14457b1c3ec5ca86bfd30edb93c5c434e97f472b358c692,2025-02-27T22:10:50.257000 -CVE-2024-1759,0,0,c8ba467071cf346ec745a9e5d8e8597a923cfb677c329e24e430d58ed7e0f042,2025-03-05T15:16:02.960000 +CVE-2024-1758,0,1,bc176359dbe050289205294676bc5884e439b7fc514f8e4b501d9391065a01bb,2025-02-27T22:10:50.257000 +CVE-2024-1759,0,1,a884607ecc1c1da095cb826c7db28c1e2942b7a8917a48e97c45342240696b89,2025-03-05T15:16:02.960000 CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729f3,2025-02-04T15:36:46.757000 CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000 CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000 @@ -248758,13 +248758,13 @@ CVE-2024-1787,0,0,a020a5c2a4ab7ad70ca3624e6b182fcbe5b860cbd5df83fa706e200dfd1c4f CVE-2024-1788,0,0,944b68ae7c4fef863b1d252fdfc9f6e4803358c1ba216ca2f540fdf15cd93ec6,2024-03-04T13:15:44.523000 CVE-2024-1789,0,0,2d072fd3e0a14c223d8c9fc1d03732a6e2b678d1507f636486db4f8121dced31,2024-11-21T08:51:18.780000 CVE-2024-1790,0,0,3a79f763660fa01aa4e9e14b4bfe838dd8ad674d5888cd672cbe685b1f521bfb,2024-11-21T08:51:18.903000 -CVE-2024-1791,0,0,9fc92fce6620f56329963013c073d4bad4bee973b97a95be4fdf3a72ccda6999,2025-03-04T14:38:30.130000 +CVE-2024-1791,0,1,2a8e4a1ef1543b6f944880d4e7bc8f1ad9c287b664ed79551f81ee47cf7f013c,2025-03-04T14:38:30.130000 CVE-2024-1792,0,0,5c91c39087a11a285932b6df2f786b9ee27b789c298d617daf628ee7a5671929,2024-11-21T08:51:19.200000 CVE-2024-1793,0,0,f9b0c2f740f27aa1bf93ed4a2d5acb1cf9633c5f21531d38744a674592b4f9de,2024-11-21T08:51:20.010000 CVE-2024-1794,0,0,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 CVE-2024-1795,0,0,5d11bf1b8dc2b5c0d5b4fc8d4df7bd6ebd06ec9fc982e70886676d8ffd994d14,2025-01-23T19:27:09.377000 CVE-2024-1796,0,0,68e9ddfacf3afc0af79bfa53830daae380aee08e50d59d0729da4a8eb41d2478,2024-11-21T08:51:20.390000 -CVE-2024-1797,0,0,ab91523011138ab8a74cfd7dd781824ae8fff9592d664d0a72543dfb1a99426f,2025-03-05T15:15:28.940000 +CVE-2024-1797,0,1,375fa31d2830b492cd642c02bb9b7c1d18d21267bb0adc9a8b028d0c9d52d4dc,2025-03-05T15:15:28.940000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 CVE-2024-1799,0,0,f9b05aef34f051d66c559785b2000250f129f8480eabba8681740cc2ff082c4e,2025-02-04T20:59:34.903000 CVE-2024-1800,0,0,4198f2af30da2326c4f00a8a81874f56fa7d692eb5115afc306e3d02e598b03f,2025-01-16T17:07:24.633000 @@ -248810,7 +248810,7 @@ CVE-2024-1843,0,0,a76e034da396f7505219e1d278db49bc33e2902c245c09bc0784a0a5ee44b1 CVE-2024-1844,0,0,63d73d8c0dc981d90a8a5642e9bafd84801f8e29cef61b3806812a30d28ff6cd,2024-11-21T08:51:26.370000 CVE-2024-1845,0,0,5ad32a93a39ee3c1ad04088537a909b22750fc076779f4791b0dda34383f6d29,2024-11-21T08:51:26.497000 CVE-2024-1846,0,0,9ccd95edd5e452dd2dbc4f35f1db593ca186fc01930678a694837dcbc91417e5,2025-03-14T02:15:12.983000 -CVE-2024-1847,0,0,9d56f32727337c0677e949ba5919786fc2fdb42dd1d2e76dd0add7e8d4f62b49,2025-03-03T18:18:50.223000 +CVE-2024-1847,0,1,e296f7b884a343f590137e3b59eff3492288cf8542d166a95bc563d3906586b6,2025-03-03T18:18:50.223000 CVE-2024-1848,0,0,8735f85a25ad95e4a65a2b665132446d6359269bce36b36833981dd6b68408e9,2024-11-21T08:51:26.970000 CVE-2024-1849,0,0,8665027dfc76b0d19cf6101cc43e8e713146c9df3130708dbd56a031ca923282,2024-11-21T08:51:27.100000 CVE-2024-1850,0,0,488104d209793394a1bb79f55aba5cb71db3fa74266892e446dd3f6d627498f2,2024-11-21T08:51:27.283000 @@ -248818,7 +248818,7 @@ CVE-2024-1851,0,0,d990844085aa7fa399508e38913b4a91b00ad7673d1acf254c137c16d32111 CVE-2024-1852,0,0,b9d683f5957eff25406d3f28768343d0f941f69d129acd817b869c293ba088f0,2024-11-21T08:51:27.510000 CVE-2024-1853,0,0,6a68689fcd79fefcde169f14e1209eaf1cec9e306cb6544a77f67f77747e937e,2024-11-21T08:51:27.640000 CVE-2024-1854,0,0,2e36222f21a81e0f7467ee7199d8dd61bd94227662e032a1167e453ae3bd3eb4,2025-01-22T20:04:10.890000 -CVE-2024-1855,0,0,034343ba1e469874cc43b56869352f672d9d1a0fd0ce2398b58ab75e4e463671,2025-03-06T15:03:46.137000 +CVE-2024-1855,0,1,e3fc6810811ffe3db702071b4f22b5a5bbad8b9d42797a095ea218222ee660b6,2025-03-06T15:03:46.137000 CVE-2024-1856,0,0,e7e84d2ffc2542d366b810418f9a74b608acbb369f4f1196ae3112dfdd4ef3fc,2025-01-16T18:06:29.870000 CVE-2024-1857,0,0,c5708d7f5b9aa52c50a089d9d955a2ad47405cd7286310e3cff153bb8ed9df7a,2024-11-21T08:51:28.163000 CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce9272259b,2024-11-21T08:51:28.283000 @@ -248848,9 +248848,9 @@ CVE-2024-1881,0,0,2558a52b142d519b854f3883944e8ea95b305aa8f68977dfa1c288c02b89c8 CVE-2024-1882,0,0,a8b97a99fa856b3f930994d912c238658842dc8e8826986c5dc2afc7385cdf50,2025-01-23T20:30:14.080000 CVE-2024-1883,0,0,8c261cc228d1b82620cf2cdef8c32777357acb917a78f3f5e7773813436c2dd4,2025-01-23T21:06:04.687000 CVE-2024-1884,0,0,dd9991f23f96d1475f8f87eedbe9dab6f95e7451746a5525c0e25a086339b8ab,2025-01-23T21:06:27.910000 -CVE-2024-1885,0,0,06f579d44e119a089cbd52e7311d0956d9c1264f09175607388e8fc85792b4cd,2025-03-03T17:34:44.300000 -CVE-2024-1886,0,0,77a8b42e89358c9aa5f413fd907eecaac3fb9a62a3825470ff25bfff6c1971a0,2025-03-03T17:35:18.303000 -CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 +CVE-2024-1885,0,1,d64a2e4b4844023c4e991a630408075a39dc8f9af03d4e6cbae711adf44d561f,2025-03-03T17:34:44.300000 +CVE-2024-1886,0,1,3be605d9cd61567cdc88ba20487e459bac171a2c6773c14b73f89a5f473c9e04,2025-03-03T17:35:18.303000 +CVE-2024-1887,0,1,3a6c37c6ad6ea6516f490a44664b2b3310aeecd928db7fadf43cb3b00ee5b4d1,2024-11-21T08:51:31.743000 CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000 CVE-2024-1889,0,0,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000 CVE-2024-1890,0,0,d1bd71354155e1057cad63e8547d7592dd6f60af83171fbee879c3e6a6bee006,2025-03-11T14:51:33.223000 @@ -248915,7 +248915,7 @@ CVE-2024-1950,0,0,3b78724f47d95eae838c9517d7b6a9cc63d24b31bde6e63be2560a05de75ca CVE-2024-1951,0,0,cd8e2d69ae8f2ce6c4acde1e3e448fb2ab3b4f80e65abbbd45c03603f9009299,2024-11-21T08:51:40.180000 CVE-2024-1952,0,0,a90e779e6f4e3b9a443ff3a00d590fae19e8c70b61a3edab98bc3697c97dfe60,2024-12-13T17:08:36.583000 CVE-2024-1953,0,0,1522ba7d2a573c63802ba4de86c3af04c0fa83971df2e44212ec5d8f176838c4,2024-12-13T17:09:21.973000 -CVE-2024-1954,0,0,db73848e6097ad3e17372e5b4f80e5c3a95af76e464bff927e6c59c96ee65878,2025-03-04T14:41:38.773000 +CVE-2024-1954,0,1,d71051e5be548a2ec5c850610a521edf08bf34afaf568702867774fb49a068fb,2025-03-04T14:41:38.773000 CVE-2024-1955,0,0,701110096e7bd8a2d60d12bc137d5a9b5ec27a9047a559becb9951337de8bef2,2024-11-21T08:51:40.713000 CVE-2024-1956,0,0,089208ad7b17e6352512e7a74e329954e2dc5c6df51f4c3205ba086b07fa0983,2024-11-21T15:15:25.567000 CVE-2024-1957,0,0,7e1f8b40eb55b0f99e2887357d9f2bde1f6e204506101cef441021dd778a0478,2025-02-27T20:17:06.027000 @@ -249010,7 +249010,7 @@ CVE-2024-20046,0,0,3b0cb38468dc6ce3f4f783d34648c8b0b74b5ca380d79f4af4e2082d8089e CVE-2024-20047,0,0,c47752035c532511849b03dd4c5e0abb4ea1e7cb27faa513eb222a38fcc318c5,2024-11-21T08:51:53.960000 CVE-2024-20048,0,0,535fd04d026c6f8c45119acbdff0eefcaae366754effe78a06af4607e0692f06,2024-11-21T08:51:54.143000 CVE-2024-20049,0,0,91b688f57d4bdad45ee8b7fdcff21b8f8982a4fdd54ac23580f83ba7ea37a1ae,2025-03-13T17:15:25.873000 -CVE-2024-2005,0,0,64bfc5518ed2a9d30830e78a671cc2b1cb1324442ac6267d03a765e6fc0ab4de,2025-03-04T14:22:49.413000 +CVE-2024-2005,0,1,0e8b08b245bb0780bd34f1ed3f2804a5abca3a67624fdb058a1c347877f6988f,2025-03-04T14:22:49.413000 CVE-2024-20050,0,0,27737cea1576189891d35253eeb8bd58c495c56193d77fabca31a2822df9db7f,2024-11-21T08:51:54.443000 CVE-2024-20051,0,0,effbe7e44198a140c787f3268c0b0d4546b1ca8ce2d16e1ab5ffb6720ac6cf3f,2024-11-21T08:51:54.630000 CVE-2024-20052,0,0,429cd8ebc968e948252a6903d57a6ffeac603fe9d66ab5e6725a16f8e5a8895d,2024-11-21T08:51:54.807000 @@ -249264,7 +249264,7 @@ CVE-2024-20370,0,0,12ca33b57906c89e9f04aab6c8dd3b6057b12d4f2e523599e9a3d04b119c3 CVE-2024-20371,0,0,864b4688dc510e6e88eaca5637bc36efd587712a23b9216e6371539f84e30743,2024-11-06T18:17:17.287000 CVE-2024-20372,0,0,93a6e397043c3e3829ddb184e4e2c4ba0788f1ded31800181384ad2b04918225,2024-11-26T16:09:02.407000 CVE-2024-20373,0,0,3f369e79041d3a277fcd8f756f2a7ca2dd4ef74fa516883daab97c34e6b7c1db,2024-11-18T17:11:56.587000 -CVE-2024-20374,0,0,5825f5ef58e6a1c60a98b83779b0bf926825033b318b55d1828ea6cc76fa135a,2024-10-25T12:56:36.827000 +CVE-2024-20374,0,1,3c60814acc884d6ea4eb059134fb977b9d68c2deaa22c0c3ff214f3ad3807d5e,2024-10-25T12:56:36.827000 CVE-2024-20375,0,0,76452cbc643dd64ff99fa4a08a367f7941c1a52367260d5846ec4084cc664322,2024-08-21T17:24:59.627000 CVE-2024-20376,0,0,4d9ef321dca2c56af9f11193ff6f6d8605c6a22823024e74564ceebb7c9450b8,2024-11-21T08:52:29.887000 CVE-2024-20377,0,0,738d1f26080969998de2b0d240ec661cdf346903ba67909b455df35ae7b33be8,2024-11-01T17:30:14.350000 @@ -249731,7 +249731,7 @@ CVE-2024-20923,0,0,81d12c4983abf201118d1e0e2c84f838130f2dbc5f0028ade14fb5a8b4749 CVE-2024-20924,0,0,6696eb44649258a777624d23cb49fa99280b9707737aa5d67f5a22ba698986fd,2024-11-21T08:53:26.553000 CVE-2024-20925,0,0,ba37362cfed4e51f97ffa3fae9a5064e0b5685eb36d0a58b66b59b0d265aa5a1,2024-12-09T16:44:10.737000 CVE-2024-20926,0,0,76d4246dcda29824b0116625013c1c020b190258900cddbc68d057b4e3a565fe,2024-11-21T08:53:26.797000 -CVE-2024-20927,0,0,9eb3a711432f92a63e5ccdb707a5a061985ee7ad4c9995c5c357dd6c26563ee3,2025-03-18T16:15:20.147000 +CVE-2024-20927,0,1,970dde796a341ffd974dfc33a06491cff482b4cb4e71697a35dd2f510c0b9de5,2025-03-18T16:15:20.147000 CVE-2024-20928,0,0,f899f7f661fec3b37d33a9edf522b5c93f56abf2b9527ffe59b04e93771f608e,2024-11-21T08:53:27.050000 CVE-2024-20929,0,0,829d6d225a5b429dc771b2c2eb37df1a4f0013362919a00d1fa6a080f7f8ad03,2025-03-13T20:15:16.907000 CVE-2024-2093,0,0,216093bf32dafd7f4d068d9be2e93a5e48f4289f8b02b94ede5b9d48e7a864a0,2025-04-11T13:06:56.757000 @@ -249746,7 +249746,7 @@ CVE-2024-20937,0,0,4f80cbff14ef8426eb8cf91f72aa46b1043ddf88995f5ff9ae93fc2ea4552 CVE-2024-20938,0,0,6fe21b52aad41d5c17bb42ae4439eea9ca26609905457e042a739e5c570e5ae2,2024-11-21T08:53:28.290000 CVE-2024-20939,0,0,a61ef26bf2d0edb06b899a122ed306c452492ece485364c57e14dc58ca287a91,2024-11-29T14:08:10.783000 CVE-2024-20940,0,0,2eef388a674fa50646c1a9e94e9cc85f45f15970a44431d112399a9bcd04b4bd,2024-11-21T08:53:28.510000 -CVE-2024-20941,0,0,979ab879e23ba3c79bea46ae3f7a52ecf257a8180aebfc1872017418c29dd488,2025-03-18T14:15:37.983000 +CVE-2024-20941,0,1,b6a41f1de323d6b53f92be4c434b45ea11131ea96af92f83948f995f3e52aa9e,2025-03-18T14:15:37.983000 CVE-2024-20942,0,0,2598677f0c454ed9ee0ba0704705d6276c039cbd72f273ab754a1b849ce636d5,2024-11-21T08:53:28.740000 CVE-2024-20943,0,0,2c36f7a6fa1006a89f2760d0d8eefe62b68cca49bc52e1d558e41308b68d37eb,2025-03-27T15:15:49.273000 CVE-2024-20944,0,0,431d40edb070cddbf02cbf85d009e07a3054fa640a623707fd6570608afaa9bf,2024-11-21T08:53:28.977000 @@ -249782,9 +249782,9 @@ CVE-2024-20972,0,0,710ca7f60f4b9ddd3c3794f6a04fb0f075447b0d688ed8fb3748793ff3860 CVE-2024-20973,0,0,7e5cfb6ef024cc36b85f2851ee30311941c4b16556b9d7be340cd907e7733015,2024-11-21T08:53:32.493000 CVE-2024-20974,0,0,789952ac59447c7ff64df1e2ec94c96e4804a957dd34ebe72c3a6fe196ffb767,2024-11-21T08:53:32.630000 CVE-2024-20975,0,0,dd20d0069a7b46e6b5ef3195164e18454c8ab5d0366ee17da05b6aaa3d1b5e67,2024-11-21T08:53:32.753000 -CVE-2024-20976,0,0,8519be35615c99903dfd351cde752e7580af95d765de544d7b56622a69657fe6,2025-03-17T17:15:21.820000 +CVE-2024-20976,0,1,1509403adc80919efc4e2dcd53d47bb280593908cda559b743afff02c93c35dc,2025-03-17T17:15:21.820000 CVE-2024-20977,0,0,e2c8ac5cdf6105166e03ada781b7e22b6cfa6139535dfabda7b89d42e76cc173,2024-11-21T08:53:33.010000 -CVE-2024-20978,0,0,3f0bf354464f938b515157d641fad66929ad192ed773179f405c96023177d5f2,2025-03-17T21:15:11.737000 +CVE-2024-20978,0,1,f4bf6dd234980fb40de9741375ee63eacd80698f4f37e1de7c107048bf2022c8,2025-03-17T21:15:11.737000 CVE-2024-20979,0,0,c2e22efcc3391b3cff2af42cbbe4c99448a9ff390e8ac1d56f07df68987a1379,2024-11-21T08:53:33.267000 CVE-2024-2098,0,0,dcd7d79efd9e9574f8887c1c74fd19c244a31d75b5999ab41ab2bbf3333d1c54,2025-03-21T19:16:48.597000 CVE-2024-20980,0,0,757ff6975fcbd959a7c8d660b7c3b37dbc1e514e0d5ea371d15eb8ad23a05f8c,2024-11-27T16:37:00.523000 @@ -249812,11 +249812,11 @@ CVE-2024-21002,0,0,acbcf2b77c5e9aef3c722c2851e5b55c9dbc45865ecee4cd7c315b1686d44 CVE-2024-21003,0,0,dbba28cf16a4a9b0476d78a6a4d73ba11de06d2122a0b9d30c663bfc1a872381,2025-03-29T00:15:17.820000 CVE-2024-21004,0,0,7fc1f91c1bfcf63662bc83c23399306d3dcf14dd0f0e2da4987f97b55b71f163,2024-11-21T08:53:36.080000 CVE-2024-21005,0,0,57eb5426cdfea629d7918a5a66963363eb4d5c32ff1ca799fec374e8db3a8831,2024-12-05T21:52:13.690000 -CVE-2024-21006,0,0,e680337bc522caa1c873fb9afc9e522b974b790440ed68af198ab7fd75f19753,2025-03-18T15:15:47.150000 +CVE-2024-21006,0,1,73a570c2332058f2ba08d00357f100a4f04623cd6f33cd57f864b0294d57ed91,2025-03-18T15:15:47.150000 CVE-2024-21007,0,0,19d4839f8c0c4494be18be45f38a468212164a7bf22822a55cd6a6c1093f0744,2024-11-21T08:53:36.427000 CVE-2024-21008,0,0,8a4545d06255aeb1f38036d10f78cd22c760a05cf6c6be0c80410804de7018ae,2025-03-25T20:15:20.990000 CVE-2024-21009,0,0,af812c5e8a84169cfec251c1e067fa25e23db6feadfa3217596d3dc669751ab0,2024-11-27T16:35:46.023000 -CVE-2024-2101,0,0,eaf4c1131c83288640046aa42047193f9fa8494315828e28602c8a67e1d6166f,2024-11-21T09:09:02.193000 +CVE-2024-2101,0,1,94f217d299d7a8dd2c698af3b1b5b0b04a638778e60ac3c409c40f432e189a5f,2024-11-21T09:09:02.193000 CVE-2024-21010,0,0,4f1bf3e5f2036cd1d144f515ae0f7514a4c2c0d6c398c815cc074467d568ec1d,2025-03-17T15:15:40.073000 CVE-2024-21011,0,0,a46e5658273d6319443d01f0663a109447cc17df5651b379924f885eeb02f952,2024-11-21T21:15:17.520000 CVE-2024-21012,0,0,523d04602536c0847fc672427eb68c0722abf701b6bdd6d27ce8bd72e6d2a964,2024-11-21T08:53:37.010000 @@ -249827,16 +249827,16 @@ CVE-2024-21016,0,0,5808b3cf4e0616bce1a906c6dd1c87833f90a139f4b6ed66e3a1f9a1d2789 CVE-2024-21017,0,0,131bf7f6dcdaf45e79638fd18bc21cd4d8e6d2da854ef4a48ac6c2918cc2b8e3,2024-11-27T16:31:43.653000 CVE-2024-21018,0,0,2add56c9bed955dd9dbe226644a2ccf91080602d335e0becef126ed57d7f9f76,2025-03-28T19:15:18.203000 CVE-2024-21019,0,0,b2175ecd2ee6a3b54aae54fa47e497761b9da4d1466cb5747da93be14886c6fa,2024-11-27T16:31:28.057000 -CVE-2024-2102,0,0,4855f567fd8c551fe62eaba438c078048f6265c7703d5a2a84d1ca6568dad4ee,2024-11-21T09:09:02.413000 +CVE-2024-2102,0,1,82100e0402f0518b4d03187f11b1b40a248cd1813ce9ee6cab9bffc53442f1c0,2024-11-21T09:09:02.413000 CVE-2024-21020,0,0,d2eba680681e2fb7dc0796be2a1eefbc54d49352eb0caaf782f2abaeada58acc,2025-03-28T19:15:18.377000 CVE-2024-21021,0,0,2185d0d9520bd9b965c7a9cb524371ed61832acc89af4ea8ab1712e50d98fd1f,2025-04-10T17:41:30.303000 CVE-2024-21022,0,0,2f78adf409a130aaedfee1e6621bd5e964d4399619a87627dfa8a21677f34e6d,2024-11-27T16:31:22.270000 CVE-2024-21023,0,0,639fa4e6a345a89e6abc65573277f6c1bbb73ec387191afb893a2e72503a0c2f,2025-04-10T17:41:56.140000 CVE-2024-21024,0,0,22798d4b68c52eb493cfe689aff459faaf8d179b78e934d2b2ef2680c2710f5b,2024-11-27T16:31:18.080000 CVE-2024-21025,0,0,cb940b17b62838bae7c7173612add05e07812946f7f9845c549dee6f7e994c8c,2024-11-27T16:31:12.720000 -CVE-2024-21026,0,0,af98bfd86b849b352167b6e894321f80af9f7e3d7dfcb02d784c5c4744fef10f,2025-03-20T19:15:27.993000 +CVE-2024-21026,0,1,4e3f965507e29c7a2f885a92e05cbd70e3bd0a733cd89d3672cceea811046bb5,2025-03-20T19:15:27.993000 CVE-2024-21027,0,0,a61ffe37c9f1d4a384893fde109de27008fa272fa0f6ae950bf7e6f33ee668bc,2024-11-21T08:53:38.737000 -CVE-2024-21028,0,0,bb1dd15b970e61b4fb0458b89f9292f66ec983d4f46c0a33946fc22d432b7b84,2025-04-10T19:53:40.083000 +CVE-2024-21028,0,1,18d80213e84bc8123b709b891b053abcb23fe0ea19d38e7ca9e31a07ae5731b2,2025-04-10T19:53:40.083000 CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000 CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000 CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000 @@ -249864,7 +249864,7 @@ CVE-2024-21051,0,0,2bf5bb9891dd3379b2b810205d92c9a602d41f04d60c825867a1638e2db16 CVE-2024-21052,0,0,58e479c3cecf8f4c7ed1eb744a29f84f86f2a4ec77beb2a150fda27cb9bae490,2025-04-09T16:08:13.900000 CVE-2024-21053,0,0,167efe3d7529b6a81b6c1a2c9a1762e0d9bd7b6c1f24ff4b8a171489ea82c76c,2025-04-09T16:08:29.147000 CVE-2024-21054,0,0,2b3fbc5074f5df9859008bcb33e8ec23b03c8d49de2eba607a7e31c2825b16cd,2025-04-09T16:08:51.900000 -CVE-2024-21055,0,0,a95b7afe917900e71242e21db993c7eddd44d8ce48d8742f5399a7a7d1111b87,2025-03-18T16:15:20.353000 +CVE-2024-21055,0,1,82efca55d7127666f03c09688f36b67bc6bd22bbb87ecd48ff27b49229cf5b8f,2025-03-18T16:15:20.353000 CVE-2024-21056,0,0,b3cd8883597d5b020b20843f644dd494e35df9dc3ebaf9876d8f8890e4200173,2024-12-06T16:37:56.173000 CVE-2024-21057,0,0,4a9f81b661d28e854c6177578685a8fdc9a93a088cc87486a5c618eb53ad7d66,2025-04-09T16:09:09.343000 CVE-2024-21058,0,0,6f275eaeb7b9391d2cc7e42353c58a7a5acdfd132d12496c0283d23778c3ba70,2024-11-21T08:53:42.340000 @@ -249928,14 +249928,14 @@ CVE-2024-2111,0,0,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5 CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000 CVE-2024-21111,0,0,85e2f52425c28e0c62da6f146a926d9294b9d91dde4d1c9fd98a8331db596932,2025-03-27T21:15:44.783000 CVE-2024-21112,0,0,e664a0bfad6bf191704b65331979f5fe6323f988096f42237126663549a32339,2025-03-28T19:15:18.860000 -CVE-2024-21113,0,0,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 +CVE-2024-21113,0,1,a223fa6ecef0fcb4bc8137aeb715daea99e4112cd21bcbfbe763f3d9546a5a71,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000 CVE-2024-21115,0,0,8eb07ba31d20a921dd6173aec3bde1e69199870429fd1b2673ef14f195a8eed4,2025-03-25T15:15:19.887000 -CVE-2024-21116,0,0,7e2c4136f878188d95cf72c55ebbee15e332a84362d7370fd65d684963fa1fc4,2025-03-19T18:15:20.193000 +CVE-2024-21116,0,1,eddaf5fc9fcb0dd40834a9be5f0837087d3b7c83f7301c3e2dd74a5c37313a45,2025-03-19T18:15:20.193000 CVE-2024-21117,0,0,5d43a21324183b9d6abac7bf386e13c102239eb07d87d78b640f0340e813f8d2,2024-11-21T19:15:07.527000 CVE-2024-21118,0,0,dfb174443743455639d3d519ae3e7800f4183eda1b765acea21c3bd12058d487,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 -CVE-2024-2112,0,0,6010ab32a281b711a97b70a968fb6b98cd442caad7cab070c8d4cd909cf9c942,2025-03-06T16:08:28.757000 +CVE-2024-2112,0,1,4b7d4ddac6afee13ab01bae281f4dd6ec3a8ad71f7bb277f57617bf366b9e60e,2025-03-06T16:08:28.757000 CVE-2024-21120,0,0,9a17f31ae00741afbe78fe1de8126b80393b2d436777540d9a68aa70b8ecf420,2024-11-21T08:53:49.407000 CVE-2024-21121,0,0,02c4a03e7fbd9ba791d46b8b949480798dafdfd19a3b80b50d2be4ecd68c7cc8,2025-03-27T15:15:49.563000 CVE-2024-21122,0,0,3c119f53f951a34b6f285ab076d3d99b946734b11d0251f0d44ac51ca3fced6e,2024-11-21T20:15:39.223000 @@ -249952,15 +249952,15 @@ CVE-2024-21132,0,0,987a799b19a7e7bd596caec84e5104553b08a672468aa5d0c46b6c2bb08b9 CVE-2024-21133,0,0,10f69656085c42e9a849d4dcabe83318eea049049395271942ef70a2534662e1,2024-11-21T08:53:50.837000 CVE-2024-21134,0,0,dcbe5d92aa08c7bd192bd36994d01957334494a6a59b5ce1ce1359b992bacaff,2024-11-21T08:53:50.957000 CVE-2024-21135,0,0,c86e5c804add53084e4d35d6a12d09babfc79d7ef6ed692753959bd30b31e714,2024-11-21T08:53:51.100000 -CVE-2024-21136,0,0,dca92650df3e525109c941c39562400cb938d44ddea8bf50295528a899512d54,2025-03-19T21:15:35.593000 +CVE-2024-21136,0,1,7010dd31622f1c3200a9cc087b0359fdbdfde755e216525146c92b6197b0f656,2025-03-19T21:15:35.593000 CVE-2024-21137,0,0,b5450e13f6bcb5f434c674060c624ecba80745b2cac31a677d762dda5f4def61,2025-03-14T19:15:43.810000 CVE-2024-21138,0,0,d85d79c45eb3ebd2d0b529196a85213bec464688c6af2c66a56e96e5f4af17d6,2024-12-05T22:05:55.937000 CVE-2024-21139,0,0,7f0885ed1752480a56d0d9343c5a8f780bac7c8a0ef57214cf469974f9ddd7c2,2024-12-05T21:41:47.347000 CVE-2024-2114,0,0,081a54e9ddc78ce4f436645892623548d1d04046abcae7e4f72c9961c208a850,2025-02-11T02:15:34.273000 CVE-2024-21140,0,0,4fdaeb1891358aed188cb510ef7acbfb67415e1764463a9604f6defe2a5b3e6e,2024-11-21T08:53:51.750000 CVE-2024-21141,0,0,4acbc980e4178b7fe27f9312d60c1ed1a8f5b2a8eb59e4f964d7f6ca135df762,2025-04-10T18:14:00.180000 -CVE-2024-21142,0,0,53d3420ca8b3f2d2c47ae6b44acc3a6c8a647acd9c0347c0fce17aa3250ed344,2025-03-18T15:15:47.363000 -CVE-2024-21143,0,0,93f983a28b3a2913f32b00f983906e9910e4b04aeb1a7a115a7b9505029b4666,2025-03-17T17:15:23.687000 +CVE-2024-21142,0,1,ab9c6960d65a8ba22f5b14737501a2bbed9e01d7a0de5a55ab97fd13d2cb7a54,2025-03-18T15:15:47.363000 +CVE-2024-21143,0,1,a1da5af2fff14cef5c6e3d4cd31607991453932511fd57d37a1f27d509fb459f,2025-03-17T17:15:23.687000 CVE-2024-21144,0,0,80772246190c6786f238a3c4afbf41453e2add993bd948cb2907f0a5b4a17597,2024-12-16T20:13:40.827000 CVE-2024-21145,0,0,1ee954c2c32adc46d037a901264cb96b8363bfe311ba0a927c500e6f55effa80,2025-03-13T14:15:20.360000 CVE-2024-21146,0,0,93917a4413ac27762a7ca33035df6b31830c2c1fab0bde46632af0332d2d880b,2024-11-21T08:53:52.517000 @@ -249981,8 +249981,8 @@ CVE-2024-2116,0,0,8c6b9ce679687e5a6470a6b4b429a15c165f13f61e11f8d91ba5b3772cba32 CVE-2024-21160,0,0,682b113f0ab5e67f54e6f9c1540a647f198391e8c03fe35135f65b3d3e0f3bca,2024-11-21T08:53:54.043000 CVE-2024-21161,0,0,1c1ccfb94a0118cd8f2f1e59ed4acd84701866eff7c401eaa2b4e60ce17bcfd4,2025-03-26T14:15:30.330000 CVE-2024-21162,0,0,b167ca3f5e6eb1d829a66671152027eba0422ffba46e59b6bf288eebefc30ee8,2024-11-21T08:53:54.277000 -CVE-2024-21163,0,0,3f9ff522a7e3208378a5962b8a62ba6fa5d09a853a4c6f834c9415a809343380,2025-03-17T19:15:21.793000 -CVE-2024-21164,0,0,60ed2ad5154234319e608909d6aa6b8df5a629e4fa60a5cff387bbe8786b34cc,2025-03-18T19:15:42.340000 +CVE-2024-21163,0,1,e250f8ba055c651cc9df343f6cde06bdb4c7f50aee6f92b51bbd262f1a6e74fa,2025-03-17T19:15:21.793000 +CVE-2024-21164,0,1,837519125e3daef3fef48db97ec5386b7987ca615a7e3548d1abae434824c774,2025-03-18T19:15:42.340000 CVE-2024-21165,0,0,417344df57040d35891dff84c166bd2e20a64c611f463e5d4283fcdf4d5dd6e6,2024-11-21T08:53:54.637000 CVE-2024-21166,0,0,a6bd0bb0f14f87d2cb260b91d37d1eb7d306bf89d70257e59bc4b4cc9def75a6,2024-11-21T08:53:54.760000 CVE-2024-21167,0,0,432ec591febd00b127b82a752135eda1c54e57e24bfd3147b2b0c6e5e2008ae0,2024-12-05T21:40:35.573000 @@ -249994,7 +249994,7 @@ CVE-2024-21171,0,0,53b9a7a1b522d54e682616180ca3eeb7a2d8e4421d0f88ca00799ddf6b10a CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000 CVE-2024-21173,0,0,86c505f33df37173cd8157098cf50e4bfdcbbe9e1fd2a092dd1d2d48a464c3d9,2025-03-24T20:15:17.280000 CVE-2024-21174,0,0,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000 -CVE-2024-21175,0,0,e03e7e0c59c793429b473a360114525d48cf5ca7657dc7f86416ef777a4c8504,2025-03-22T15:15:36.973000 +CVE-2024-21175,0,1,9106b4351e70fdd7e3ca89c9c136ba33269ae88285a3fd108473d320d5822ef3,2025-03-22T15:15:36.973000 CVE-2024-21176,0,0,e67fa4210999e42aabb0f353f1923af498dc2157a69a86cdbcbbc16b079f6b49,2024-11-21T08:53:55.950000 CVE-2024-21177,0,0,dffabc8739c0fef0114dd555257cc1d4e736eb0114a8e95a1d9555698fb73a8c,2025-03-13T14:15:20.593000 CVE-2024-21178,0,0,7df76511b7b21807ec4e54152dd48908d9f58c48f07c587eec0e40167fee020a,2025-03-14T17:15:42.167000 @@ -250005,7 +250005,7 @@ CVE-2024-21181,0,0,a60f1b0e57b0cd3e44233d07de0594e8054f38610c0cce1881bc557cb4ea1 CVE-2024-21182,0,0,c0ef1551cd608efb9923a47e75483009646ac3591abed59e9ff2ad6e0cf43351,2024-11-21T08:53:56.667000 CVE-2024-21183,0,0,ccf76df6ef2b2a6f291a2b546fdef7eb5ebda867e29558a4ef4d720ad7f5c94b,2025-03-26T15:15:48.967000 CVE-2024-21184,0,0,24425051df8220a39947a0a66cdd1a885e3fbd92924397baafaea753a30c1053,2024-11-21T08:53:56.900000 -CVE-2024-21185,0,0,d11b8472760cc1a71cdf615720512123ec90591d3b9a4789f2cd9eb70aea98ef,2025-03-18T16:15:20.577000 +CVE-2024-21185,0,1,e59ac0fa9f24d7ebe8a16140dc4fb8b56f5b823bcfa120029854b92fbe66d075,2025-03-18T16:15:20.577000 CVE-2024-21188,0,0,b867f787163ea0fc535229c913fa94918dbe07ee8e34eb83d23b693ac18ed7bb,2025-03-13T20:15:17.120000 CVE-2024-2119,0,0,0e5cc1c9dd926d4499d6722610e1dd5191fc5a94193ad958a551a0513230377a,2024-11-21T09:09:04.220000 CVE-2024-21190,0,0,067115da684342313c53c40fbb4155dbe1e2ef8e94d9c572ccc357157b5ace0e,2024-10-18T18:56:42.630000 @@ -250057,12 +250057,12 @@ CVE-2024-21241,0,0,12d0b1bf34329f71177cc9460818dac7ae89fcd6185858a4fd5c0a5f5d93b CVE-2024-21242,0,0,a0e9c06ac577c243e89e63cec320dd8b885e2e7460da91828fbff549e0aa27ec,2024-10-21T16:17:57.040000 CVE-2024-21243,0,0,1897257995245b9a108257472f0ab457fcc5c34721e06e9eeb7374d323639cb5,2024-10-16T20:35:41.957000 CVE-2024-21244,0,0,048fe68bf06332fd389783c146d7dca787d9278e80f2ace78819593395da48af,2024-10-16T20:35:00.173000 -CVE-2024-21245,0,0,0b9e3b5af4454c0b2bd825b7db8f3c4847ea6452b2e91fd2004a64c9819331b1,2025-03-17T19:46:25.297000 +CVE-2024-21245,0,1,3bf1cc97a71f55925f53743dc549c1fd6b5946c1bd147d8efe3c84342db9461f,2025-03-17T19:46:25.297000 CVE-2024-21246,0,0,002805e4474ae80b78d3fa15122ad8e7bbc6d18723041206542fb07a514a3984,2024-10-18T19:04:57.587000 CVE-2024-21247,0,0,289e6b7f2f6986c9af67bf3ac6cd25312bdceba759d39ebc6b067379d7d8aabc,2025-03-13T16:15:16.860000 CVE-2024-21248,0,0,02d5d76974b970f71d3acb48f297d78bd2adf48bc3a38afcd2d1a2db3ada953f,2025-03-13T17:15:27.717000 CVE-2024-21249,0,0,e7b1862f9cca90b10a43c2036f5049e2e98e26dda4064bc0ee9dd84006e812aa,2024-11-06T22:53:50.587000 -CVE-2024-2125,0,0,b2f57d050be6db3aee972b522dcd035da969e281fbf7a8b8dce134cfa07cd274,2025-02-26T19:15:20.710000 +CVE-2024-2125,0,1,21a4a74f222c47b5d63ff1ba79a0e075f5d74eabf35012f39d816bf0ff7abbf3,2025-04-07T13:07:17.690000 CVE-2024-21250,0,0,0dc6f65b843eb1855bce818bd5fff554394f5f6c49c0ce85b1fc19488846acab,2024-11-06T22:54:57.887000 CVE-2024-21251,0,0,aac53222271a38275fe8d9afc0b4dbca4872ed38b5f63f96ec0c29d8defd6875,2024-10-31T13:35:08.347000 CVE-2024-21252,0,0,057bab3da246550945b2315ce34cf79addddb25a1ecbdd298af3b753a729f875,2024-10-18T17:04:44.797000 @@ -250103,7 +250103,7 @@ CVE-2024-21284,0,0,cdc8aa6981e0c3a2ead96a293234b6837857cc9666b241897eb9ec6af99f8 CVE-2024-21285,0,0,a1ec9f288fb5f18291b7e0762fb19e3f3a36ad8582b697d5efe457fe2d2e3b08,2024-10-18T16:46:27.283000 CVE-2024-21286,0,0,23f960553de8d34e69d2eac1c509849233da3d5190d5796e4c6dbf827df8e2a2,2024-10-21T16:16:31.867000 CVE-2024-21287,0,0,3fa403c22f24e1ef1d9572ad7971727eefad394ffd6de14f7fc63427216eda73,2024-11-29T15:26:04.440000 -CVE-2024-2129,0,0,535bba87193f9024b8b920d00dbd96c68441ad6cf1fabc72f39261f36d50dc4c,2025-02-27T17:55:58.107000 +CVE-2024-2129,0,1,ec599cf1ae204460dc2a4a488cbdaebae05c55a76455abaf9b026fcda660daa6,2025-02-27T17:55:58.107000 CVE-2024-2130,0,0,1acea7d83b419b97d59e9a1594184489d93edf39c2d2a457c387d6ee5a06d88a,2025-04-03T13:16:35.503000 CVE-2024-21302,0,0,99170d4461509b4476f68009296eec1eecf35f205102a78f57ed67fe24f3518b,2024-09-18T00:15:03.243000 CVE-2024-21303,0,0,c2b97f22277fd7f2adc61a9f320c0092bc77d5664c2c382fa7ef4bfdcac581c9,2024-11-21T08:54:03.757000 @@ -250311,13 +250311,13 @@ CVE-2024-2149,0,0,e2c16a39f6ea2a30861d3113b6f39ffb2df16e6dcbe68db304efc0aa9adb1e CVE-2024-21490,0,0,15b5e2ee4920ffa283e721989521c69ae49e0b37b741d50130fbb3fccd7a1d46,2025-01-16T12:15:25.320000 CVE-2024-21491,0,0,ed885d0621c9afa15f31ced4c11fa76b30b44086a27ec3bd748a089ebf894a3b,2025-01-03T19:40:54.883000 CVE-2024-21492,0,0,41784e48d5d56f935bbe9f5a3d60c45053ca0d5f0bf8670ce081293e9f26c581,2024-12-06T19:15:11.520000 -CVE-2024-21493,0,0,14798d31de5a04e9a2ed03646a09c4157d98f06af41388f456a3a5185f717b4a,2025-02-27T03:08:34.410000 -CVE-2024-21494,0,0,8011b78cc49f07c937cddb5c50655dcee255b5a6ec123771a250806550253b42,2025-02-27T03:09:20.343000 -CVE-2024-21495,0,0,4051cc07fc91440917ea27552185da0474771bb60f44a9493b640da2b716844a,2025-02-26T19:02:05.847000 +CVE-2024-21493,0,1,9440014621500cf82b0a7668bb2b2a168884e0cb5844cfa73a5e131c0c37ef30,2025-02-27T03:08:34.410000 +CVE-2024-21494,0,1,43d3c92036fd903b19ab9584315ddabb8bc8c16f21ef34addc94751e98b82cb3,2025-02-27T03:09:20.343000 +CVE-2024-21495,0,1,beb4ad48225be8e68c4736d416d8261bba9e1347fa0f154fdfd5b4036450c01c,2025-02-26T19:02:05.847000 CVE-2024-21496,0,0,3c2088157b50478155ad69015fff5cacecfc9e9b2edb3e8ee2b8e7bb0a0e742e,2024-11-21T08:54:33.263000 -CVE-2024-21497,0,0,3bfe21bad591f60fcfd6a5a3d1f1f1f09a8fefe5f58b52eff5d7e42587cdb156,2025-02-26T21:40:32.540000 +CVE-2024-21497,0,1,2c7e121d1b4172a8367265077431c6b3fb13122ae0f98f6084dca93c98158023,2025-02-26T21:40:32.540000 CVE-2024-21498,0,0,2bf402b1559306f16ac8c8e66d84bb15b551ce6a438faa3500a7705f9ece2da0,2024-11-21T08:54:33.530000 -CVE-2024-21499,0,0,6907b7f5166fd6679c90071aa34f061ae076014ab73a8dfe71211dbf920acaa4,2025-02-26T21:42:58.847000 +CVE-2024-21499,0,1,44205a76d76d27ac43ddd65fb9b5571ec5f3ca5f195196306071755bf720f01e,2025-02-26T21:42:58.847000 CVE-2024-2150,0,0,11709d6f33f6feac5b4c76a551fdc402bc450d0a937559060df9be2ccc270565,2025-01-02T20:11:35.597000 CVE-2024-21500,0,0,701beefedd86107168fe49c159a5f355a6b33ca03c5844fc0be8cbbb3cd9e8ef,2025-04-03T16:12:19.953000 CVE-2024-21501,0,0,199ffb3aa23fde5d8d3391df678cad4c6e4de0c519c1101051786020f9390c39,2024-11-21T08:54:33.967000 @@ -250390,7 +250390,7 @@ CVE-2024-21587,0,0,12ceab6a8617bba884c3945746bd38a150022a8ae92c14a7557faa5ca62c0 CVE-2024-21589,0,0,560c0b598f44df34a42456a042b42a8f6628db58cb45afae50413837290c425f,2024-11-21T08:54:40.180000 CVE-2024-2159,0,0,8e46002478f5bef6fada5f3d931932d4001932442e5a9dd314099fb8485f027c,2024-11-21T09:09:09.353000 CVE-2024-21590,0,0,b72c7e75d3285f4274ae413038786b8da2e8ac5d0d8c2ace3bbf64363f6259fe,2025-01-23T15:29:31.793000 -CVE-2024-21591,0,0,ccc9721aa5c6f5e2d0b4595f4c89a71e3ccc07419e633f9629132dda867697f9,2024-11-21T08:54:40.447000 +CVE-2024-21591,0,1,e8f6d00f93c02570161f5591198239dc4f248af46e3e55650ebb582a1422b056,2024-11-21T08:54:40.447000 CVE-2024-21593,0,0,59c32920ee60d205e951a785ff1e6afa498e3c95b97e34979cba9e81a1db6a15,2024-11-21T08:54:40.607000 CVE-2024-21594,0,0,96f7ffccc5e1b95b526e0770e66b0a10aca6419927605427f2f6947a28f56f72,2024-11-21T08:54:40.743000 CVE-2024-21595,0,0,bd277db179ef1b9c3f18b64f4122244b30bcbe5b85c2ccd02aace5ef31bc05f5,2024-11-21T08:54:40.903000 @@ -250408,7 +250408,7 @@ CVE-2024-21606,0,0,96b9b5aaaa10d12d746cfced3bbe184276bbfbc212f99fb99927862a8cbcb CVE-2024-21607,0,0,f59415b22faf656477f9e7bf7a982f3f8655c7ad86e44b7900b038f38b711102,2024-11-21T08:54:42.600000 CVE-2024-21609,0,0,ed7128668f015978dda23ce1adb0f12ed4afbaafdd793c5416f23f6270025100,2025-04-10T20:44:13.873000 CVE-2024-2161,0,0,09285d34c68becd4910fce6a857fd42baeca498f3921f8c0788274bc89faf18c,2024-11-21T09:09:09.573000 -CVE-2024-21610,0,0,8f544f5c39d0c8220d104d36891a0bcfd582f2cb03efa73b1a2793e69b3ccba0,2025-03-05T18:19:59.853000 +CVE-2024-21610,0,1,1ef611fa27b8300a295e8bda4e8306e2494a67fddf9003e76a45373c4dc4f9e8,2025-03-05T18:19:59.853000 CVE-2024-21611,0,0,334e98596de5cccc370c36d1b9f4ee75740cb3840f270668136be62f04aafb00,2024-11-21T08:54:43.017000 CVE-2024-21612,0,0,a1c64368428607152868a7719ac581eb5c0c82d11e43ace9c200d48539f7d1d6,2024-11-21T08:54:43.200000 CVE-2024-21613,0,0,1b5cc7582af8e29a485625fa0664bab35c6731001707514eb375ebe0f6bde842,2024-11-21T08:54:43.363000 @@ -250479,7 +250479,7 @@ CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e6 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 CVE-2024-2168,0,0,3a446281083107f8135ac556f6c8d1f0e6649d8dade7a1d9bf5aa463a4effe95,2025-02-18T16:14:41.327000 CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000 -CVE-2024-21683,0,0,4fe6a05a112cd39424ca7f84d605837495a60439a6be6d4e9a76766e5b9d52d6,2025-04-10T19:54:01.040000 +CVE-2024-21683,0,1,940cf0d1296523f16d6a39c0e79860b394b8429e7f4d80ebc90cf15feb6b8bd4,2025-04-10T19:54:01.040000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 CVE-2024-21685,0,0,346bc4b5792cb2032fa2d12dece43f65235af6cb4059de4b308aa50e2caa89a3,2025-03-17T15:15:40.387000 CVE-2024-21686,0,0,d37e899dbd52c62190a5aa8009d323170147bb8202cb8fbd81ef61148a557602,2025-03-19T19:15:40.200000 @@ -250550,7 +250550,7 @@ CVE-2024-21749,0,0,16f5659578d54620b2a5125496211c16d44632bce4f292852157d4240bf6b CVE-2024-2175,0,0,f23583a5f89b3c048c3a390c725234de0385c846391e27a731d22c7274e14129,2024-08-19T13:00:23.117000 CVE-2024-21750,0,0,34ac4bf556abed3b579ceb283a732cbafac6840724519bcf2f9521daaba609b5,2024-11-21T08:54:56.420000 CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5b57,2024-11-21T08:54:56.547000 -CVE-2024-21752,0,0,b41317b4648baf91dd8a72a1931732fd9edddef7552ed76b1d7821ff0695a95c,2025-03-18T11:53:39.520000 +CVE-2024-21752,0,1,025eb5a4bd1cce40ed3d84debf90bfd44cf3148179326763da71c3c5d6bbd8d5,2025-03-18T11:53:39.520000 CVE-2024-21753,0,0,45b065c6167769cb16d64a10ec6f37b04b38c9a33361a88b58e0222b96c5fb44,2024-09-25T18:36:45.307000 CVE-2024-21754,0,0,6726148c9c00979954f8e0e43980573889b19508b76c8b84b92cd601e38d1fce,2024-11-21T08:54:56.877000 CVE-2024-21755,0,0,3db688cacd77dd473c848be3e1117c1b29b56eeefd4b3b05f3fefc4fcada771b,2024-12-23T14:58:10.797000 @@ -250600,7 +250600,7 @@ CVE-2024-21799,0,0,05eb95191ad954c9a53fb8b66853e6ccbc4467a31fea733a0930e7188f045 CVE-2024-2180,0,0,b0ddbddaee48d18516d8a257bcbf4491e4e7da2666636df6bb4eea526dd6362d,2025-01-23T19:21:38.040000 CVE-2024-21801,0,0,e0586e4f6344a28fbe913a08e38aa429ae203ce8b50f6707f53318b41d431973,2024-08-14T17:49:14.177000 CVE-2024-21802,0,0,e099568cb4710de6cce90947894ef2bdeea21f3297cc90676f7673917f865019,2025-02-12T18:48:44.720000 -CVE-2024-21803,0,0,b9eb989fe5eaec1aa8e4c7ecff68cc889d999bf0f791c530521d0b2363b7095e,2024-11-21T08:55:01.910000 +CVE-2024-21803,0,1,0d48696dc0662a1890a31f0c9377c154502173ec6344f03de90255ea54d15ee4,2024-11-21T08:55:01.910000 CVE-2024-21805,0,0,78da5cddaa000cadbfc8c97e4677a4a341010cf31e46cdb8666986000b870197,2024-11-21T08:55:02.057000 CVE-2024-21806,0,0,1b2aec9644fd1bc75dee93c68bd1d09b92422df55ce96cf11d37044256a99fdf,2024-08-14T17:49:14.177000 CVE-2024-21807,0,0,dc69d5655281b69e94a080a7d05f5d1e839946a0e259c1b55a287d292a87efda,2024-08-14T17:49:14.177000 @@ -251032,7 +251032,7 @@ CVE-2024-22294,0,0,7c6252971fd74edc0e019412f814dbc3c6bae00778d1f4c2e04bee8bfc631 CVE-2024-22295,0,0,882f33446a7993262cd7cea98b4470419daa1abf96c0019c4b48f29a57d23014,2024-11-21T08:56:00.310000 CVE-2024-22296,0,0,18293966692e595d6c170105e147207f471e1aa34adee6abbb558bde09aea430,2024-11-21T08:56:00.443000 CVE-2024-22297,0,0,7b60bf20b3ca3902043ef30481084b91517ae16ffb1abcff5c32b23e4c30b41c,2024-11-21T08:56:00.600000 -CVE-2024-22298,0,0,355370235122b357220f6fc9de1f00cd3e30d67021fe05f499f8333d99e60849,2025-03-20T15:39:01.090000 +CVE-2024-22298,0,1,591f1fd04458b644e0cc53a70399c9fe3609a50f38984563638a5534cae936e3,2025-03-20T15:39:01.090000 CVE-2024-22299,0,0,db2d30b0fea5b0fd6307d0bb16e9ea5f58a82f8d59f9cabc209775e24532ecda,2024-11-21T08:56:00.857000 CVE-2024-2230,0,0,81b726a6e768be79a74c3dcd4be2a480a2104236725fc7bffdeb7f2fbcd26073,2024-06-12T18:15:11.593000 CVE-2024-22300,0,0,1de989d163ebc0d5517129a2c0cb70de1cd05d4edcf6beb0d2f2b1fc8433dad4,2024-11-21T08:56:00.977000 @@ -251241,7 +251241,7 @@ CVE-2024-22568,0,0,3880556bf46833b64579e87b398833833f840f929944234dc82abb9760bd1 CVE-2024-22569,0,0,42fd9ca9ed87e62cc25c4850ea2254cb9fad0d6e7965206698b71242faea3c84,2024-11-21T08:56:27.863000 CVE-2024-2257,0,0,6326751678e552f2a5b329ffd28dd832a7b3b3968f1851a84cee129e01bef6d8,2024-11-21T09:09:21.760000 CVE-2024-22570,0,0,65580444980a65a34d69901ad8e01d49f9d506ba9bc8d07492ebc248698a38bb,2024-11-21T08:56:28.010000 -CVE-2024-2258,0,0,e49754951a1bde2f759b5166de102476676d9ff30d05c33f76291ccc74c4f0e7,2025-03-06T16:11:38.333000 +CVE-2024-2258,0,1,26088ba44610fea1c2ab93bf369581c8cfb2d790ee0f7cbdfbd04efa2700a01b,2025-03-06T16:11:38.333000 CVE-2024-22588,0,0,8e2502298f7c6b135485bc5396597a78ea89ffb55c12fc0b95b7b4561f1ece72,2024-11-21T08:56:28.157000 CVE-2024-2259,0,0,a3104431d195b990188b0eaf6770bbdd7744abb2cc67108311ab43825c1510de,2024-08-13T12:58:25.437000 CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb844,2024-11-21T08:56:28.390000 @@ -251326,7 +251326,7 @@ CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000 CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000 -CVE-2024-2280,0,0,1404f0eb210fbd47e2116530f0f898e711f759cec4c7f5d08df47a57f0da68a9,2025-03-06T15:02:35.070000 +CVE-2024-2280,0,1,0418f1241bdb21ee444f3adcb24933ad219004bf634a535637b79ccf56c262f6,2025-03-06T15:02:35.070000 CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000 CVE-2024-22808,0,0,b7e1e2d1bde9d89678abdad137c019036d81abaecf559d82e47aac2d5b04907e,2024-11-21T08:56:39.650000 CVE-2024-22809,0,0,e9fe8aef5ac1ba3cd4b969001e1df2ac70f8505d2e7540807c33653fbefe6671,2024-11-21T08:56:39.870000 @@ -251364,7 +251364,7 @@ CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000 CVE-2024-22880,0,0,57fbbe23fde2c87b7ed64a754ecaf00025c535fb2033f922d6720bcee3eadd21,2025-04-02T20:29:15.763000 CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b149,2025-01-21T16:53:16.990000 -CVE-2024-2289,0,0,26b467ee86b0c6253460d8055adfd2a4f195f6cdb0e4f504faeeaa32f315ba81,2025-03-06T15:03:11.220000 +CVE-2024-2289,0,1,e55b7e303d32dfce0c782c58fbd213215ea7924a6ce495060f6a577fb5e5ef1d,2025-03-06T15:03:11.220000 CVE-2024-22891,0,0,02e131b40d02e30836912251adc1ff415ae3aca9fca1513bfc674a89af8ec37f,2024-11-21T08:56:44.910000 CVE-2024-22892,0,0,ab4685bd3e54af7b091a985b4e2bd0ce232ea37ad229896d47c941f92093c96e,2025-03-14T16:15:29.140000 CVE-2024-22893,0,0,6c6f29a342a1ebb2552ec87422c6d3285e1d93cf37e605a3f0dcdbe25ce58cf6,2024-09-26T14:35:12.920000 @@ -251403,7 +251403,7 @@ CVE-2024-2295,0,0,b1c9b0d97e63019f8386fb1489354d559a699343cfdffce8bb3f3ebff26916 CVE-2024-22955,0,0,368533f40a34e5fae1d8925340aae6f4475eac5e111ca232f404b1633e3b2a3a,2024-11-21T08:56:50.440000 CVE-2024-22956,0,0,8ed39a8e2276e993cad0ea022beb398339ae52c5152920a4fd13b8cd15a5203e,2024-11-21T08:56:50.600000 CVE-2024-22957,0,0,0b4733c79e5e1be4ed27841aeb5f878228f183de770bb18355158b67c6f754fc,2024-11-21T08:56:50.740000 -CVE-2024-2296,0,0,dfd83ad5e58086af63e8c6fc35730f2c6ed8bd58ad06d30fd76fe71f7310d14f,2025-03-06T16:06:41.130000 +CVE-2024-2296,0,1,e263fc81d18e22f53984e72cceb64294153323e238a9f769e1a255835074fd72,2025-03-06T16:06:41.130000 CVE-2024-2297,0,0,3a62bf9d33e04a2b2a4ead4d48354328d27d50a4ecda4746840937c137d18fc4,2025-03-11T19:39:40.640000 CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000 CVE-2024-22983,0,0,1b90439e8700c2cb391c1d6ada3037539a1078d92c93c8cec7565e36e9b21aaa,2025-03-27T22:15:15.637000 @@ -251484,7 +251484,7 @@ CVE-2024-23135,0,0,48d5407ba2e50642aab2973a2026011819052949b158c2234433aa573d293 CVE-2024-23136,0,0,3fa0bd136fcb8595b153f127a129e2e21ed98915c264379af0748c0b79d5027f,2025-04-11T15:55:48.427000 CVE-2024-23137,0,0,4cee57d2ff83d7bc07a2df43213312b75658f526a7fc26a155d8daa721dcb209,2025-04-11T15:55:06.557000 CVE-2024-23138,0,0,b2d5820d9a8ff916772a159e535653f2d5e83911cd64ad8ff5c2251901c1d396,2025-01-28T19:15:13.887000 -CVE-2024-23139,0,0,8406f557277102d0d0be180c7f5b5d068093ba23b1cc7ea45a46bed30057a24f,2025-02-10T21:15:17.823000 +CVE-2024-23139,0,1,0bca597712b7349d81bce876d77a943e67d765b497fefb272058472eb65fa909,2025-02-10T21:15:17.823000 CVE-2024-2314,0,0,e806b8e37c6871dfa18c0f6b69456ba8f142074dd0ab76f05a48a4f9265c7aee,2024-11-21T09:09:29.397000 CVE-2024-23140,0,0,a608c27fe00da622de4dd63352d746221407ae1df769bafbd230a2a5b2e3d26f,2025-01-28T17:15:20.130000 CVE-2024-23141,0,0,05044574b36911681114c4427416fb6a71ae34b244f5eefc39ea7e82eea53477,2025-01-28T17:15:20.363000 @@ -251871,7 +251871,7 @@ CVE-2024-23517,0,0,a07da7f8ff74c07e3aafe68f2ec68f4874cf7345f49bddc3b7ceff7f2c49d CVE-2024-23518,0,0,3536980112272660cb2e5c6f499a750764ce48713e0c277c9ee2a48797df869f,2024-11-21T08:57:52.507000 CVE-2024-23519,0,0,a3109c9e90f5499e7cd7ecc0d7686f0e3c86f38f15de6d68c43e7e735686e6e1,2025-01-08T17:10:44.600000 CVE-2024-2352,0,0,3ce89c2f669898f3db9af4a3d068d173b08cdfd294d5c6b966099b329c1d7a42,2025-02-05T13:55:32.650000 -CVE-2024-23520,0,0,978a9e625a47f4849e1edf5d79b0f29fc62befa2eb0581584fc5e706885a590a,2025-03-20T19:47:41.243000 +CVE-2024-23520,0,1,a108397dda1c39c812616143a53852daed3d26b6470d3f6af6ca5b6eedee85aa,2025-03-20T19:47:41.243000 CVE-2024-23521,0,0,57d58ffb0b9d9efecde4d13454097fc5a706b8ca84a89b6c40b02bdc1acf2c89,2024-11-21T08:57:52.917000 CVE-2024-23522,0,0,e9199f7cbcff6af01d20d297fe947b7685cc900555c843ba08ab65ddfafffb61,2025-02-03T16:20:24.827000 CVE-2024-23523,0,0,6b732971a9009d9924469952ccdd7773f23afdb9ca508585f57f299b77cef45d,2024-11-21T08:57:53.177000 @@ -251932,12 +251932,12 @@ CVE-2024-23604,0,0,17c7f4fdc448289831f539c5b88668a5d2e193e02e5fe61ab433331b0bd4d CVE-2024-23605,0,0,cd8e3ab40368127668f9babb60974a68fb7e547c58851815f7b8d252542d79e6,2025-02-12T18:53:36.843000 CVE-2024-23606,0,0,29997b26a92eb62ace56664ebd405775eb345e3afd91cb43cd5981d3cb444142,2025-01-22T14:58:56.600000 CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 -CVE-2024-23608,0,0,2b213c1f9a5f980709ce6617e156a332b6738c7ccd66342b73611b040541f627,2025-02-27T17:51:32.090000 -CVE-2024-23609,0,0,adcf38dfbaab41c7970bce4a9ce62465c07cfbfed0902b345a3188764079f269,2025-02-27T18:11:32.143000 +CVE-2024-23608,0,1,b87563f8115e279cbb94906ccf612309bd2ffbcdc77e02b36f7779df7165720d,2025-02-27T17:51:32.090000 +CVE-2024-23609,0,1,1e22d5fa6970c67ad5ec1e4be7c6c1c34db78bce32a1097b89a3b24a7baa27b5,2025-02-27T18:11:32.143000 CVE-2024-2361,0,0,cdeca1550c32896fb6fcfb15aca13512200106e857f7cb5e97a4410236124f83,2024-11-21T09:09:35.667000 -CVE-2024-23610,0,0,82dccf838571bce6d3adabf3c48cd27563bb0d7cf2951704efde7d4fb0418483,2025-02-27T17:51:42.177000 -CVE-2024-23611,0,0,a63d34d768121bff67a9c68a0aeebbe260a81a36146af14eba98ac422681708b,2025-02-27T17:51:47.873000 -CVE-2024-23612,0,0,a37b0263bcc7cbf0d87aa618ddf98576b32598130bf2841b54e0ee371dca6958,2025-02-27T18:11:29.183000 +CVE-2024-23610,0,1,5202d96635a2ac809a98a39464a43b990dbb29394e14857b8657db2e88a27599,2025-02-27T17:51:42.177000 +CVE-2024-23611,0,1,89462df8ca38593d8d089af34e8f8755f4b0510c8457bd94577a5cf09a4d01b7,2025-02-27T17:51:47.873000 +CVE-2024-23612,0,1,7a22dc0cd5f6f75c5ac108d2ec0d0c4087d8706936f19b5451d88d8250a9a8d3,2025-02-27T18:11:29.183000 CVE-2024-23613,0,0,ea291e9fd6b4d44fcb5d97e10e844e3125f572d53da45562752a87eb16c83c0d,2024-11-21T08:58:00.433000 CVE-2024-23614,0,0,e9787ac51b1997f2606c262d5dd2661cc5dbff1459a490eee975cea38268443a,2024-11-21T08:58:00.580000 CVE-2024-23615,0,0,9eff75fafbf4cc29fda77efd3680443e63b2f8d6e8b99c5b45b4a2120276d8d5,2024-11-21T08:58:00.727000 @@ -252322,7 +252322,7 @@ CVE-2024-24026,0,0,974a3444463c7e0e2715d13d25f58be4fd54008138ef03898c8b54fd1b0ec CVE-2024-24027,0,0,aec19207f017f7825466edd07e3eba9f0725f1323d7c67f0e14217418a85a8b0,2024-11-21T08:58:51.147000 CVE-2024-24028,0,0,a772099fdcdb5a64de92b0a5f00bc8ecba2928b6dc88e323be2e52a116b0850a,2024-11-21T08:58:51.363000 CVE-2024-24029,0,0,ddd9987e9ef3270c764a10cf8b709a2abb3902f1a23f0e8a2ef0b26ec653895f,2024-11-21T08:58:51.580000 -CVE-2024-2403,0,0,7f6b09368d9da54265b1ea3f9ac7fcdcc3c6428b2342c2c31e6932c808209c8e,2025-03-26T20:15:20.150000 +CVE-2024-2403,0,1,0401653e665e07850d0979eeb0951a8f7eb57e50afcaedce51caf1bac8897208,2025-03-26T20:15:20.150000 CVE-2024-24034,0,0,008c95380cb274a422194929409267c0bff18be1c2c092615625192b01e06285,2024-11-21T08:58:51.727000 CVE-2024-24035,0,0,6cb7d03077ad19362dc330f3692f9890b03cf144492b22d0ab0a7c4560b5ad4e,2024-11-21T08:58:51.867000 CVE-2024-2404,0,0,00b8bdca56d07b7b811d08b76ea65d97e4c2cdb5114ee4e28e4c314094339183,2024-11-21T09:09:40.923000 @@ -252428,9 +252428,9 @@ CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909d CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000 CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000 CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000 -CVE-2024-2429,0,0,b2c3901884fcaeb9e398062fdcac660d84a25c03c152cc8696eb4bbd8f4f4a8c,2024-11-21T09:09:44.177000 +CVE-2024-2429,0,1,fee63be4b07f189971f436b1794c1958a2c757baa72dec725e309a968146300f,2024-11-21T09:09:44.177000 CVE-2024-24291,0,0,a5675aa0c8613cb299e95ab4766425189a0597594fcb674b552846121823ab0a,2024-11-21T08:59:06.530000 -CVE-2024-24292,0,0,4bd398eeae5f43df9cbe4dfe9fef9a0acfb4d8199409896b9eca8fc1290490f5,2025-04-01T20:26:30.593000 +CVE-2024-24292,0,1,24d26482dd4cf28e7909826ec5dd6c0412cd365d7a700db8f9ea37581123b8e1,2025-04-01T20:26:30.593000 CVE-2024-24293,0,0,0014a75b9ac9329b36ec7351b9f343123fc5dc5be6a7d2f346e3b9ab2354f1a6,2024-11-21T08:59:06.687000 CVE-2024-24294,0,0,fb63bcb8105d83116610bdb135f4ec59089672617d771e88154265e41f25bd8d,2024-11-21T08:59:06.910000 CVE-2024-2430,0,0,53841c9e199446382dd94c9e9994298ae403a3969aa9ef4125f05f9800537a98,2024-11-21T09:09:44.353000 @@ -252477,7 +252477,7 @@ CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce9 CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000 CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000 CVE-2024-24389,0,0,2d7ff37174d9dbb9492b1a442673e426580708c5a1303fb8d0266900f0ba1dba,2025-03-27T21:15:46.297000 -CVE-2024-2439,0,0,547937b9f10529cbccc7963a030766901cb223adb1317621ddf57ebc919b3cc1,2025-03-29T00:15:21.110000 +CVE-2024-2439,0,1,d1fad6e7bdf8a2f0da2dd4fdcb6e5b6086efbf3875d2d0046ca8ca2917039251,2025-03-29T00:15:21.110000 CVE-2024-24393,0,0,48dfbe81842a64324199d0bfa1e284aff3b021c9ccffa6b60b0d1cc58917f1d4,2024-11-21T08:59:13.997000 CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000 CVE-2024-24397,0,0,cb53e7a9b47449b4c481b77ea2c6b86ab0c11a3dbaddbbf98946c69ce71d4afa,2024-11-21T08:59:14.393000 @@ -252535,9 +252535,9 @@ CVE-2024-2447,0,0,a9884dd6a7a0a02108d34c15e3351a6cfbd0e02113055c2d6287dc13d51a0d CVE-2024-24470,0,0,47fd1c1a50408c5b0e57e417165d3fbba950a4f36c19cbd6c9271c32d7fee22f,2024-11-21T08:59:18.627000 CVE-2024-24474,0,0,0b1b7e57b878eae5549e8890b07cddd28800c45758a4136358af3f7a6d1df197,2024-11-21T08:59:18.777000 CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000 -CVE-2024-24476,0,0,d4c56416aa054f714760d9d32309186da2687719a386b4a700ea9e86d79ebe05,2024-11-21T08:59:19.030000 -CVE-2024-24478,0,0,2f2fdb5fa1337d22ac843f81ba1ce39141b97e9032b431f4b4d01123d3e2fd61,2024-11-21T08:59:19.260000 -CVE-2024-24479,0,0,d23722f45724922e6375aa72c9e0a89b9ca4990974a83c5207bae0732f14756b,2024-11-21T08:59:19.487000 +CVE-2024-24476,0,1,2751881558090fb2c2f1bd03c97957559818578f8846f8fc649123958da6ae56,2024-11-21T08:59:19.030000 +CVE-2024-24478,0,1,c77f01256d37a454274eb94c027c9c6b4f6855970e59e99899ca9e05c0df3ec7,2024-11-21T08:59:19.260000 +CVE-2024-24479,0,1,30fe0e0c8eaedda2113dc258a62a60d4ab51a9f4c4335621a91b88efdd75cd64,2024-11-21T08:59:19.487000 CVE-2024-2448,0,0,b72152a181016885656f49dc793056e8622b9a5f5c36acbb7ebb4ccedd62c703,2025-02-11T17:39:30.057000 CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ffd35,2024-11-21T08:59:19.703000 CVE-2024-24485,0,0,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000 @@ -252697,7 +252697,7 @@ CVE-2024-24759,0,0,bd2b641e986341b0a72b91e9f2e60b7e2583d3f50b45962ebfdef214c7c04 CVE-2024-2476,0,0,90b5e4103c7ae319e953ad3d1458413586b71bb6a73e5c06e79a094f5dab90c3,2024-11-21T09:09:50.223000 CVE-2024-24760,0,0,3fe1a751d069d7b8010ebbb79d495848e61e10c807ef786aff2bbeb1d9cf233a,2024-11-21T08:59:38.663000 CVE-2024-24761,0,0,0f3bfc3d46bb7c13829bd1222c8ca1e601f0b45217b897df8b3af2231e5f6681,2024-12-17T20:06:11.133000 -CVE-2024-24762,0,0,c076c3d97e1a4048b5950b29933537f374c672fc7dbe2db6f08b326b3e3ea530,2024-11-21T08:59:38.960000 +CVE-2024-24762,0,1,add0619bc8a2dc2d3cf09ae4e92547850c474eb49112738f2a54931e34316f89,2024-11-21T08:59:38.960000 CVE-2024-24763,0,0,a3cb5a362cbc9759e4dfff129e417ed8fe8655a360f6b85267085ff3a65924a0,2024-12-17T20:03:30.613000 CVE-2024-24764,0,0,bd24953d32a72f44cfa0aa95a6afd87968520e7afc30faacb56958a776ae9755,2024-11-21T08:59:39.267000 CVE-2024-24765,0,0,a87f94b332a46c6af533c4c84b1150f2143a31d3e25a0a572a479643ec30486a,2025-02-26T16:48:40.320000 @@ -252775,7 +252775,7 @@ CVE-2024-24831,0,0,79b53e3f2f08a9fcc2402c1ea185326b8812ae4c17ad199e9ba39e8d04543 CVE-2024-24832,0,0,4c230964b3a41d139827914eb4125596ce837a21432c3aba05a109824674146d,2025-02-04T20:58:05.637000 CVE-2024-24833,0,0,a8d92ffd8f9246b4d992ad26ab63d057438a7ab11e7edbed0b51e830051d1284,2025-01-08T17:14:47.103000 CVE-2024-24834,0,0,2b55d088597fc3ebc5386acef715e319fba0648d90a9c27dfb74125fc7cf22eb,2024-11-21T08:59:49.053000 -CVE-2024-24835,0,0,7b3f8232aba032051f60d0f3e962cf9a4ea465f4c4e03b757da7b5787e1829a4,2025-03-18T11:37:45.627000 +CVE-2024-24835,0,1,8a8dd1d532b895ea04da4977e6dfd2b2f5ab75d1234e171dea952bf28c2dae28,2025-03-18T11:37:45.627000 CVE-2024-24836,0,0,0468b6ec04583463bff3590023f79b4c3fdc144c9a581e1e17284b820318e242,2024-11-21T08:59:49.317000 CVE-2024-24837,0,0,7ad01e4d66bd18540fc4a1df9e3655e1c4a199a45b0859636572272be2977ddb,2024-11-21T08:59:49.447000 CVE-2024-24838,0,0,8e4d815e4da317a92180027f298a62e47e86b6f757666b5c0dfaf2710c513fa3,2024-11-21T08:59:49.593000 @@ -252983,8 +252983,8 @@ CVE-2024-25078,0,0,568f3ef235e47ddbc21588c714a6744268e17417b105158132c51870790ea CVE-2024-25079,0,0,17f81edf0a6524d8625d7cf80194ec548544d5a29fd67c578bb290749b33fe56,2024-11-21T09:00:12.107000 CVE-2024-2508,0,0,2108f14766140bca06fb5e070a325033ddf13c345a3c1fc2cd28dc45a7445cd5,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,6d3e028c837bf4a2217ff35f623db2af6053bd828d29288df3754c3ec6aa1c35,2024-11-21T09:00:12.337000 -CVE-2024-25081,0,0,8a69210adf945d1daae6827f15163f42693e02fae91457a1e943a74d5a27f630,2024-11-21T09:00:12.563000 -CVE-2024-25082,0,0,9288f29ecefbeb4eb4dcbd888b1e5d4472b91940424ab7ad4b2a0fdbb74fc532,2024-11-21T09:00:12.790000 +CVE-2024-25081,0,1,cbbf641f9e78f24564564c30dbefa39cdf6f0035329ed8ffd8ff62d3f015bc14,2024-11-21T09:00:12.563000 +CVE-2024-25082,0,1,70df7e097706234986ae183466010cd4c2bf8435bd6311702f2af763b7f22839,2024-11-21T09:00:12.790000 CVE-2024-25083,0,0,c5e246b4621d660c8251446e0e3483e6a7892e94e0d1a2eb3a6dfa3498dfecdd,2025-03-27T14:26:40.907000 CVE-2024-25086,0,0,fb0338965eeb8b04065f195844243b68c9cd5f5590ca2e7a53a3b925d2398b8f,2024-11-21T09:00:13.183000 CVE-2024-25087,0,0,9be79514a94926ccb35b716646bf09514a8914d8cfeb5ee11f74eefcb948dd9d,2025-03-14T16:15:29.730000 @@ -253029,7 +253029,7 @@ CVE-2024-25125,0,0,39178cd5a498f06bbe4bd2c31b6f23d9d8de55a51dbff5c874cc1a2c2f758 CVE-2024-25126,0,0,2221e6ec1ee69ccd33f869f0ffd9eacc33ca2bf5a97bf8d4705cf907d42b307c,2025-02-14T15:51:19.243000 CVE-2024-25128,0,0,2ad7110c12acfdd5d947ad6b1e56d039b61066bd86b0b8efef03d00b8c05bc70,2024-11-21T09:00:18.777000 CVE-2024-25129,0,0,129cb5e62a828cf41338bad0dc86b6db85af7bd7b1ad698fb96182cdca890b1e,2025-02-05T21:59:18.317000 -CVE-2024-2513,0,0,d71e293f9063fdfa6d3ef80280c511be26ac917126706325049d7776bce9fc2f,2025-02-27T19:50:24.517000 +CVE-2024-2513,0,1,d16a8b84c2ceee1327fdc253fdf0976b83389d5896bda8b469651071acee27f1,2025-02-27T19:50:24.517000 CVE-2024-25130,0,0,baa3afea95e92b29c6e4fa4d98cf4bb3b6da86d93d3fd05666b5ea53e09f0713,2025-02-05T21:55:35.147000 CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000 CVE-2024-25132,0,0,63f5c8498cd22aff6cd87a50426c966cea4a5e09621cbe8d76dd3c284f458e4b,2025-03-19T18:15:20.513000 @@ -253115,7 +253115,7 @@ CVE-2024-25248,0,0,d65faff10eac258b331d9c2cb9cd5b148102f3b8b2f26c280c3571f12af4f CVE-2024-25249,0,0,280776b2f87571caab1ffbeab421fc1acf6e14a5a49622226509bdb85c6c8891,2025-03-27T20:15:24.083000 CVE-2024-2525,0,0,99775d6d72012c94577ecba939cdf3eab5f27167b4c491987d659d8d12c4d8a2,2025-03-03T16:58:56.110000 CVE-2024-25250,0,0,36292ad2f5db1792ce479d383f28521fb85ae5121d9d273257ac4dbcfd9047b9,2025-04-08T15:14:52.357000 -CVE-2024-25251,0,0,f739fdc08a7387eef85ed951929f4c99d80990c3ea5952b1dc25f50ff31d62d3,2025-04-02T20:20:43.033000 +CVE-2024-25251,0,1,2ced2154e7002461885597edb1b33fe4ed66066f35f82cf56065323b3414df4c,2025-04-02T20:20:43.033000 CVE-2024-25253,0,0,48e99cce2b2802e3aeef59d20e7058849d1e4e7be86482650a3710ee00ff024a,2024-11-19T17:35:11.063000 CVE-2024-25254,0,0,0339a82eef9bc1a7a8bb28fefdcad83242ffe04648f59e10cecbad0da67cea19,2024-11-19T19:35:13.453000 CVE-2024-25255,0,0,879d4410a08cc23864a4824dcb477088b28d669368fe48b08008f9744ea817de,2024-12-24T06:15:33.590000 @@ -253167,7 +253167,7 @@ CVE-2024-2533,0,0,6ae2130a2853cfc35a0325db37738d70d71a25805f631d6422b528a071b1e7 CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000 CVE-2024-2534,0,0,f24633e3eff1520ce3c2eedeed339e97d80233d79efd834bb5b9d5ffd097cfc8,2025-03-03T16:45:52.740000 CVE-2024-25343,0,0,e95b5c5e8048e4efd735c454ea3bfb2db00d33bbce0bc4a2a17d6a93c15ddff4,2024-11-21T09:00:39.283000 -CVE-2024-25344,0,0,33d39ecf8d6ac556c3d5bb95eb67c067ec31235f8aa78fc627aabc924889d088,2024-11-21T09:00:39.500000 +CVE-2024-25344,0,1,08e491d8e8fc1521c6807369a2bd12624b63af05a206286efd1b0f19eb777609,2024-11-21T09:00:39.500000 CVE-2024-2535,0,0,0bf848903fc38663f407d2d981ac3254e4cae4551d368c29ada205f88200bdc8,2025-03-03T17:08:17.677000 CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ace07,2025-03-27T15:09:10.017000 CVE-2024-25351,0,0,7dd6fa3c0615d36dfbffb6fcdb5c9b681d789f881b9a847118c7e4975d141eaf,2025-03-27T15:09:22.307000 @@ -253406,7 +253406,7 @@ CVE-2024-25694,0,0,c58d6e093a46d16a997f3d66ebe78c8e8607a9575ffe90cff5b0d5359a78c CVE-2024-25695,0,0,e11aa9d3acfb4279059e95fd462e4815582f656fc2e8b4f442d92bec2ccd804a,2025-04-10T19:15:57.480000 CVE-2024-25696,0,0,a27878000ab7d4c947aec55884b53cc2a22b5a80f99f6d0cbe8362c2ee3fa724,2025-04-10T19:15:57.610000 CVE-2024-25697,0,0,b8ecfe658724ad2c9b5d9b209f05adcbfb997815b420b628da55c19edb547710,2025-04-10T19:15:57.740000 -CVE-2024-25698,0,0,a8c66b35192c5f334c1f6bc8e355109f64498a9ada842b8867f5475c2733fed4,2025-01-30T16:18:43 +CVE-2024-25698,0,1,d8153d0a5f5447d2ed8050d1aff648edef1b78164d821441b8ecfff2f9f3ddd0,2025-01-30T16:18:43 CVE-2024-25699,0,0,e98de7c35d9cf52b309e2e11a78dcfdb328d1a83989e2bcb1b301b1802bc5bb4,2025-04-10T19:15:58.013000 CVE-2024-2570,0,0,4611d3210102d4700ce26eb3e25116ca49d538799606ab228e39d46e79db2d21,2025-02-20T18:13:30.057000 CVE-2024-25700,0,0,1dc1e8582ba4b954c0ca93accc778b1d64ca91063bad758751f0180cd4d5d128,2025-04-11T15:40:10.277000 @@ -253416,12 +253416,12 @@ CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c08 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 CVE-2024-25705,0,0,5640a90c0e0930e8e3943f7d5a9195530c37db2008ccc87c5385acac8ff31909,2025-02-06T18:15:30.930000 CVE-2024-25706,0,0,c408bad06920a9cb3c614fc1d343ed357b880df741946993a4df8b4a28d99ad5,2025-04-10T19:15:58.320000 -CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 +CVE-2024-25707,0,1,751776bd945f80a0c70f293f5c89f9cf057ee50b544277834a780a06d5fb07f5,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,9bb829af6b02b6beb2e810abbb20bd697da9be30e11a09079be59ecb628c5fdc,2025-04-10T19:15:58.463000 CVE-2024-25709,0,0,2f9cb493d313e38368722f3b0c7bf2eee90f97f6b0d8a3462f94ee1dfeb68701,2025-04-10T19:15:58.633000 CVE-2024-2571,0,0,1476ba3ebda485438b432b0a9c2f2a14582a8fd01a5eda419987c6dfdf10feb7,2025-02-20T18:13:36.077000 CVE-2024-25710,0,0,ccd4c436edb484f956ce8e584d182d04aa6d4f42999598836e648648828f71a5,2025-02-13T18:17:15.147000 -CVE-2024-25711,0,0,8d140a07811800e6b585428b1a632a121982524ce34602fe66122bc90b06bfdd,2025-03-04T14:24:45.687000 +CVE-2024-25711,0,1,864e02e519d480ed313699d807c925fb6c2bad6dfbe4517f1838096b70d9a146,2025-03-04T14:24:45.687000 CVE-2024-25712,0,0,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000 CVE-2024-25713,0,0,7cb9846da4920671c42e088b26485e0952d0f913d5cb2aa4287dd0a1359ca489,2024-11-21T09:01:15.537000 CVE-2024-25714,0,0,5f5ec83991c8636624f4337fd8c71900ea8e4cac894cd5c5104c7c5d2e9cd5cb,2024-11-21T09:01:15.770000 @@ -253456,7 +253456,7 @@ CVE-2024-25753,0,0,17fbb56dca74222fc44ee3bc557ca03cea205099073dd46e4d1961ebf183d CVE-2024-25756,0,0,a4e3ba187f64c6cbdd53eff409e8c4ecbe41e683f588f15ecc50b2b987226d68,2025-03-13T19:34:21.237000 CVE-2024-2576,0,0,6c1a2c939b028c045e27ea71fa1f8a68daa3087e53e02af70dc23d0d313028ce,2025-02-20T18:09:56.283000 CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253143,2024-02-27T15:15:07.820000 -CVE-2024-25763,0,0,b88e8c350b416b345655932a9f416e922f06fbf90349fa5914aec08ad9918eac,2024-12-06T21:15:06.113000 +CVE-2024-25763,0,1,2ed679616087367939ca1feeff045968d23bf19b1a9cbc0234d3a2ed289f353e,2024-12-06T21:15:06.113000 CVE-2024-25767,0,0,0ca78670771c5475ecaa5b22e5b07acd76b8ce6bcee60635d4c63930e9338774,2024-11-21T09:01:21.100000 CVE-2024-25768,0,0,ca5e5fafb79a5045a2f311eea8b17b095a90d33f4f213631285129e72bbe41c9,2024-11-21T09:01:21.313000 CVE-2024-2577,0,0,286b28f8f74e4fd6c9af808a627bcf8713dd013a7c38abef1161cefa09327595,2025-02-20T18:09:43.090000 @@ -253526,7 +253526,7 @@ CVE-2024-2590,0,0,60a3bdaafc99a02849a3826c8a92974160c52fb0a8b38349972ea2276121fa CVE-2024-25902,0,0,01acbae3e50b87c45a104c1b7d9ad0d7501c3f3f29e88e250fcafc1cc848d9ff,2025-03-04T14:50:33.090000 CVE-2024-25903,0,0,94c33c15570474e2a0161dbbf3221784e109583adfb7f0470b31da8f1b32bb4d,2025-02-27T13:56:21.217000 CVE-2024-25904,0,0,25fb95b169a63bb75786e1711607587107350b8156e41da3f4a9c1bdd9726dbc,2024-11-21T09:01:32.490000 -CVE-2024-25905,0,0,d8ef5b6e370d23978f25ad07bf75edfa9e43e1e32504ca817e22678f0aca8ea9,2025-02-26T21:48:55.927000 +CVE-2024-25905,0,1,e1154b42e8d6e92c35188046cf3a902179017552ca051efb145d35623ef03dbc,2025-02-26T21:48:55.927000 CVE-2024-25906,0,0,93bffb1502ee48ad5d77c7933107ca201d3edf7f2af544bbcc488109cde4b857,2024-11-21T09:01:32.740000 CVE-2024-25907,0,0,511b2b2f5bd715980d7380bdd35ed1b0d884cd6649560ed9a472aa7210bb30e1,2024-11-21T09:01:32.860000 CVE-2024-25908,0,0,e6d921eb95eacb1e7bcfd9c82dd8c4fbfb5ba6db971664c950171fd1ed8d2a73,2024-11-21T09:01:32.997000 @@ -253543,7 +253543,7 @@ CVE-2024-25917,0,0,0cd9a5e3f54e99a2fbdddaa15494910cc1cd9ae49be1a604f11ea21e2776d CVE-2024-25918,0,0,a702a0f760b6fee6f142ee93bde335298772f88dc900c415c83c5dab2314415a,2025-02-09T20:40:39.820000 CVE-2024-25919,0,0,d1ff273fa45d6929d7cfcb977c0c667c296e6d469e69bda056d1ddb816ab474d,2024-11-21T09:01:34.383000 CVE-2024-2592,0,0,1314e5979e922ce544e374cfd4ccc557ec63d2416b8c6bbad2cab77d20807b69,2024-11-21T09:10:04.923000 -CVE-2024-25920,0,0,b661e671f3d29a450475d399a5d74d98db49bc8559a20666cd9a627aa02ffed0,2025-03-19T19:25:32.190000 +CVE-2024-25920,0,1,716ca18568bf175d3fcba64590bca691f8ace44798f6016dae55583930c5f486,2025-03-19T19:25:32.190000 CVE-2024-25921,0,0,1bfc8faa7e1d02c9c2f1de0126ab2889fc1bc9c5656ab66c16baddc12e4caa30,2024-11-21T09:01:34.630000 CVE-2024-25922,0,0,013cf5eee09a7251840c6fc199a103ff1a6a473ceec2bf28c66c9186ceab960d,2024-11-21T09:01:34.757000 CVE-2024-25923,0,0,113df91aa477bc92f3335e80693c330592d18784bbd85f7855e76930bd10e367,2024-11-21T09:01:34.877000 @@ -253639,7 +253639,7 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26012,0,0,8aa28068116e469ce60689bd893aa21d2c14e5bdc62c5fcdabf85329f80fa7f9,2025-01-31T17:25:06.157000 -CVE-2024-26013,0,0,7487745243541e17ee56dc164b6abad225e006bac2691226e73fd594f705916a,2025-04-08T18:13:53.347000 +CVE-2024-26013,0,1,89289a7f0976c38be469948fa03919533ff2432e3a25f0fcab3969307f916c23,2025-04-08T18:13:53.347000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26016,0,0,551548e94ceebe327cd043d6da7726194f348087a0883cfb1f63a672494915fd,2025-02-13T18:17:17.677000 CVE-2024-26017,0,0,04cda222e539a12656e61a62aaaa957af91c2a3bf44edf8b04502b71224b59af,2024-11-15T14:00:09.720000 @@ -253656,7 +253656,7 @@ CVE-2024-26026,0,0,ffac277b091947338dc44267e08a05e78933f00431a2382b3c07a4c8da44c CVE-2024-26027,0,0,e51a8c179fd70718aa23624316804b2c3bf6cb4b79a8e6b6a3e273e4a45deffb,2024-09-06T18:52:51.097000 CVE-2024-26028,0,0,e1545706959cfbc37b9d5c466a540e698ff027344f32a943b1935770b7dcd50e,2024-12-03T14:18:21.500000 CVE-2024-26029,0,0,70077a0619a6547cfcb2452dfeecea0c9ce93abb5882fe106a73d533208c9ebb,2024-11-21T09:01:47.747000 -CVE-2024-2603,0,0,2927984f2d09fbc6dec1e6fc3e05164fadcb352163f3b7c19f55f64af19e2b6f,2024-11-21T09:10:06.047000 +CVE-2024-2603,0,1,e4be1e2917bab5ffb4337f96b50e69bb1640a69dbfb82e3bb3590c08127f9259,2024-11-21T09:10:06.047000 CVE-2024-26030,0,0,f461958f7fd87f322576b14da5222d33631fb030dc62db5731ed351fc2c964fb,2024-12-03T14:25:09.180000 CVE-2024-26031,0,0,ebc9aa4d655f6e17e5403103a2001ec94e8fd96832889da16010985d3b39b126,2024-12-03T14:10:06.587000 CVE-2024-26032,0,0,d9a7d1a3019d6207dbc3ff3218d8b646b903ecadb790d874d8867df83130f90b,2024-12-03T14:40:37.250000 @@ -253784,7 +253784,7 @@ CVE-2024-26149,0,0,509040b71e933c4c83efda97eedbb5927f70f30be145577cb1eb2d0c4d223 CVE-2024-2615,0,0,4a86519809c33781876ceb89938fc6bab2bbeeaf258d26d691623034358161e3,2025-03-14T16:15:30.527000 CVE-2024-26150,0,0,3c027b3dee8ccf173f15ccc32760a71bec2eaf8137bdb8bf8fb759eee0e06b3a,2025-02-05T21:36:57.573000 CVE-2024-26151,0,0,cfbbb470c12a3d8e817116a4e5c512629d9aca997e589958ff6079b041237c57,2025-02-05T21:52:15.070000 -CVE-2024-26152,0,0,c1b3b9b6a63c6ba2d9481dc8565506d49f6cb6abb36d9955ad66959a79ac1105,2024-11-21T09:02:02.457000 +CVE-2024-26152,0,1,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000 CVE-2024-26153,0,0,932113ad610029fb2c7ce7839f51782f84bcd1e702364c825e581ebb4c9294f5,2025-01-17T17:15:10.927000 CVE-2024-26154,0,0,678b1c83de98d47f63294c18ea155e3fe0c8b445531c33845a33f41320901431,2025-01-17T17:15:11.147000 CVE-2024-26155,0,0,06c7b74e8ac76d1b64ae253e82cab9e4da8d31007ee087e1afd6f888392fead2,2025-01-17T17:15:11.327000 @@ -253993,10 +253993,10 @@ CVE-2024-2646,0,0,04594d9e7c6ca7f1c99b4941a1246a278a20606b81feca73a81bb34fb4ebf0 CVE-2024-26461,0,0,88cfb89c75caa3fbb98958498da2cadb2df05ab5f4cd5d1d1f54ba1cb18b653a,2024-11-21T09:02:26.477000 CVE-2024-26462,0,0,25f2254d778b889a2851e66f6c411f8a73b90524a128dab651aec48b5cdb8bfb,2025-03-25T20:15:21.143000 CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000 -CVE-2024-26465,0,0,3591a92f355c50b3bf7853c8951cb4d89bdd2f61f2693c9355aeb21e12a53c32,2024-11-25T19:15:08.960000 -CVE-2024-26466,0,0,78f9ec7f09b86ede70fc7b526d3c62b52dfe5c663a6c507cd560a4b345d888d2,2024-11-21T09:02:27.303000 -CVE-2024-26467,0,0,7fc943892cb0014f0eed37ce46993ce06d883ad86ab2799d5c55ba05a00e137e,2024-11-21T09:02:27.513000 -CVE-2024-26468,0,0,0547be4c4882f5475afcf11f6d186013d04fae3e143dc62f3877a4ed92efebbe,2024-11-21T09:02:27.717000 +CVE-2024-26465,0,1,ade97cdb5c6cf4f48879f07ad4a7605a0c64a0d603fc472a6f3229d145ef5dca,2024-11-25T19:15:08.960000 +CVE-2024-26466,0,1,498af45c7b548fe132843de855b8aa9776eae1933bb5da67796612ea2eb5ccc7,2024-11-21T09:02:27.303000 +CVE-2024-26467,0,1,0556c1f5024bed78dda2024dd14eee20e33c16b9bdc12609f766a3b6d9a8ca63,2024-11-21T09:02:27.513000 +CVE-2024-26468,0,1,99256accb4864d104f28d89d5eb4ed4c821639f1d2602e389e37b0eb4c8fc7a1,2024-11-21T09:02:27.717000 CVE-2024-26469,0,0,ca30b6ba743f8a94ca9252341154faef8133ad746480726630ceceb570bbe30d,2024-12-04T21:15:22.647000 CVE-2024-2647,0,0,bbe1a272a76fd31c1c6ab2c26f30c3c63771d99203be4f6b4b60845ea9cf719b,2025-02-10T13:49:48.360000 CVE-2024-26470,0,0,5a3a0e9bead74d3ad7a801ce5e989377aa1e8dd86cc9c2c97b389b1c343e64fc,2024-11-21T09:02:28.063000 @@ -254100,7 +254100,7 @@ CVE-2024-26629,0,0,d791923744077c2bb746636f089ccc34b3f86f817a6d19efa01956b858a3a CVE-2024-2663,0,0,c22f0e7b5ed31e3585ae04604569739fcb5bd35aa21e256ad3298c060be80007,2024-11-21T09:10:14.400000 CVE-2024-26630,0,0,435567819353feb6e9fd75aec3992aa276301c59d735e8ba98ba56f805149a7b,2025-03-13T19:36:45.610000 CVE-2024-26631,0,0,e434229e3dfe4957916a111b66d7525619499309febd0eb1837928a23887f329,2025-03-10T15:46:45.123000 -CVE-2024-26632,0,0,43254b80a96e129111da580d92beb2cc1ca84b48f7dc16424fb8f576bf8a303b,2025-03-03T17:47:23.243000 +CVE-2024-26632,0,1,869aacb154b70b898d7a0407b5e882e0757a42597fe050644da9e0e52e683522,2025-03-03T17:47:23.243000 CVE-2024-26633,0,0,33f195750b883a118c47ca858b6eb514b28712635db7aee1f8b528ed69f320ee,2025-04-04T14:49:01.373000 CVE-2024-26634,0,0,014977ea292eed4f488692d37a43becd9788f8f35b2d1747fb8faa157edef3fd,2025-03-10T15:44:00.747000 CVE-2024-26635,0,0,12c1e07b99b4d1aa49a94b0045f6ab20da1750755e008b69de1f8c113f9d4f78,2025-03-10T17:06:20.737000 @@ -254131,12 +254131,12 @@ CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78 CVE-2024-26658,0,0,fdb2631e448bd210fea3052df1cd33afa28ec2d71cfc06366e87396444d81fff,2025-02-03T16:15:21.710000 CVE-2024-26659,0,0,507bfe545d3becf9a9037a4273a711fd116e7c2e069ab02299b078f3fa8dd37f,2025-03-17T15:13:19.260000 CVE-2024-2666,0,0,94c10c4038495e2feaf574a5456d0064fe9e83a56f9b4605d7001b425c92541e,2025-01-08T19:47:15.707000 -CVE-2024-26660,0,0,d97ef48df8f75a6efd9cbd18500b3e55e890bd3c88a6fa592f9023cbf997be07,2025-03-03T17:43:32.960000 +CVE-2024-26660,0,1,d54d4fdbc8c4bd43a76bf8926080f499680f3fceb12c219d4b5c6b3cec9ecfb2,2025-03-03T17:43:32.960000 CVE-2024-26661,0,0,4fb6edb1f36c844bdad84ee30c94b41feedb9399dc22f462e023828aba29cde8,2025-04-08T19:25:13.270000 CVE-2024-26662,0,0,47fb646cae08256595e170eb9893e3a5ae79ba27fc657c0078d4147e4db3a5a1,2025-04-08T19:25:02.407000 CVE-2024-26663,0,0,74a791432f5d59cb2bc083592aaf9ae5c64f10e827e4bfdc39da1da462ef98fd,2025-01-07T17:20:30.367000 CVE-2024-26664,0,0,9c5508e7dd3d001bfd5cb60b1e75db16edecdc362f4785202977db09d90d87e4,2025-03-17T15:13:10.637000 -CVE-2024-26665,0,0,04e35018512b09eae41fe71b4b81c45f0e7114f3ffecabc85d6f1b7e0a6a51f8,2025-03-03T17:36:42.837000 +CVE-2024-26665,0,1,f498c51672de620b901ba5aa17357ffda21164474aba90d29473f984c3d1b5f8,2025-03-03T17:36:42.837000 CVE-2024-26666,0,0,db4ad936531a6340d7734ec0b24449cc1afa5d56b5706fd58d584ddb73a0a938,2025-04-08T19:24:39.293000 CVE-2024-26667,0,0,e4cb9dd443d3b01dd2ad5452212fef391108d930ced9b29e0157a4c2b2b8b9e9,2025-03-17T15:04:31.197000 CVE-2024-26668,0,0,814e930dad36470a2abed92bec76dc2cabb31e6c74c96407271e4ed592944ddb,2025-03-17T15:04:22.180000 @@ -254165,7 +254165,7 @@ CVE-2024-26688,0,0,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b CVE-2024-26689,0,0,45aef623305996e79be3f7e9accf7726333231f3f2e12fd9e4b9fa27d10e7a24,2025-01-14T17:26:26.393000 CVE-2024-2669,0,0,f3a883257f235a66bb3dc09f4829b2abbbfb1b1a0840a84101a75abdbc8c1f41,2025-02-21T15:14:07.237000 CVE-2024-26690,0,0,648bc64672755d902f47393aac1fd49284179491bb0cfe22386079c4b8db94f8,2025-04-08T15:32:55.320000 -CVE-2024-26691,0,0,22d1e95d522495580a46cba49f03206b1fd1c00b94457c3ee5323f64f2257acc,2025-02-27T14:42:41.257000 +CVE-2024-26691,0,1,8b668bf1f41cd76874e0d8ebb48f207f7e3f4ee32cec00f06cedc0ed865b211e,2025-02-27T14:42:41.257000 CVE-2024-26692,0,0,c86e4cbddbb5120ed88b11b3ce658826880933d9e82aa8cde8089462a4d704ee,2025-03-17T15:38:32.037000 CVE-2024-26693,0,0,00f562b0f48f3bcb4c140bdf3380c0317e74478062b7f96c6d6374499eaeb210,2025-03-17T15:37:25.507000 CVE-2024-26694,0,0,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000 @@ -254173,12 +254173,12 @@ CVE-2024-26695,0,0,1ae7cd1e1e85f699df2959b2788d7af1c813dbc8bb82849f43b281e54bed1 CVE-2024-26696,0,0,cb77d08eaff32ff765f3a91b5b19e3d49d8b1206347d0e62348792a445838ed6,2025-03-17T15:37:03.493000 CVE-2024-26697,0,0,01098b7073748986736a27de7b9c6d7c5f4de605b2cd7ca1b304dc85376a47ab,2025-03-17T15:37:12.513000 CVE-2024-26698,0,0,1a8195c76ed12e2006acd4b95cf123a6f5390d6e218cd1354acffdfc19815656,2025-03-17T15:36:53.817000 -CVE-2024-26699,0,0,c3786cb3ee2f974c5262c14cc1cea6d35ad33ef5ed2ef9bac47a2b686a5c8dfa,2025-02-27T14:42:04.470000 +CVE-2024-26699,0,1,c1c08967ffb8ff87b120f604ae25a6f51d5b77db2514543417385d41ea0f2e7c,2025-02-27T14:42:04.470000 CVE-2024-2670,0,0,99b219bd80e67f4a431d83f2cd3c4e6108bce3c0c8ffbab0744c31abdf28f57a,2025-02-21T15:15:55.763000 CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000 CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000 CVE-2024-26702,0,0,09d949e5a1daef50d309f0794d1e19fba9d5ae3e55521506e08479d6ca2554ec,2025-04-08T15:32:26.257000 -CVE-2024-26703,0,0,48d9fe7105c1e15a2876442bef8d713d66393b820ebbecfd55a730936d80e728,2025-02-27T22:02:32.530000 +CVE-2024-26703,0,1,50767473bb33a17962893002e0f11abf05f6be5edfacdd8c174505a27102abbe,2025-02-27T22:02:32.530000 CVE-2024-26704,0,0,3a0b52ff86450ce1fb82ebf5e7a18392c0d6deb9daec30492482410a94698921,2025-01-14T15:37:59.677000 CVE-2024-26705,0,0,110f9b3bcafc6ad0bc16a9054a0aef3c212a8eca0bc96a2248708081e1ca2a92,2025-03-17T15:36:41.633000 CVE-2024-26706,0,0,6608689aa1cb1a883a201595f93b0d08ddb0bb15770ebae732176e4663c83eca,2025-03-17T15:36:31.360000 @@ -254187,7 +254187,7 @@ CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000 CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000 CVE-2024-26710,0,0,b738c95ced70807b461356e09fa92db1949c85f5c05571b831087b4afd6fe717,2025-03-17T15:36:11.620000 -CVE-2024-26711,0,0,0eae4e2158a4f5f40ae27d5bba561e392d6ae7c39cea29b54b5701a7557592f2,2025-02-27T22:02:24.350000 +CVE-2024-26711,0,1,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000 CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000 CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000 CVE-2024-26714,0,0,ff28b0d279d42011501ac5d5a07332218c152d41bc35cc88815a5ff7f7909f7a,2025-03-17T15:36:01.447000 @@ -254201,7 +254201,7 @@ CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910 CVE-2024-26721,0,0,91eca3282c2c5fae3d2e53fc117c1d7d8985fcde88aa457f17183c5f93a89c78,2025-03-17T16:01:40.143000 CVE-2024-26722,0,0,12d674d56dcf1067f7c24e779fb92b06855d0b7019ccfecfbfdcc292981abf0d,2025-01-07T17:35:32.710000 CVE-2024-26723,0,0,6fd99a4a9ecdfc2d82c38512c8cc8b8746a4cd462b8039e875f6f2710cba1622,2025-04-04T15:04:57.577000 -CVE-2024-26724,0,0,19f7151406ef2f5c5b1cd459b98c958e0a845b85e8a1773b285bc393595645c2,2025-02-27T14:41:48.253000 +CVE-2024-26724,0,1,21e8d46246149fe240dcea9347d53d69c16cd4ebe5ca01dd921895ce2b5df308,2025-02-27T14:41:48.253000 CVE-2024-26725,0,0,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000 CVE-2024-26726,0,0,ebcbd1f97ac925ffacccd1ba4596d61a2a069cfd3a44d0d8f42d599084efe791,2025-03-17T16:01:56.210000 CVE-2024-26727,0,0,71f7b03339f4223b777cb9d9dfb62a277038b548f33e01a86471a0412cf7adb8,2025-03-17T16:02:14.380000 @@ -254233,7 +254233,7 @@ CVE-2024-2675,0,0,e9b3789d22f2fcec90f2bc82f460b34bf6c3b6dc4f4710822d8c47fdf2be23 CVE-2024-26750,0,0,6fdc360273be1748eb3931071e974ddb183de2c06e29915c07252375db874884,2025-03-18T16:49:59.607000 CVE-2024-26751,0,0,2b857b3fa9b45ad36c14e1b8198bd7fed9f385dbc0df9988b27d23100a873fff,2025-03-17T16:57:25.003000 CVE-2024-26752,0,0,608ccfb4d7a8b8693d3731112e07e20428505e38a79f4c705a81d2d2794e1ed5,2025-03-17T16:57:11.283000 -CVE-2024-26753,0,0,54bc9dc40e514e7212847ab36dae49d8dc3504887ffcc5dcbb1e839b6fcecf7b,2025-02-27T22:00:28.967000 +CVE-2024-26753,0,1,1b751f62960f50f3b60f217d87144eeed76c367e514d3bbe447cf0a3fee1d65b,2025-02-27T22:00:28.967000 CVE-2024-26754,0,0,175be97ba4873a77188833236c6ae06bc719c11b1be4fb508248fd70bc0f47e4,2025-01-07T21:13:04.700000 CVE-2024-26755,0,0,f1180f8f889c40db84807ca1a72deebd3e9ab1df54d3239939d40ffd716e78fe,2025-04-04T14:30:49.433000 CVE-2024-26756,0,0,33c353e086c76d3ddced4ee6e4835d00b5fca5c121d28048cad6d1902ce970d5,2025-03-17T16:56:57.017000 @@ -254241,7 +254241,7 @@ CVE-2024-26757,0,0,c6330dd815c31736ac5fe6a8238fde8417e157d817679392a44b80e757c3b CVE-2024-26758,0,0,79b668a9eeb858c13651e6c51c343a0e1c7fe79e74b6411938f1808ebca62fa8,2025-04-04T14:30:16.437000 CVE-2024-26759,0,0,4149d7c7033643511b1f9d0e90b6322498fff207ba3a277aedae496842f0c8ef,2025-03-17T16:56:49.890000 CVE-2024-2676,0,0,f899136f2f031dad4f1df425d24ca9b3b9c2b55017ac806bbf373a4b3337b0e3,2025-02-21T16:06:24.990000 -CVE-2024-26760,0,0,d446397ffceb7399af2d0770a591678d71834fbac6c4a5c29ba8551476b58a48,2025-03-03T17:34:59.137000 +CVE-2024-26760,0,1,2e9ab5ffc2b9302c029df9df139dbcdf8b5d86f4c8593d1584c46486c748ada5,2025-03-03T17:34:59.137000 CVE-2024-26761,0,0,4a545fec9e70200014ce002ad7185549210023d8d2a1c4be74546ce8aaebf60d,2025-03-17T16:56:39.690000 CVE-2024-26762,0,0,6ae9c06935cf4f7d080aabde82c11884356d4acc431ceab9a2ea60870f5dd357,2025-03-18T16:13:33.843000 CVE-2024-26763,0,0,abf5c36c298c7062b9d6afdbf8d4a5937208e3749af8ebb6841bb25903c94c26,2025-03-18T16:40:18.300000 @@ -254274,7 +254274,7 @@ CVE-2024-26787,0,0,3b334f4d1e8b0c7366709584b18c0e0cc1b86ce6577d0c5fe78ac8b94c97d CVE-2024-26788,0,0,b7e8865b76ef831717b6c7497e24eca5d34699bd5ebca61b44e019d10eaa42f6,2025-04-01T20:35:20.977000 CVE-2024-26789,0,0,a5137324d86a8e957268d08db12c91e56fa8954e7bdcedf92462c6e125549f78,2025-04-04T14:29:32.797000 CVE-2024-2679,0,0,f3a2441b1bb3d55db13b8e884f55ff162198f3686d9b22758f89abcdd57bf40b,2025-02-19T18:16:36.597000 -CVE-2024-26790,0,0,5463bc9022c9b57f2cc29f3ff33710079052365296d5827a1e6f1cf1c56d194f,2025-02-27T22:01:53.177000 +CVE-2024-26790,0,1,da7993ff6ba918c2f5e13339b4c718269282ee965a1c6bb70f04c36e1ddd8a5e,2025-02-27T22:01:53.177000 CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000 CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000 CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000 @@ -254287,7 +254287,7 @@ CVE-2024-26799,0,0,c35e2e308d39ca33beebf0cc0148df2dc5c2adbf857dc2bbe6860c360061c CVE-2024-2680,0,0,01c8822f13b0d4104843a1ff8956f4fac8943213e08997e996110106315647d9,2025-02-19T18:16:52.490000 CVE-2024-26800,0,0,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000 CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000 -CVE-2024-26802,0,0,7552dc5e76f0f8a51e13f54a8a6eff1b2aa57a89a13cc430ab2d5f57637701c0,2025-03-04T15:18:14.793000 +CVE-2024-26802,0,1,b55b9ee317b6edef4ea04ad264c864ad9eac81d527ff32db7d39bc61c0114a93,2025-03-04T15:18:14.793000 CVE-2024-26803,0,0,ce18d3dc59bead3fde1952adeca6e7d462c0513670e71ce8d60f3dc22ad05e3b,2025-04-01T20:35:43.953000 CVE-2024-26804,0,0,90c29bca0add61f216e7402553f0bd0d19eeb58a95157f3891806f7bae1b7b85,2025-03-21T14:58:15.363000 CVE-2024-26805,0,0,79cb532ec4298c5c0bba2b9044190557f61a8afd9bc0a9ca7e0ea7842c75f1e4,2025-02-27T14:36:02.417000 @@ -254331,7 +254331,7 @@ CVE-2024-26839,0,0,86fe097dcbf1f910ddfbdc3d002b0e89833c44044f118c1ed9d8f2af58339 CVE-2024-2684,0,0,a14b026a1301f370e619ed91bf5762f79bbefef8c73866dc993a8358e7f33fb5,2025-02-19T18:18:31.810000 CVE-2024-26840,0,0,184a6898c218b037239b30da9b8ff36296b7dddccc7007005850bd631f698139,2025-01-07T17:13:19.863000 CVE-2024-26841,0,0,ae6ce41b5a72dd4021510f2869dc20e1bcafc47b74f538f8bab226112300566e,2025-04-02T13:18:01.743000 -CVE-2024-26842,0,0,9da32b4605a4cd00f64e41da7c6642881db09766d39456beceaad36e683533b7,2025-03-04T15:36:04.323000 +CVE-2024-26842,0,1,4370dc54dee9e8c2e9586c2762a2f6dba421629a1c9190c8e42e932dc24283b5,2025-03-04T15:36:04.323000 CVE-2024-26843,0,0,b9d654eaca8b971ba143f7f4fb87196ce8b745706b2c80bb9e34065be3c35694,2024-11-21T09:03:11.477000 CVE-2024-26844,0,0,6c2a3d561678d673e0b3f5e5ec39ad9ab35e38d969f0894d94c51b9b784f7c0d,2025-04-02T13:17:54.900000 CVE-2024-26845,0,0,4cc5fcefbabaa0fc68465fefa356c1fc30362c93331a40df2b20a90dafdbca4e,2025-04-02T13:17:44.657000 @@ -254340,35 +254340,35 @@ CVE-2024-26847,0,0,5bf200b97f40200ea3f4c5fdb26ae6099a257b5d52b62ec285f4e0e9e2a25 CVE-2024-26848,0,0,ffc3816a37936f13d3499a1dca28cdbad7a2ad9759ea9c44a36194e432eb3857,2024-12-19T16:15:07.703000 CVE-2024-26849,0,0,ec63ec406fb7ebcbc467522e7345b2afe48ccd4f6c1f158a6f70ead7943f174d,2025-02-03T16:18:03.157000 CVE-2024-2685,0,0,98fe714717523d75c6bcf80dd171e74b78ac4bd51a344d0f293f685d4c4ae056,2025-02-19T18:20:20.510000 -CVE-2024-26850,0,0,cd6258eb2ad3c8922ac9da0535bbf550b977184b92fd02a3f048c60176f4a5d7,2025-03-04T15:37:48.363000 +CVE-2024-26850,0,1,2cbddb59bc00bbc17623fe8e4fb1274f52527a6e59dbe1f3cf4a0832cef69d0e,2025-03-04T15:37:48.363000 CVE-2024-26851,0,0,9e812c6e27a11d3e00d2f4ac5eb741ca0a7d55fa07a32e1d32a7edab6abb0364,2025-04-02T13:17:19.553000 CVE-2024-26852,0,0,235c7f2aa8c83c2efb321b15b6c389780c938ff78b64ee5dd5b8584eca0345d6,2025-03-21T15:03:25.253000 CVE-2024-26853,0,0,eb6cdb8655b416cad2537440ee4111badb4be2402824b2d3de803dcc6053380c,2025-04-02T13:17:04.977000 CVE-2024-26854,0,0,df970997d094ec400c1dd7a3d50789bbfa57941e087516b503c20db52a198601,2025-03-21T15:03:48.493000 CVE-2024-26855,0,0,56b630f771d4eb82fb88fdfce22b5e50ddb19d9e6dfda25139a755420be7f379,2025-01-07T22:06:59.357000 -CVE-2024-26856,0,0,9d3a63dc215731e03354f7dddecea97304751f9d281f11b2aaa65b04d86f8bd6,2025-03-04T15:39:10.917000 +CVE-2024-26856,0,1,c084fbe38dc48997ff107db33e25938ec751aed97db9379473541a4ce21a3ca3,2025-03-04T15:39:10.917000 CVE-2024-26857,0,0,f807701274a21d9310c3f74057bea17357c360e85497c3db1c206606712fac97,2025-03-21T15:03:58.657000 -CVE-2024-26858,0,0,6b6dfb92577cb41762cfe1d9e5dd81393d817d7ae8756df67d8c14f43c7d172c,2025-03-04T15:41:27.390000 -CVE-2024-26859,0,0,57831ae786f7eb5048af3f724770fda4feb0b99b5ded5ec3db0ac8f87a49e24f,2025-03-04T15:44:46.923000 +CVE-2024-26858,0,1,3309c05eb204c3ea11a211b6b9924d76fb9be882289b38c4e5b79930000c6d86,2025-03-04T15:41:27.390000 +CVE-2024-26859,0,1,261f00748b310bb3bd159d1e304e12d4b5c071659ce953e6d4cdceb4a0457f06,2025-03-04T15:44:46.923000 CVE-2024-2686,0,0,165384eb8b511224d168c3ce5d8c8a5b7db99bec548ea0bcbf83061fefc545de,2025-02-19T18:21:37.067000 CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26861,0,0,6b8b1baba5932697d0eee1ba7b9eb5aa6c3b87c854865fef22d2da687bed486b,2025-04-02T13:16:54.733000 -CVE-2024-26862,0,0,9f3a6b2883c43b81e2c485d43178eaa866ede70a70c7e98455541c809cb0135c,2025-03-04T15:47:05.120000 +CVE-2024-26862,0,1,fe8dfbd56567e7196b3621fc065248d482c32e267aad484ad5d3fe3c056aea5f,2025-03-04T15:47:05.120000 CVE-2024-26863,0,0,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000 CVE-2024-26864,0,0,93be2fadfc1b8409c22b2fd507574342034e0ca174f05c3f42ca6963547c191c,2025-03-21T15:04:54.030000 CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 CVE-2024-26866,0,0,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000 -CVE-2024-26867,0,0,66ab5539756244675eb61ae1a46c4b14a1e638fc529c42de3d06eae2bc09f872,2025-03-04T15:48:35.900000 +CVE-2024-26867,0,1,3ce562417006387f6f353e4f1dc0629cc5bbe7c470101cd8697f401dae548da7,2025-03-04T15:48:35.900000 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 CVE-2024-2687,0,0,62264952bbc7e2ac7aeacc137d3d21488d3071e44515c99fa1f3e90270b3f0b2,2025-02-21T16:30:17.263000 CVE-2024-26870,0,0,2bd6a183ad1975d0b6c0de2939cb199738c8340cd55c7843614845b5df49e754,2024-11-21T09:03:15.490000 CVE-2024-26871,0,0,869aa89d9c16dccb1fc19ae6f3deafd10c976839580428434667c5b886257213,2025-01-14T14:46:37.293000 -CVE-2024-26872,0,0,8a58aca2ff20a41bbd020d2e1dbe7f433347d4a1efe78cff80f4ebd77012de74,2025-03-04T15:51:23.360000 +CVE-2024-26872,0,1,b3f0785a1094eb7c52be9a86333fc5c90cb8793ff5f3ce4ab87f73bd4861315b,2025-03-04T15:51:23.360000 CVE-2024-26873,0,0,65d9833100a12a05ec6dd2cea519a8e619a52464806ebff7909cd8d25bbed206,2025-01-10T18:28:25.100000 -CVE-2024-26874,0,0,6b839fde651d508f36cc629100339021c102c4c3adac6db7161dbabeff0af7b6,2025-03-04T15:53:06.773000 +CVE-2024-26874,0,1,e60d1def5e31743a19c42155b77f71616a546a0c3854c0ac7e282fb5b7869155,2025-03-04T15:53:06.773000 CVE-2024-26875,0,0,bf367e0853ff8f1fb299c01abf4fd38ffa86195fbf4180dece45e3356d9c1523,2025-03-21T15:27:19.060000 -CVE-2024-26876,0,0,4f0669874600b92e243dbfdeefd2adf51f6f60e21d63af09f2792a233577d3fc,2025-03-04T15:58:47.687000 +CVE-2024-26876,0,1,9bc1fd472d7d90159bb0917c3277664b97a50576c47375a99b28ed16970bbcb5,2025-03-04T15:58:47.687000 CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000 CVE-2024-26879,0,0,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000 @@ -254429,7 +254429,7 @@ CVE-2024-26928,0,0,1b9f62c296c5215726dce86600f9e4ed70592e4ce94e3c753cd5222f0e4cb CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000 CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000 CVE-2024-26930,0,0,5c5e492cbbabf155f512e5ced37eff47855bb0f1c44103a53d05e3c1ca2fbb69,2025-03-07T20:28:49.953000 -CVE-2024-26931,0,0,f9dde927b8c46dc906031d63ba39a8136e44938402223de4d6378276e7364a6a,2025-03-04T16:07:42.143000 +CVE-2024-26931,0,1,946c003c64802cd09aa52fdc22ad383485d96d3b3115a2b287d0cbe7dbf9e860,2025-03-04T16:07:42.143000 CVE-2024-26932,0,0,c1aceded26af8e1a981f03fcd7dcda2e798d6370154c489900cfe35a1406823e,2025-02-05T22:15:28.717000 CVE-2024-26933,0,0,e30ba713b69b586b394f48d84ca76a39f221febf18a6d384dccc99b2149633bc,2025-03-07T20:29:52.187000 CVE-2024-26934,0,0,111813ca5533001333b02b7aff67718c94dbbcf3dee498229b6c065da945a88e,2024-11-21T09:03:25.347000 @@ -254442,7 +254442,7 @@ CVE-2024-2694,0,0,4d728e1d04ebd874b9753d4251373dca1c8d4686a42dcbe990217886910977 CVE-2024-26940,0,0,34c47a54c4ec2b8de5152bd6afa4735b3aa9378b8030a82ab47dbd84486bcf18,2025-03-20T21:34:39.207000 CVE-2024-26941,0,0,e5ae6d1a3983ec93dbc1ebb0a1587dda9da5ac8274be6169e8d6e3064e41052a,2025-01-14T14:37:37.710000 CVE-2024-26942,0,0,39f881a4e4cb31695225028db7c03542160cc9b05d12914f25d1ff64ba466f9e,2024-11-21T09:03:26.500000 -CVE-2024-26943,0,0,efc829742ab4113cad8571ac45db36f959d018070c8c3e94ef499e8b74fcabeb,2025-03-04T16:02:02.363000 +CVE-2024-26943,0,1,502ff1ba88ca924e6335bf168bda2cac45c0ef55b87313c9a00ce43ecea9e95a,2025-03-04T16:02:02.363000 CVE-2024-26944,0,0,5173c263c20ff41500d77cd506c0a135055112f78a2020af9be2ee11c60b3759,2025-01-14T14:29:21.517000 CVE-2024-26945,0,0,baaa7648cf38530395d02d5314966ac95ad3dc4b28ddcefdc58c4d9dee03cba0,2025-03-20T21:26:07.280000 CVE-2024-26946,0,0,42cd5cabd74c9173279dd3289adfb70a8262c89e7ffe80862a160dea1859eae9,2024-11-21T09:03:27.650000 @@ -254454,7 +254454,7 @@ CVE-2024-26950,0,0,2941bdad25b517af68c74ee5e0842857fc19a9e2331bb35decdc981cef014 CVE-2024-26951,0,0,a15c37b6d5bd54a202e9938ffb1789819a2cb3e9336b9ad3d9b6d8aa6ed8946a,2024-11-21T09:03:28.350000 CVE-2024-26952,0,0,7c0652b844a091a629cc08288938ed733cd9531d49f62a44fafb0cab152b6ea5,2024-12-02T08:15:04.977000 CVE-2024-26953,0,0,179c4f51f5d32640d42d1d8a2094db4cb129bb21640949e2a59d8ad9aa7d6249,2024-11-21T09:03:28.677000 -CVE-2024-26954,0,0,dc560c2ecd5c119c58bacb78b04e7278b0265702097bd4e8e5e1940d4bb8c248,2025-03-04T16:10:11.063000 +CVE-2024-26954,0,1,f7024acc31342bc5e50c813ca02da48cc86a3b9a1a02f28d3c3e05b669f63830,2025-03-04T16:10:11.063000 CVE-2024-26955,0,0,76bca89ce82e5ae6c5b930181ea09e09a5aecc8071be56ab85e1544b92d9d183,2024-11-21T09:03:28.917000 CVE-2024-26956,0,0,adbc295fe7031fb20e7ac181bad0bd27d6ef9768db74f4b24283887b46cb7420,2024-11-21T09:03:29.057000 CVE-2024-26957,0,0,6a2a6338e6f9af12bd831df87711adb26214149a53f4687ea1078783640a634d,2025-03-20T21:27:17.443000 @@ -254473,9 +254473,9 @@ CVE-2024-26968,0,0,a130cf597cb4edb15223eac1e16071b400d01cf32b8a920a46f83dbcdb106 CVE-2024-26969,0,0,50687f1643da292b237a2f57aa470a1dc3a4b62f7f074a278c79c2fd62373103,2024-12-23T13:58:07.573000 CVE-2024-2697,0,0,75185752f94c46a8517aa2b7e60fa3a9d28d1b1692134edfaaeea70946ab0b18,2024-11-21T09:10:19.120000 CVE-2024-26970,0,0,0ba9a00218d9eea8c397f5e4588dd935509ddd2141695527b6f473edfc614e32,2025-03-20T21:28:18.767000 -CVE-2024-26971,0,0,f4ea80cb11f2bdefa1fc00459113cb3716880fe3621c9cbbad851edca5ef328a,2025-03-04T16:22:51.880000 +CVE-2024-26971,0,1,25dd899a1b8366ede7c570a391fc8f2d7d60bd43556204b5f00025f24a1eee90,2025-03-04T16:22:51.880000 CVE-2024-26972,0,0,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000 -CVE-2024-26973,0,0,cf8490afda62a71ab194e612ff9edbd6861c2de2e9b04c48831b88a77daec63d,2025-03-04T16:25:57.333000 +CVE-2024-26973,0,1,4df10dfd9771f9b1700e5bc913719c46a074f4f87428e57e132f0e2b87404cd1,2025-03-04T16:25:57.333000 CVE-2024-26974,0,0,0e4a56366252557edbb2b1398208500709b44987bfad59520bf0a9bd4532569e,2024-12-23T14:00:33.587000 CVE-2024-26975,0,0,4961103f5afe82ab19bd2d5c28d95ec6a0e6e841685afff291147442422c4ce9,2024-12-23T14:02:46.103000 CVE-2024-26976,0,0,d3d0c459bb86585ae7c7fafb98ddbf8089df654945c999eb9b3959d366e1026e,2025-04-08T18:53:44.430000 @@ -254485,7 +254485,7 @@ CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709 CVE-2024-2698,0,0,92caf5de1a4db3d2766017db2b8c2c83c4ffe4ed3a628a64f14163835fb45ff5,2024-11-24T17:15:04.170000 CVE-2024-26980,0,0,33127b0f3b1e367e5146709d874af6b88b6f9441709434f5a7870c7d434c8d8f,2025-04-08T18:45:21.210000 CVE-2024-26981,0,0,e3d85d4378a3dedaa0ea4ee82c134e38e306ef680bd7e72d630d02192612620c,2024-12-23T20:42:57.277000 -CVE-2024-26982,0,0,0520ce6408fb5ac397a5d52a602e516a6a3e209adfa6af0fb381a0c5464d370d,2025-03-13T13:15:40.163000 +CVE-2024-26982,0,1,b4550cb909d5a7492a0cbb367f783537ea03d6cd9b63766035f7a76ed64d971d,2025-03-13T13:15:40.163000 CVE-2024-26983,0,0,668befa1524b84eb804e032a2857d5c5316ec13983095bd9d2f5e231c1910c36,2024-12-23T14:53:02.043000 CVE-2024-26984,0,0,ce16cf4098b5ea714220075d54f7ce247c66aed28151370bcd4a5f15f56202c0,2025-04-08T18:45:02.520000 CVE-2024-26985,0,0,828c1d0fb4c1394a0226e133cac1cf8633b8aef9bacbe1c0d4677aeab25a0507,2024-11-21T09:03:33.427000 @@ -254502,7 +254502,7 @@ CVE-2024-26995,0,0,0b338507604cbb1e8de1a588aacac642604340925bf7ef4099cd8e3bdade3 CVE-2024-26996,0,0,94196a92dedcd59ff65c8d8bf38cc6eafbc4d2c42dc054f5538bfb34db4eebf2,2024-12-23T19:49:49.543000 CVE-2024-26997,0,0,56325b5ec86fb7da94104b4d1eed21b17473267625bfb004c22f3f5d9b456480,2024-11-21T09:03:35.063000 CVE-2024-26998,0,0,744733f8c7e40554e20d2146afebd3eb629aa7e3bb4b5274484b3c3b2c66f4a2,2024-12-23T19:50:05.873000 -CVE-2024-26999,0,0,1d71480395b713bdd964d53e8623474b8d91114181ebda6982d04af08c6c6c05,2025-03-04T16:33:03.743000 +CVE-2024-26999,0,1,83ebb7b8d76fbc50b4db306b1a0b33fbf94ddb3946cb589c8c06685896413e35,2025-03-04T16:33:03.743000 CVE-2024-2700,0,0,2d26752bea08305a869ee1f5f945d4063d004cec5729f287c9f6fe9b7fbeebbb,2024-12-12T22:15:07.877000 CVE-2024-27000,0,0,ec8e70532984c41a55949dd8b1543183d45686bd12b5d8f12c15457a149aa761,2024-11-21T09:03:35.457000 CVE-2024-27001,0,0,68a5501bb9c3e0b332c21c192c280c2859679c23e4fc027f83619dd9c15129d9,2024-11-21T09:03:35.587000 @@ -254512,7 +254512,7 @@ CVE-2024-27004,0,0,f83d4726c9eaf02e20d27777484adeba44d10c3f8142914019d0b828afc6f CVE-2024-27005,0,0,b35369562f8d6e81058993f9c7f5ceaa7d666bdfe292f82cdb7ca679dedb5e68,2025-04-08T18:43:15.860000 CVE-2024-27006,0,0,f99857766778f03ac72a3c7e775775eadee02d9df0193c5fca85f4242b8c61d6,2024-11-21T09:03:36.310000 CVE-2024-27007,0,0,f2a05b178ac4106d9070d246425a81626e2e0a7f121bcd24031c8978d22c585c,2024-11-21T09:03:36.437000 -CVE-2024-27008,0,0,497e746f8e4209cf773e775bf9e69b7d9aae6cf615610957263a1f2a779243ac,2025-03-04T16:43:49.613000 +CVE-2024-27008,0,1,02d164f7a1eb401baf43954721cb7d5fe2d144e34592f3d9e0e1abd1038a7cb1,2025-03-04T16:43:49.613000 CVE-2024-27009,0,0,56a08cc283b225cf86d33c977cde7fe16d287c90a7e78b50fdcc1bf72160b491,2024-11-21T09:03:36.687000 CVE-2024-27010,0,0,97960f90d5f8b3bf5d51908449345af17f673343664d872a4fe0c28390341888,2024-12-23T14:05:34.153000 CVE-2024-27011,0,0,f6c5ae5bd00c199fb1f8ce883fee32167577ef6bda898e38e50c46aa10dc2a5f,2024-12-23T14:06:38.180000 @@ -254531,7 +254531,7 @@ CVE-2024-27022,0,0,dbd739de33657415c11414e3e66c989817b265db76abc8d2ca1d25c1fa757 CVE-2024-27023,0,0,2aaf37192bcf19ff82447827ef1a65b2dac0157dd2feeef8bad9a358df7f5392,2024-11-21T09:03:41.150000 CVE-2024-27024,0,0,ebee5e148de6b3dde2fcaa8816a9f4f8ed64a771f098565be007ca61974f2619,2024-12-23T19:22:58.463000 CVE-2024-27025,0,0,5c3859f46c671ad7ffd95b4676d27d7a5d64666b3d74e9808cc4d7ce65e2e8ff,2024-12-23T19:24:12.370000 -CVE-2024-27026,0,0,14bd71e4d284e66f0b970806b4099453c4b7765e00bc79f2b6dca1205180f51c,2025-03-05T15:18:05.380000 +CVE-2024-27026,0,1,5ebc1045880e6fc58041de97f61a3db47a130144626c7a435accbf2f528f80bb,2025-03-05T15:18:05.380000 CVE-2024-27027,0,0,ec024f008e45533c7aa91a2939bed64fbe577975d8b93228076417e0feb7b7fa,2024-11-21T09:03:41.650000 CVE-2024-27028,0,0,0b533a85014d97bacea694b3c2ac18a295b5c7293a8a7cba3ef9f45538aa8025,2025-04-08T18:42:15.227000 CVE-2024-27029,0,0,1bc28b467b9b9b92bd81e2a843981108d7a2bcb3adede434c7103dc028886ab0,2024-12-23T19:33:28.437000 @@ -254570,7 +254570,7 @@ CVE-2024-27058,0,0,865694a7a9e07c31b00e33b9b8a7a107f1cb4ec87a25ef90620cb0990e18b CVE-2024-27059,0,0,b8d358dc987b94bc06e49be13c99ba48022e2070d952b9bca9d47418a24f172e,2025-01-14T14:36:42.747000 CVE-2024-2706,0,0,ec4b783f22cb2952cae8bff1153eed6be7a282f6f994a45b7c4840589cd8711c,2024-12-12T17:27:56.637000 CVE-2024-27060,0,0,22bda1115b48ba58b7256e3896819cc9078fb8284ee48e35606dd5d9241e5131,2024-12-23T14:22:29.173000 -CVE-2024-27061,0,0,12baa08e47ca5ed53340b14883989e8216896ea3866d202dd86dc474a8f980f0,2025-03-05T15:17:55.297000 +CVE-2024-27061,0,1,a9e969f403d38626127dc9e32246f4f40b458a758f1aa722eb0bf67a041dd05b,2025-03-05T15:17:55.297000 CVE-2024-27062,0,0,334bffe277d7f68dabdc05821a6a036d4f246a69a94960e8a874ae05b77a6782,2025-04-08T19:42:41.690000 CVE-2024-27063,0,0,7ee22d524b1409264e7967210020859acead09ce5897f02f265765222a640dd8,2024-11-21T09:03:46.987000 CVE-2024-27064,0,0,51ddac2c3289f375846afce0848ba809f5baf86f50157e78463267321c7eeb6e,2024-12-23T14:17:03.783000 @@ -254589,7 +254589,7 @@ CVE-2024-27075,0,0,bbc8253a771dc51806d5205d7483e1a3fb0cf345232dab1fd0c81023001aa CVE-2024-27076,0,0,67207a2d32a43cace3a63d153fb1693a83721d20345be41ce05847c86c97c805,2024-12-23T15:08:03.860000 CVE-2024-27077,0,0,a9d0a16072fe98c5c2eca54562942bf1af10446c1eb18085729ac3d5e8eae272,2024-12-23T14:38:37.373000 CVE-2024-27078,0,0,9ca3d93b99f63cde707b0ba6eb1f9737780ff11116ff8c753623207ee276811c,2024-12-23T14:34:14.230000 -CVE-2024-27079,0,0,55d413dd6cc027d204eaa64393872f32b20d4d4ed1c6b8d8ba874ba36151bbf3,2025-03-05T15:16:58.530000 +CVE-2024-27079,0,1,d1c527c7fd7f5013b21c0d2af5344e90457569b23d3b4a32941e216cd27a2342,2025-03-05T15:16:58.530000 CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000 CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000 CVE-2024-27081,0,0,6c15e52adcba0ad7d5109f723b9d2cb1dbea4dedb4b02f02c3fea3429d99e07c,2025-02-07T17:33:26.027000 @@ -254645,7 +254645,7 @@ CVE-2024-27132,0,0,e8742f781a8ff73cf61281d1616409ebcac2cdd6b0f91debeb348b806096d CVE-2024-27133,0,0,a9d8d190d27104f82fda62c2ffdbb6e378d8e582d1d523c41e2a402e2eb9bd90,2025-01-22T13:46:56.667000 CVE-2024-27134,0,0,6e5953611b8f1e877116fa3afebfd6752cb2629f8e629f5b96be7e4e5b4f7328,2025-02-03T15:05:50.187000 CVE-2024-27135,0,0,75d31c9e262f570258252e2a0322b610f6f1239bf961bb43f466dab3f1250d24,2025-02-13T18:17:19.870000 -CVE-2024-27136,0,0,13e529133b2e84a6c8cfdf5f9c2ff115f3523ac3086bae852c1f8c40e326704b,2025-03-20T18:15:17.993000 +CVE-2024-27136,0,1,0ac21665fd11610d8a13c2a6eec69477339f819296b1ffde059b241031359710,2025-03-20T18:15:17.993000 CVE-2024-27137,0,0,406ba8cc1005b2f95b39ccb2925e400d63ab30eca0da28ad8c183d1a82564e36,2025-02-15T01:15:10.420000 CVE-2024-27138,0,0,a1f246d3f04fa003abe3c6091fd793bedb6f5dde95bf6dd32eacf1451a4a5a52,2025-02-13T18:17:20.050000 CVE-2024-27139,0,0,0ff86b04adb0fc7c1c33cb6bd863a62db5b9916e1f7bb82deb2ed5771b9ccaa6,2025-02-13T18:17:20.287000 @@ -254830,7 +254830,7 @@ CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079 CVE-2024-27317,0,0,c8edd97d9ad8a41cf086ce1a14aa7362ca2e3e95a0b5600c72055a7dfb853793,2025-01-19T03:23:26.087000 CVE-2024-27318,0,0,190ec0397da7141764fc9a11cb1390b995fd6355abec6b64d5b450b556038080,2025-02-13T18:17:29.120000 CVE-2024-27319,0,0,422e08ddd18d1b64051dca2b5411320dcb1755e89fbb6d24ae9879ac3340f718,2025-02-13T18:17:29.507000 -CVE-2024-2732,0,0,76afc7e1589b61ad158f43d82805c0171a26cd8057fc68d4885b8f42fd4b3891,2025-03-06T16:38:00.380000 +CVE-2024-2732,0,1,3b30d6b1be4ab4b7bf84a4116de916c57a2712f09d59f9d13bd710394093ae4d,2025-03-06T16:38:00.380000 CVE-2024-27320,0,0,9bd432bffd8b92613cb510da17aad942a21d8d3e1a29df2e50a7d5d1126a5837,2024-09-23T13:56:48.353000 CVE-2024-27321,0,0,21cb175abd156e3dc500ea41f70806ccea3c2efdc89a895115ff1bfb44978981,2024-09-20T17:06:58.440000 CVE-2024-27322,0,0,90a30a8f73bbcd6fae7496011220bf4154fc63d06125e5732becd553fa9ebc94,2025-02-13T18:17:30 @@ -255298,8 +255298,8 @@ CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9eb CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000 CVE-2024-27950,0,0,53da77641072875e4be7a331920e4e65f0eff4f0d2cd1d57778fc38818e7c955,2024-11-21T09:05:29.223000 CVE-2024-27951,0,0,0d59e379b1d60ec235779c42d8108cd455349416a1f3069278042f85e234b87b,2025-02-07T16:59:17.713000 -CVE-2024-27952,0,0,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000 -CVE-2024-27953,0,0,129b8054db86d743e283e23817840c2be51e9599ad7c6daf77d4372d9f4f1131,2025-03-18T15:20:11.773000 +CVE-2024-27952,0,1,81a29834242c31dbe82566b98d7fb6f92bff9af5401d1fc69d25a4d5588ccfb8,2025-03-18T11:07:04.300000 +CVE-2024-27953,0,1,663bb370651c7a7ff1dd6ae49d078707a58e39770baa67661c0ff9005803dc56,2025-03-18T15:20:11.773000 CVE-2024-27954,0,0,868051cf140aca79ae18199226f95ebe38588b4710d77e4adca2895e0f6050b2,2024-11-21T09:05:29.807000 CVE-2024-27955,0,0,68f1b654e856ea89e2c3920d06b20f4b15b70ed46da32e67660258ac4409cc1b,2024-11-21T09:05:29.957000 CVE-2024-27956,0,0,09304117d0dd240de7d9a86a6eeded8e93c54635c7d3e62abb5a38d54b0636ee,2025-02-14T15:54:46.810000 @@ -255344,7 +255344,7 @@ CVE-2024-27992,0,0,3f6e9ef7f5187737b12eef9339d561e440dad78cffd0f3ed3b922336cb646 CVE-2024-27993,0,0,0942341272bad2f85d96632ec6aa9f840637e1d86c679f4e7ceba61851e272d2,2024-11-21T09:05:35.133000 CVE-2024-27994,0,0,19b6b32c2297e5f0bacb1e80fb79ff6381d73323f24f454dcba6e82c212ef75c,2024-11-21T09:05:35.267000 CVE-2024-27995,0,0,b67a91118678ad08b2cf2c6a8762b6db85d7a3f3a55904fca504af5174a76dc0,2024-11-21T09:05:35.423000 -CVE-2024-27996,0,0,1e24c90b0bbe7f40a151537487e9401367442cd9f07a7e6cc686041dbd2c815e,2024-11-21T09:05:35.600000 +CVE-2024-27996,0,1,122e937931fb5d8d730c34a6a65b1d120fe222f8044d71237342a75d0973bf63,2024-11-21T09:05:35.600000 CVE-2024-27997,0,0,22f4fb6f3b39d82e394fe18f65ca042130372e9bada301d1cd93068c16ca8b0b,2024-11-21T09:05:35.740000 CVE-2024-27998,0,0,54f18276f1d5483160e1a1e41d61ad89be34f3ae2accfcf25da20100c04c5253,2024-11-21T09:05:35.870000 CVE-2024-27999,0,0,0c8d1a9cb639cc67d838747570319a17fd78c021aab367af1a23901f90e86008,2024-11-21T09:05:36.007000 @@ -255370,7 +255370,7 @@ CVE-2024-28016,0,0,749488d31ac32a9ea2b931fc388c512a146a1ae63d159c28c7a31b47cea37 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 CVE-2024-28020,0,0,353857c6f72177d44fa539cd26ab29ac243a888fbe1ba2619943550305df92b7,2024-11-21T09:05:39.310000 CVE-2024-28021,0,0,ef91a2bbc3a7ba80aa4b93dc521740325b47bcd3461fc4ac520536869818ea73,2024-11-21T09:05:39.497000 -CVE-2024-28022,0,0,5ea059470a8cf6092bae5ccd8a38ab957161d881d9e2406a2957277e269bb159,2024-11-21T09:05:39.653000 +CVE-2024-28022,0,1,c6779f751e765b3e78d5f2d6ec80d2cef7d34a51c5b78a4cd4c3ea8b20c4261c,2024-11-21T09:05:39.653000 CVE-2024-28023,0,0,d0157ba31cdde31b93cc5b3ea9b3e5aa4023959e24495eacce61ee4592e593b2,2024-11-21T09:05:39.807000 CVE-2024-28024,0,0,b533ea946a2b9639546197a35035dff5d0217f6e0aea06d05e4f885479f7d352,2024-11-21T09:05:39.953000 CVE-2024-28025,0,0,5080270587c662ea85798bbb1c6ff9b9fdce9419797381c30e49b4269db8dcc1,2024-11-21T15:15:28.027000 @@ -255541,7 +255541,7 @@ CVE-2024-28195,0,0,88cba2fb83e2245fa11cccdd922264095a701ee8b7109600d8beb431566d8 CVE-2024-28196,0,0,1aa739351558571e5c561707d080be08f96c798273d193f204af239cbed8c655,2025-02-12T15:18:34.053000 CVE-2024-28197,0,0,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 CVE-2024-28198,0,0,681ec7de9d169d126455b9ccbb847e847a6d4f8250c5a8a847f2c52e020234bb,2025-04-10T20:46:19.227000 -CVE-2024-28199,0,0,b0a6553d394e1492d6c340c2383e4067d60ca774b3c33aa7288127b59ace68bb,2025-02-26T18:50:07.157000 +CVE-2024-28199,0,1,8c8ab11ab92807718cf1abf20c1f485ed8238db8430127973a511ebe9354f5b6,2025-02-26T18:50:07.157000 CVE-2024-2820,0,0,6e76619a6c3eec74f9743423f6d78a71cac922cf697f965ef8782d4b61ba87f6,2025-01-15T18:53:10.600000 CVE-2024-28200,0,0,0263772c352f3b54dec3441087735e67380564a41516129e2d57456ae7e8b152,2024-11-21T09:06:00.940000 CVE-2024-2821,0,0,fd4177691bb75a747dc742b273dcd4c0da9710e7738842f151ccdad75c67a07d,2025-04-01T17:28:12.840000 @@ -255631,7 +255631,7 @@ CVE-2024-2835,0,0,62bcc62c6906463aa17228ea2ad0a174292add2a197994f5b85bf2a3ea04a2 CVE-2024-28353,0,0,014649d87e048e9f3d29b2d1e799d1333a335df7eaf966d43896aee958c86c12,2025-04-01T16:15:01.273000 CVE-2024-28354,0,0,8bd0dbe46dd1128f9708c199cd618802b592c1ec41f26633748d28c6793b9d49,2025-04-01T16:14:18.653000 CVE-2024-2836,0,0,062ef533be3bd936275761025982286a67d7adfcae19ad377ee383f80dfcc267,2024-11-21T09:10:38.530000 -CVE-2024-2837,0,0,64bc79ae026a6d4ba67442b70bbef681a0cc88a89397ebbd286b11cdae4c91bd,2024-11-21T09:10:38.710000 +CVE-2024-2837,0,1,591aee43363ee3867464c83018ed82d17a52d5b4c1c4a90e613f9574376d3859,2024-11-21T09:10:38.710000 CVE-2024-2838,0,0,fbefee485c39eaa2b52abb308d5a9c60de9a0582ee5439906156bd58879df732,2024-11-21T09:10:38.880000 CVE-2024-28383,0,0,c7dfc36988e292b8a4e9e108f95f30bfe33c4510737a93b8edb438a7bfd87e65,2025-03-13T19:36:35.840000 CVE-2024-28386,0,0,edeac53a83a8822b50d31d5b403af1a1addf4eb177afa9c4bbe5f0717fd0fe90,2024-11-21T09:06:14.300000 @@ -255800,7 +255800,7 @@ CVE-2024-28740,0,0,59845f313cbdf7224a1102cca1548a45ffb7fb3b8466fe620d06a97690098 CVE-2024-28741,0,0,335d1d75b1ec6bbbe9be7839da86be48fa75d600721df7343911718962694585,2024-11-21T09:06:51.950000 CVE-2024-28744,0,0,d80a636691f100f09a75e0a042c51fb3034a953b6a967d3f70a481b8b5994955,2024-11-21T09:06:52.213000 CVE-2024-28745,0,0,91ef1325c98edf70fcbf24b65ae735057caef5c58bbed9642397279a120b86d5,2024-11-21T09:06:52.440000 -CVE-2024-28746,0,0,2b09f47274fb34324f60836312e865700a7778fef29348b664c0c6feeaadc7b3,2025-03-20T19:15:28.523000 +CVE-2024-28746,0,1,cbde51c808e85a419ccafada1b06805cca8a2858a164b0107a3648a0bcf2a8e2,2025-03-20T19:15:28.523000 CVE-2024-28747,0,0,444e0665e0fa4bc7a9eed21e96c1f26d12d34db5f4f03af83617f9af0cdac9dc,2024-11-21T09:06:52.760000 CVE-2024-28748,0,0,986bd0b3a8d13558908b2e1a62f8fe2184ce6b09035b5249a0a0f5b6201e3950,2024-11-21T09:06:52.890000 CVE-2024-28749,0,0,d82cd3742eadfa7bf824ee31dfa37098b1ae1737e1fa93022ca9f93753fa6a44,2024-11-21T09:06:53.027000 @@ -255836,7 +255836,7 @@ CVE-2024-28782,0,0,cdc3e35e4bf13236d2ce01a94ea070a597b7e3103086d82bfe78a3b23a430 CVE-2024-28784,0,0,2142349f5c584e2543e99ff3d0a85ed9b7dfb0e69f599bc5183b62005dda4a75,2025-04-10T18:15:00.330000 CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000 CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000 -CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000 +CVE-2024-2879,0,1,174030b52008daf55d46874ac0210ed2fc3e97bd7dffc8be01d1698b2d178af9,2025-03-17T17:03:45.717000 CVE-2024-28793,0,0,3e803fe3c92ef258276738fb1293c79215cd2bdfdc7da7758b6bec7fc3eee177,2025-03-10T18:54:57.220000 CVE-2024-28794,0,0,753119303926f099a6871b2aad29e596a251b3b7511785f9ac432c16c51f6fee,2024-11-21T09:06:56.313000 CVE-2024-28795,0,0,13660f5f0e3307ed7567ab8952f3f7ea7f686deb9fb2cf94040d198f3b34c369,2024-11-21T09:06:56.463000 @@ -255901,14 +255901,14 @@ CVE-2024-28867,0,0,13de37d1251837764571928cd6979ba699a7aa83d7eae7fbaaf533c23265a CVE-2024-28868,0,0,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241371,2025-02-12T15:23:09.683000 CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000 CVE-2024-2887,0,0,2151745dcd1daf556cb13d574e9eac547b9e2e36f2c3f34a1c838383696c4f69,2025-03-28T20:15:22.407000 -CVE-2024-28870,0,0,1948db6c1330344e0305cc9883b822c2b1c7846eda6f6ae64a39b3f568697ade,2024-11-21T09:07:05.013000 +CVE-2024-28870,0,1,5166b26488bb1feaa66149bda933432b4715e73f8f764362d70c58e52474dd17,2024-11-21T09:07:05.013000 CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000 CVE-2024-28872,0,0,efd605e2b04b121c2231623009b4fa909abf78c19ec3893f1988cbfc577adb70,2025-03-26T15:15:49.380000 CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca461a,2024-11-13T18:10:05.647000 CVE-2024-28876,0,0,275454f6648ae48abb7dd0bb2572cfbc3374f282a0e739572d5d9f74b7aeb1a2,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,f69b91f848f40caef8dc460ed34dffd163da94be069ff6862e0b6681318c02a9,2025-04-10T20:20:01.400000 CVE-2024-28878,0,0,90956f79f168fc36d6b6bacee918ce9e058b32142fa56831e843f9bd0ad863c6,2024-11-21T09:07:05.950000 -CVE-2024-2888,0,0,4528ca4c4e9c2710456e3946bb4f009402d0915a1bfd36b4b2a3cf59ce181893,2025-03-19T19:02:10.360000 +CVE-2024-2888,0,1,30f9d97cce50bcb1ff1760369d7263c58d4c14a2d1912b861813fda0696822cc,2025-03-19T19:02:10.360000 CVE-2024-28880,0,0,dce67170de98f0e8d2cb2c5e6724ba2918f4b3e757ed17b2daea09b41e6729b6,2024-11-21T09:07:06.070000 CVE-2024-28881,0,0,76f33caf69bc593b5028f013928afa615e33f660b6dfd892a36ded448eb993e4,2024-11-15T14:00:09.720000 CVE-2024-28882,0,0,d2fd90a7f9ec67efd0992204e74ccb908ee6aad42300a064f5ff2488193b111f,2024-11-21T09:07:06.380000 @@ -256144,7 +256144,7 @@ CVE-2024-29113,0,0,67193884cbfa1ddbf646eaaa45d0d67d2d3df78358d45e278ee8b835b3bad CVE-2024-29114,0,0,39cb53b4da6c8003a41625c5a5e83b4f05b50a29467a28b18873c185c191b51b,2025-03-21T19:13:12.550000 CVE-2024-29115,0,0,072f20d45779c67e1eb9aa338975d0a10ac71b9e7d97604bd45ea997ea5ddccb,2025-02-07T17:21:05.720000 CVE-2024-29116,0,0,26937c2303a397b0e754f86089c4e82794a9c01028d4fbb39ff77bb5a452c1e2,2024-11-21T09:07:35.393000 -CVE-2024-29117,0,0,378efc3eed009982f9306687c76babb39f8ff6381283278b008e12d0df4c7a03,2025-03-18T11:54:32.273000 +CVE-2024-29117,0,1,7e3121788bd708515e13ad86dac06691f2af63f61dfd8dbb66e2afa4678c67c4,2025-03-18T11:54:32.273000 CVE-2024-29118,0,0,53699996adc37bf116f2e52d3369de9629ce479b5ba3d2e23b9e661ea562289d,2024-11-21T09:07:35.673000 CVE-2024-29119,0,0,3e47302e9e5c8f054b0ee0d042cd0bc0fe30b4364065a6dc24b1ebc8e9381bf0,2024-11-15T22:50:03.257000 CVE-2024-2912,0,0,37e835e5c308fa0aa260f2c273bc0161a037279353c9b0757bd2ac8975389355,2024-11-21T09:10:49.283000 @@ -256199,7 +256199,7 @@ CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e CVE-2024-29169,0,0,2989160297fa861df4fba64a6dfc4ef1e957e47de8a9260c973acfb5332f9540,2025-02-04T17:21:08.633000 CVE-2024-2917,0,0,f0c87ecf7462978a49b004d717701418b2f3661498c19459d9f0ac80279d5924,2025-02-20T19:01:17.880000 CVE-2024-29170,0,0,29c79316ca4af6e2064d381a9337413084e947d3a5373d4432342f0f2a1a999c,2025-01-08T16:25:58.207000 -CVE-2024-29171,0,0,384f6caf18dd8952f91b33c74adbb5dd7a0e115a6db2888b7582e64bc20810ff,2025-03-19T15:16:39.803000 +CVE-2024-29171,0,1,af065439367cca794faa3fd1ce777006bdf279990e2d53c4ad7b7099de0043e8,2025-03-19T15:16:39.803000 CVE-2024-29172,0,0,37510c6d5072123485e617cb3b43ec91adc61e575651329653b9cc49a2393354,2025-03-19T15:18:36.553000 CVE-2024-29173,0,0,efa64866ee4af6a7c3a24e5ad3ba6cedc50c999f82e7214ef5c61bb7ad35f45f,2025-02-03T15:08:59.513000 CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000 @@ -256320,7 +256320,7 @@ CVE-2024-29386,0,0,808f71869d95e5d3aa1cbc6777c7ae49f412c09ab44446fbae42a3f8c6afe CVE-2024-29387,0,0,7c90a0e71e33b2d6b5f61b7a5192b06affcf3848bccaca26ed95de0dce63f4b9,2025-04-11T13:47:11.857000 CVE-2024-2939,0,0,558b843869773db58e41d3e67b617c443849c6f6002b5c0a69358a8665c4a9e3,2025-02-19T18:43:35.447000 CVE-2024-29390,0,0,62da36fc072ae90418250d6d2d90372d8ae5830e09e71bb4ce33788a35eccf16,2025-03-27T20:15:25.893000 -CVE-2024-29392,0,0,4abff635bd0f0810b369387adfab34d800294f635b1733e7a1daf9c43a853ab0,2024-11-21T09:07:59.790000 +CVE-2024-29392,0,1,26089dd6bc508fcc7f22a2e2496590268721358efe1fe88e87aaa66b537bc384,2024-11-21T09:07:59.790000 CVE-2024-29399,0,0,4d28477f48a6de8c3d91cd71b510eb449e3eed0008fc8bc7752b4a8bdc48d15a,2024-11-21T09:08:00.033000 CVE-2024-2940,0,0,32e376b4d133a298af5c034f36545d941aa0b1c8c39ac6b6cc9bb44a98c8cec3,2025-02-19T18:44:10.760000 CVE-2024-29400,0,0,b60e49df326991eb27557ce166dcd99358995137b6ae59e95d7fffbbd0b37c22,2024-11-21T09:08:00.253000 @@ -256397,8 +256397,8 @@ CVE-2024-2959,0,0,ba986b2eabf7fea9d214ab9db204fa0f9e7a71d6ec0077b37d2fe751739dd0 CVE-2024-2960,0,0,b4bef65fe6db3c6c321cb6d6a9df046483c0d83e7172e9a700e4dfa3328b965a,2025-02-20T19:47:32.867000 CVE-2024-2961,0,0,f1bba8b4f06316b5573c5d642ec0907f1ed7b105105c983fe0c2a39eb1e5127c,2025-02-13T18:17:58.060000 CVE-2024-2962,0,0,89a3331e528f6bca440fb1e5ac52085937df2cf4d043afb751bb1e4bc331e9c4,2024-11-21T09:10:56.493000 -CVE-2024-2963,0,0,c2d0b1989b3c9f93ca0942e4dab1bb6362a4565954f08c686f9ea9a139f37bb1,2025-03-06T15:30:20.320000 -CVE-2024-2964,0,0,3341696d6c8393861a51561547b1ac8f18229824c1bd4bac9fd2c7b4a97c8218,2025-03-06T15:43:34.153000 +CVE-2024-2963,0,1,485ac60afc60faa14523910ac7974001eb71cee90b70313f8d0abd674f3d0ffb,2025-03-06T15:30:20.320000 +CVE-2024-2964,0,1,5047b0a863f4f9be4d53fcfc2cea2462d2b5bb0566fbfee55c722c01caec7386,2025-03-06T15:43:34.153000 CVE-2024-29640,0,0,65d6530699a7099d302e2fbf8d4b7ca80d9e1a53023aa40de7aef2cea04c7ef6,2024-11-21T09:08:07.760000 CVE-2024-29644,0,0,40fd36286b11a67665c0c1e768c6cae16a7e27cf9dff2d06385cdeeab4901261,2025-03-24T16:15:18.193000 CVE-2024-29645,0,0,73d798b604d7483a3c4ec922abe2eb5e4bc5fe813f77a3e0d68ccd7367a2b94f,2025-03-13T16:15:18.670000 @@ -256623,7 +256623,7 @@ CVE-2024-29911,0,0,e04c4ea66efd6562ff0da88ef76967e17c4df22167c7bb86d38730f721ae0 CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 CVE-2024-29913,0,0,803bfd36fc512b689461bd42ab9d5518343c822c54a7fae7fbf93ef4a8f5e322,2025-01-28T20:29:09.363000 CVE-2024-29914,0,0,7c5531720064523c200888ff21e4ecd129aa835bc9d9b4bbb5043cd65c102278,2024-11-21T09:08:36.433000 -CVE-2024-29915,0,0,17adab2f35455547d50732653773ba6585a2ab526f44bcd561def305ac4fdcc6,2025-03-19T19:37:19.997000 +CVE-2024-29915,0,1,c986037d722a91171f33d0b7df0cdc1f223245dd0ef8efe833324beed7111acf,2025-03-19T19:37:19.997000 CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c33d,2024-11-21T09:08:36.687000 CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a035,2024-11-21T09:08:36.923000 CVE-2024-29918,0,0,465e83038d5efc5e68bff669035ad69e639783c581ad5c2b24a86725d5d719a7,2025-04-11T20:23:06.703000 @@ -256637,7 +256637,7 @@ CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045 CVE-2024-29925,0,0,d6978490e982e5a68642c046e8596c856544f4351e634beb8b1a28b2be5486cb,2025-03-10T16:12:06.027000 CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000 CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000 -CVE-2024-29928,0,0,c62f5222b2d74d45f1365ec96af19b9a66ced9d160a0323e02d9cd8f7ed96939,2025-03-18T11:33:47.187000 +CVE-2024-29928,0,1,8cf9af37ba15bc777903859723dcd09cb97cf568d595115653e15926add0c97d,2025-03-18T11:33:47.187000 CVE-2024-29929,0,0,f91bd0d65bfbafabbfd1e47fc42f253445f71d47c1a395703c4c93c760349825,2024-11-21T09:08:38.430000 CVE-2024-2993,0,0,ca085be1f41ce1cdb604449d670421536b9009a843dba261ec4149fee50495e0,2025-01-15T18:21:04.553000 CVE-2024-29930,0,0,9749f3c46d5ed598350d72b277cf5b80576c9e694bfca9cc9de48ba3f3758cda,2024-11-21T09:08:38.547000 @@ -257163,7 +257163,7 @@ CVE-2024-30450,0,0,1f22d60fd8328059f0924db0f61fc614f1b93097538d47446f87ce05f932e CVE-2024-30451,0,0,cbf2894838c88c6ce6917b56aefbe5f7fc68167adb2a8d98ed36e792547ff777,2024-11-21T09:11:57.103000 CVE-2024-30452,0,0,8ad8d0eca7b3c83f0489d284832375756cdb15bea1fa23fc3174e599751e2585,2024-11-21T09:11:57.233000 CVE-2024-30453,0,0,573d1a2f4714dc8fde1fd9c80ed44a7e78bddcba54b4583f722b600a9b0bba3f,2024-11-21T09:11:57.367000 -CVE-2024-30454,0,0,02f265310fabb7b1111ba661a4c8951908d37f29b16607a3bda7815678185928,2025-03-19T19:37:29.717000 +CVE-2024-30454,0,1,0538339386b260d70413d1dd80ff459dfd2d0eb0b41159597f472ef2b834d6c5,2025-03-19T19:37:29.717000 CVE-2024-30455,0,0,263de63a2231b0199b4a2a52725a3031a9bc31e76c25272830140eba24e0097c,2025-01-31T19:59:06.177000 CVE-2024-30456,0,0,ea4403f0b2540c92371613718141ba9100c39e365ee31de6c9ec4b89f8929cb8,2025-04-09T15:42:49.090000 CVE-2024-30457,0,0,fa4ed4b685b8d952934ea90fec9d1f1e91cdda2603fa4b7ac2c668ba5d800825,2025-03-10T16:53:12.913000 @@ -257261,7 +257261,7 @@ CVE-2024-30544,0,0,000812eb578004fba324ad62ebd495504e2212c19a4b0b0e0a7882f2e09d5 CVE-2024-30545,0,0,9fc1519b1df9cef49e003c31844226b87a8a0876e6364f49bd01371911facd15,2024-11-21T09:12:08.943000 CVE-2024-30546,0,0,682d8bf45e6a08218a5a3a2da6b1491ce652cde21b3fc1369e6ec13bc346b6de,2024-11-21T09:12:09.073000 CVE-2024-30548,0,0,f693c6a877ff0dcdf6fe4ef2a958123b8947204e837af80130e7a6521588b872,2024-11-21T09:12:09.200000 -CVE-2024-30549,0,0,e0aaef9d1124e68820ae2a631987df8341a68ae1335bb73b4b302dacd497888f,2025-03-18T11:33:13.290000 +CVE-2024-30549,0,1,50ffb50758d2bcc2bec91ce8f6f9db0dd52d012223a39b6ab1eede9cc639eaa8,2025-03-18T11:33:13.290000 CVE-2024-3055,0,0,80848d3ebe6c9d2dc11053b924adec8e053b2e76ed033beed24a77e64207f08e,2025-01-30T16:11:40.940000 CVE-2024-30550,0,0,e15b793527d066607c2e7c49395ec06272995564e561e3f6a7e39fa8d699798f,2025-04-10T20:44:07.733000 CVE-2024-30551,0,0,1e6b51a7a6c6332aac1197822ceff35a8c0ec56590e5297f09a269ea4cdb1fbc,2024-11-21T09:12:09.580000 @@ -257431,7 +257431,7 @@ CVE-2024-3081,0,0,a14445c7a979f6aa591ff52890a0fc6ede71ae070aa04ef234776c592367ab CVE-2024-3082,0,0,6ef491da5f61eb445c102687ec9bb9fe7371b1b45e2376383bee2e022b96b566,2024-09-30T15:15:05.573000 CVE-2024-3083,0,0,cccc6733810fbf6686c0ea133ef2ddbccb971e5fd28144f1076f18955c8210b0,2024-09-30T14:15:03.317000 CVE-2024-3084,0,0,78e37833e4018c0451a2e57cecfa2983e7634d83093c960a91a3dd3908a13f09,2025-02-14T19:20:29.973000 -CVE-2024-30840,0,0,670d3f3098a46c1b1495ddf500d630a3aea95595716a89dfeecc630459653d7c,2024-11-21T09:12:27.073000 +CVE-2024-30840,0,1,b2a3ca370343447542b4d114beea4c0e4f8dc9a64e46179c3f4ccea919340499,2024-11-21T09:12:27.073000 CVE-2024-30845,0,0,f5a78f2b78cc6754305a4cdff00107f918404526649bb47c18c893e60776a029,2024-11-21T09:12:27.307000 CVE-2024-30848,0,0,e40c812aebcde1483034aafc18bd7358a624108bbd12a9c3e98f2c43927251d1,2024-11-21T09:12:27.530000 CVE-2024-30849,0,0,41bab1c02c7222db096edb20488f06d8338703ebeb64fa7e20c9e09b1cc9fc4a,2024-11-21T09:12:27.737000 @@ -257783,7 +257783,7 @@ CVE-2024-31292,0,0,986b0ab4060b29cfcfee9fe97b6b0ff950c81bb21a038d80f5fc683b5e6c2 CVE-2024-31293,0,0,4d2a029d2b4cd73016c7aa8192ac97aac92ac1e6331ad58f0ae8fccb54c116a9,2025-02-07T01:39:13.393000 CVE-2024-31294,0,0,5ed5372a360b624a446e22a07eb2be5cf527e32b35d5c2864187588206647b63,2024-11-21T09:13:12.927000 CVE-2024-31295,0,0,92ada23cfd6b9ecf1c9856a40c55ed02ad211edfe8a7aad41b745ec36391491c,2024-11-21T09:13:13.067000 -CVE-2024-31296,0,0,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000 +CVE-2024-31296,0,1,cea0cfec6e795f3bbbc1c4cbb9d61c015ff6c382371fbe72160bbedec713e5ef,2025-03-20T11:23:10.463000 CVE-2024-31297,0,0,41a2a7cc11a2b46cd5dfbe67c847e7fd89574a5f0a1e6d68280acff006f8cd6b,2025-03-24T17:01:46.660000 CVE-2024-31298,0,0,0ab299c6b1074f9a53cd68dcc9466764171d1aa9ae2a2b6dd1549617684a8291,2025-04-08T15:07:49.990000 CVE-2024-31299,0,0,ec5b4321e0a7ff9d16e5bf5531f41c6769ab3cd1532edef61e0876574b7dabcb,2024-11-21T09:13:13.567000 @@ -258003,11 +258003,11 @@ CVE-2024-31525,0,0,b8d8ab4d6181e02f7a03e856bfebf33fc0b55b912e5b45755f0ccd69b64a7 CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000 CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000 CVE-2024-31544,0,0,9c017e58def3f600944b422d6190d5a13ec0fa5e7033195d3191c8cc1ac1b622,2025-04-11T14:56:38.257000 -CVE-2024-31545,0,0,4f76176ef1d0a45b0910b9670d713a33f1ee763fe61b8ffd8d6e9b68717cf111,2024-11-21T09:13:40.963000 -CVE-2024-31546,0,0,030398bf67dec8eaaf508dcd79e7674b82eb436b53e8566aeeaad500f11786ad,2024-11-21T09:13:41.173000 -CVE-2024-31547,0,0,3d87e9458abcdc38d013b56b072c776efee59973c5d10dbd303ab7cd2ab5974d,2024-11-21T09:13:41.393000 +CVE-2024-31545,0,1,99b596b36034cad0926717eaf45bc11ae17445feb259b7a1a65cdf2967de7a6d,2024-11-21T09:13:40.963000 +CVE-2024-31546,0,1,1ffe7e8064ed65b6a488f96e35a1f249ae3af9c5680bfccfe0f44d36ab49746d,2024-11-21T09:13:41.173000 +CVE-2024-31547,0,1,a35a9dcd218e4a3d5d81adf2f8a30fc9238284d73564e63556f0316592efc81e,2024-11-21T09:13:41.393000 CVE-2024-3155,0,0,530e0855ee264eb0be51ab25d18dbbd4dfbb33e753eaf4b8134cd40d549d8471,2024-11-21T09:29:01.260000 -CVE-2024-31551,0,0,fa356538791314352979c31c65625f7d3d1db76d8fbb563c6ca1908911c69420,2024-11-21T09:13:41.600000 +CVE-2024-31551,0,1,365ab77aab3eb86d7cb403828a3cc3a11b5418ca31493d1055d3df2a4541a0d8,2024-11-21T09:13:41.600000 CVE-2024-31552,0,0,914ead9815931e20ff2181154b06c32ef7a3d8a7fa339ea2db19cc8be42d3e29,2024-11-21T09:13:41.820000 CVE-2024-31556,0,0,96444529630c53112af8d950fb6f11b36a11f269e7a01ba1ecf9567edabc9909,2024-11-21T09:13:42.030000 CVE-2024-3156,0,0,407efcecf2ac3b4aa4d040b2e2ca127d98fd5076def79500a939cda11ce1ccf2,2024-11-21T09:29:01.403000 @@ -258391,7 +258391,7 @@ CVE-2024-32115,0,0,ec0a8d5a4cbbd5113ad9a80a0c093985a380b14a1c6ef996f4aba1017c578 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 -CVE-2024-32122,0,0,1df72ffd8cfcce7143fa6d1989c51b77807c72cceb55a7f95ef201f2433790d2,2025-04-08T18:13:53.347000 +CVE-2024-32122,0,1,6f35e5381381f2676320b6de1c8a3629b1ca38678672c35a80b453468e963a1b,2025-04-08T18:13:53.347000 CVE-2024-32123,0,0,60129c37069c23661983217154006f556b580f62559adb1b35a9e1f56364af41,2025-03-11T15:15:41.353000 CVE-2024-32125,0,0,d36ac7f8a17677d938b5bf6c12b9c868ee2ece6d692e8f1181aa5a94b725cccb,2025-03-12T18:52:52.640000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 @@ -258408,12 +258408,12 @@ CVE-2024-32135,0,0,bb472ad60ceafc8c196d75ee5dd55c4cb326fa7042c82bf43ef274ed6e6ba CVE-2024-32136,0,0,9f84115ffa8720b79560c03c1cb35df4341d773004df02eef74e13766a109195,2024-11-21T09:14:31.830000 CVE-2024-32137,0,0,3827b4422b9a7a673518e4e22d10627690791b57bfc4b56bb5770b98889cd1e6,2024-11-21T09:14:31.960000 CVE-2024-32138,0,0,12c7df0523e1993668bef607139dcf4c44b1fac9120776a4f5ecac2b8fab6f80,2025-04-02T18:09:57.937000 -CVE-2024-32139,0,0,83dcca6dc31c1bdc2893f533769b9cf8f20465c2e705be3f0901678852c46936,2025-03-19T17:58:54.203000 +CVE-2024-32139,0,1,c45f65f141a663e0451e68ca29f763df808836fee0d09c275cb093af01690395,2025-03-19T17:58:54.203000 CVE-2024-3214,0,0,e49117e773b743e4cfaeb7a84fec89702a5c934d3c4aceae9e7d0655bfa5aef4,2025-01-28T21:03:01.313000 CVE-2024-32140,0,0,ccdbc4cddd5ae0e805fc8cdaabebcc9911d77b51f7f6fdec32fb0b0a6ddbd2fc,2025-04-02T15:13:11.950000 CVE-2024-32141,0,0,dcf8a0c01e6a7f5d3d6e92d0dd77ce174bd42a293c36bad371a0e0a22df2e91b,2024-11-21T09:14:32.497000 CVE-2024-32142,0,0,b217a174100db973d030d1b55e39f5014e0fb04c15ff4a976a3ab77b68a2e5aa,2024-11-21T09:14:32.630000 -CVE-2024-32143,0,0,b7a0cbfeb192e6fda4f3fdeb90f794f3bfaab77c0ccfd1f9dae5f4096e82c728,2025-03-19T18:52:15.910000 +CVE-2024-32143,0,1,42f9da7318f7619885c5bd8d292a3709dee39b266a1f4b20443343f513379a68,2025-03-19T18:52:15.910000 CVE-2024-32144,0,0,a24eb1f2f415b39fab1e80fc99fdcda2514310296ccd02d6564f265da2b078c9,2024-11-21T09:14:32.897000 CVE-2024-32145,0,0,8b966053584e650ec992afad4755e32ac100efa1d80fd12ad62fcbb3051b9be6,2025-04-02T15:12:36.120000 CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf295611a9,2024-11-21T09:14:33.187000 @@ -258425,12 +258425,12 @@ CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f2573855 CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000 CVE-2024-3216,0,0,1a66c657b2c05dec189fbd499b73aad44096e6f6bac1f349f7d19898fe5882ff,2025-02-11T16:31:21.577000 CVE-2024-32161,0,0,0dc190f3981d5e79cad9fecc2e2149a6a38211e289bd6db07e8bb128e6f7dd9b,2024-11-21T09:14:33.830000 -CVE-2024-32162,0,0,4e8fb3c00cf6f382448cea6d448092d5c7a04bbdd0f5ada2664c266ccef0c98a,2024-11-21T09:14:34.053000 -CVE-2024-32163,0,0,70a810f0e7170dda71d497968384a8941bd9a15377fb1cc21b5d3bfeb42fa0ab,2024-11-21T09:14:34.280000 +CVE-2024-32162,0,1,2c39234964a4eb3971a22591fc4898eae9a2e1f835cf8666d858d6eebd4f78b8,2024-11-21T09:14:34.053000 +CVE-2024-32163,0,1,69c6d764d3f51bc84e95ae46030e3935fc58f9c91b9e794c3063d7880099dc4f,2024-11-21T09:14:34.280000 CVE-2024-32166,0,0,30c74ce7f6bd4f849723a2691bcc599fbdb2bfc2e47c9bf3e7bf78a858bb3187,2024-11-21T09:14:34.507000 CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec44841bc,2024-11-21T09:14:34.797000 -CVE-2024-3217,0,0,b82dc7d89f7ffc5baa26dafda1b3f7852ab927b40c484607d0d5c5adcee576d5,2025-02-27T16:14:24.610000 -CVE-2024-3218,0,0,d01aa6f96d32740dcbc0a55c99c06e954ff35bf88ef48171b914b0e959c1b205,2024-11-21T09:29:10.287000 +CVE-2024-3217,0,1,6489e5216e63df8c00e811264de72ef6159728dccee24b60dc679b123dbf8257,2025-02-27T16:14:24.610000 +CVE-2024-3218,0,1,81581ac92c0291d6ed71dd9b38de9b17941e2f3f078e37375ed0e3bad56cd497,2024-11-21T09:29:10.287000 CVE-2024-3219,0,0,de3f9fd70dd3922206912d5b11848a3b5ec7b145621830b3178421a5ed707f1d,2025-01-31T20:15:31.547000 CVE-2024-3220,0,0,c766422298c136f4a8e45324514ac876059fb77966ac9b6e9eab0ff9acaf57d7,2025-03-14T10:15:14.917000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 @@ -258446,7 +258446,7 @@ CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc237 CVE-2024-3223,0,0,8e7acace2f55ce6993a57e9091bfa8f8a1a4cee64bee3cc490425b03226e7528,2025-03-06T16:39:43.707000 CVE-2024-32230,0,0,e28e51470155b6141e18d3206d842725b0ba198262e901f564ec6439f16f995d,2025-03-14T17:15:45.373000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 -CVE-2024-32236,0,0,fc34b21c4f3444da90a31820b43bcfe52e5dd20b58b8287749526e7c509dae7e,2024-11-21T09:14:37.230000 +CVE-2024-32236,0,1,3841e3911431ab1b9da7a7824311a7badea750a89b323cead49869e168f7a36c,2024-11-21T09:14:37.230000 CVE-2024-32238,0,0,a12c22dc2403ba80ed1de919c44facc67baef0612fb0b9d0851801fd325df7b0,2024-11-21T09:14:37.450000 CVE-2024-3224,0,0,b2160c1117a02bce2e68c6d5ed1ac462d227650a3af09b0218f06e135ca9a8a2,2025-02-18T17:07:28.527000 CVE-2024-3225,0,0,d2280b4f4397ed919ababb1f8a3bebbaf399d055d788c2b595fbcd9f7f944f67,2025-02-18T17:08:27.630000 @@ -258528,7 +258528,7 @@ CVE-2024-32371,0,0,6dc2cf5c1b2afa9aff0fb85d7eb3862ac7c3c1783d125fc25effbc0b708fc CVE-2024-3238,0,0,d91f327ead14e98bdf51999876e5008a13a8f6f47c4ebaae0fa2e8417954dc74,2024-08-02T12:59:43.990000 CVE-2024-3239,0,0,4ef197b9b888868bb16b5cb0ab5540999094fc32f1c9976a37ebe11b7de77759,2024-11-21T09:29:13.223000 CVE-2024-32391,0,0,6489f4d64502591a2baaef704cc82ba623d6232098a381c36eb60e16633cd304,2024-11-21T09:14:51.507000 -CVE-2024-32392,0,0,4f9f72cc8e88b0b52795cc69fc25a82067281981f064600d476d3707bf910f76,2024-11-21T09:14:51.733000 +CVE-2024-32392,0,1,4fa28f06e586c02fe396c3d9d070637ffa575ceece94a7327888b91e397ed06f,2024-11-21T09:14:51.733000 CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6815,2024-11-22T16:15:22.317000 CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000 CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000 @@ -258615,7 +258615,7 @@ CVE-2024-32501,0,0,4f31e61e3f7b09df6ac32577f33ab48054890a9b5f112b2e409f8cb1403a2 CVE-2024-32502,0,0,abc759992d854f89f618f3233c860a4ce829a7f1b91e337440ec7de27e0071b2,2024-11-21T09:15:02.640000 CVE-2024-32503,0,0,c6a615c17364ef1ce2a554ba3cfc1f0e891a0bf691c9a89ea916dba332da9354,2024-11-21T09:15:02.893000 CVE-2024-32504,0,0,2aabe701b6eec7e2b45fe499888dddd7f5a1aa426efb26ffa55d554911270a4f,2025-03-13T18:15:40.470000 -CVE-2024-32505,0,0,d7a2d32ddee71d2913c15e727239ce4e988f5d0e41404c47775dd189972a5643,2024-11-21T09:15:03.347000 +CVE-2024-32505,0,1,16fb0b1b8c1daac0683c571d9454687464937ddad66385e0635d2f4a9a6f327f,2024-11-21T09:15:03.347000 CVE-2024-32506,0,0,b107e8ddd51e583a9d0ff0af499834d62f7eab2b21288816ce4e8a42d24808cb,2024-11-21T09:15:03.497000 CVE-2024-32507,0,0,adfaa8d5d3c430c1e863ff4b449d0566f7cb0a7900c0306a1fa64b604809d5e4,2024-11-21T09:15:03.640000 CVE-2024-32508,0,0,48fe7cb0bf663bd083947b5ff0c443f41f9ac46980f5ba5afad6c351eaea1d8c,2025-03-24T14:27:15.187000 @@ -258720,7 +258720,7 @@ CVE-2024-32599,0,0,85f9b65b3f6db3f4885fa3bf551795f40394244ea206141eb30d6421a2116 CVE-2024-3260,0,0,4fd56a2bc1fac8629d6f2b29f7165ccf2f1f95ef21bff0eb4b38593fd9846714,2025-02-11T02:15:34.593000 CVE-2024-32600,0,0,00e14840c904317cae2d379a6776e98f5f7d35bfbcc5b55d8fed12bb45a03e58,2024-11-21T09:15:16.433000 CVE-2024-32601,0,0,af010acaf4743111a3bc69689ed2d216bf07e925bf205d05dff921279ff747bc,2024-11-21T09:15:16.587000 -CVE-2024-32602,0,0,ab5d34c5a3302e6d93095dd4db85c9dabf034ce30403ea92f0ccd56e08f1d774,2025-03-19T18:05:39.363000 +CVE-2024-32602,0,1,35cb0efc7c349ae383b10bd4be9f4550f4f3d2556e19ed06e7662f5deebac59f,2025-03-19T18:05:39.363000 CVE-2024-32603,0,0,80a98c3b7ad555ba0fda6a97686fef1659cc1c2d73973b0c941004d6b6d242a4,2024-11-21T09:15:16.867000 CVE-2024-32604,0,0,e7bdeb8d2e2fadada24176fa229f6cb30e87ba3862a563fc78ab541cf1354837,2024-11-21T09:15:17 CVE-2024-32605,0,0,9e58d99b4a8446a5d27ed389acdb1aeece231d89786309e2f6463f8729a7a96f,2024-11-21T09:15:17.127000 @@ -258795,7 +258795,7 @@ CVE-2024-32677,0,0,8bdad575f926c579b11688030195f9809fc141578e312d6097cd2363ccae4 CVE-2024-32678,0,0,7641fbb4727f544a250314692648516c0791c5bc4f107a1e7d58c2e4f6886929,2024-11-21T09:15:27.540000 CVE-2024-32679,0,0,fe54e15dc839123d941b045ae3670b09750598217110f0f298a92e4fd577034e,2024-11-21T09:15:27.677000 CVE-2024-3268,0,0,fa062da5a5c790a6c85ad001c3a8b10ed479217119275462adc152f1cd898a91,2025-02-07T19:09:39 -CVE-2024-32680,0,0,6e2e3b2acba5b99a3fe453c3823e5d963fc6dd7a378c9230f6b759468a07f31f,2025-03-20T20:30:34.187000 +CVE-2024-32680,0,1,15ed0b53472ee2710316ddba885b56de2b3e322c0f7b7983d2f8f65466e09909,2025-03-20T20:30:34.187000 CVE-2024-32681,0,0,a6a3ad493edb14dea873e7bd47447ec6d339a1e4d39e97cd2fc8009d66945cf5,2025-02-04T15:39:14.603000 CVE-2024-32682,0,0,fc01924eb28216cb4f9c6262a28c3913724550eeea77cef526e34260b2075634,2025-02-04T15:39:56.673000 CVE-2024-32683,0,0,370696fcc094d51cd2a52b75385be778d9f17257a0fdfcd659fd3cc2b22876fc,2025-02-09T20:41:17.927000 @@ -258932,7 +258932,7 @@ CVE-2024-32809,0,0,cdabbb959561b35cad5e3d19819317f428c1fc59b966e80ed97cabf23b942 CVE-2024-3281,0,0,2482fe63c7424f766bbe910ecda7910a8a23fd7f6f01db11424091242fd707ab,2024-11-21T09:29:18.697000 CVE-2024-32810,0,0,fc588b7101c8724c0618f39b810de8e0e0b303254edf9f0385bb55ecb8ec3be0,2024-11-21T09:15:46.253000 CVE-2024-32811,0,0,c706285286eb8cebde941a2b6b81f29430198ae0790de5a1ed4fcce515da67c2,2024-11-21T09:15:46.380000 -CVE-2024-32812,0,0,1b8a20df3ed3c12ac45410b62fa2e5ad451f7123208ade36f32e809fb873abbb,2025-03-19T18:08:22.227000 +CVE-2024-32812,0,1,f46857fdd31627cdd4d2b46b0f73a4b04920c14f7cfec5705207509e6b408bea,2025-03-19T18:08:22.227000 CVE-2024-32813,0,0,57e2887373178192abb3ec1287227d39fe838b5cdb8fa6b345f304e6657ac619,2024-11-21T09:15:46.663000 CVE-2024-32814,0,0,6feed64fc0cb3f07d04ade0e1616542dd0ca390284296e3eb4f442de746258af,2024-11-21T09:15:46.790000 CVE-2024-32815,0,0,3dd7e605f7236cfe6c26b4682e30e70e2bab13282861ee6c13bc55785032ae62,2024-11-21T09:15:46.930000 @@ -259186,7 +259186,7 @@ CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b CVE-2024-33055,0,0,7c9e78356ea47dcbc89353ee30ccd5e6cfb6bfa32a09ff7878bb6085bcfa6ee7,2025-01-10T17:01:45.937000 CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000 CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000 -CVE-2024-33058,0,0,b4874dce3bfba5284df6936dd81aa7100c00702bdf2367528f5a45ca61a03883,2025-04-07T14:17:50.220000 +CVE-2024-33058,0,1,f7c2a6944a9eb4491a2ac0712ef49102fbc14bf55ff7f8da00dc94827acc1b08,2025-04-07T14:17:50.220000 CVE-2024-33059,0,0,b9157366e9b41bb8006e58246e65f5bdeba75ea2269f83b299649471535ea483,2025-01-10T16:53:02.590000 CVE-2024-3306,0,0,b1314b7809f51d374a0b9fae0657d8eb066c2cd2b31a15a930e406526126c0e9,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000 @@ -259251,10 +259251,10 @@ CVE-2024-33213,0,0,40a68b03c0d63e7ee20011f811df4248f06c436df8c152a8ca1d42e418e2e CVE-2024-33214,0,0,b4c40dd1c5bfae5dabc683160328e804cacf44649420bb22f7492fe8cb885c60,2025-03-17T14:44:58.123000 CVE-2024-33215,0,0,bd74db88544a2d6c074f6d000c865c9b775e97cf360d9b03a8d360b76c6d02a6,2025-03-17T14:45:19.080000 CVE-2024-33217,0,0,28e9409aece1c80a7f1fdbdd0371948c4f8a2e52edf521d18c7ac9b019b45312,2025-03-17T14:43:29.630000 -CVE-2024-33218,0,0,3c149154fd4426d9bbf328240adb7ac37d04e71a3806e619e61d6923b3e493ad,2024-11-21T09:16:38.573000 -CVE-2024-33219,0,0,f1d4ded55c2cfb7f4b8182b8c5cfbd26721085ef662a6bdd847bb406ef99c49b,2024-11-21T09:16:38.810000 +CVE-2024-33218,0,1,4f36ecb4ba83f56c3ae4ebf1625c8c898809faaec9f0ebdbf007b950ff746ef4,2024-11-21T09:16:38.573000 +CVE-2024-33219,0,1,8e195eba9468897e7d7898a487ba51c75a8f7de13a55a7d2e60ef4ccc9ef6ef0,2024-11-21T09:16:38.810000 CVE-2024-3322,0,0,3569c930679c345a206f9de2f09d0845641fdd7878d98bf5028a601a996c08f7,2024-11-21T09:29:23.643000 -CVE-2024-33220,0,0,9034dd3e6499bfd12843c8bcf49eac572795b8595c7830a55063dfbddcb4a814,2025-03-13T16:15:19.647000 +CVE-2024-33220,0,1,bbc959af9fe52fba08cb77a921faaa271c4331e7226c8063d97fd5b21a050e08,2025-03-13T16:15:19.647000 CVE-2024-33221,0,0,7ac943c3a1aa3b5704f65cc3ca7a2d2d9bd9c029322a3305d52a6c4f76963291,2024-11-21T09:16:39.247000 CVE-2024-33222,0,0,90ad5e286897b44e99f0c4ce659502bf8d51ba84a40d01afdc12dd7a0face13a,2025-03-13T19:15:44.777000 CVE-2024-33223,0,0,c18218a94de55071f9b1abb4447f420922332651f5e7cb249ec4ab08ac408b79,2024-11-21T09:16:39.707000 @@ -259350,8 +259350,8 @@ CVE-2024-3341,0,0,5476f9386f0a80dd72fe4811f5fbf715bd90901bcb1c4f5b6598a2223afd56 CVE-2024-33410,0,0,6da8183d7c8378ab4f409dd7c3edbbc7504ad43367d8c2822c9163a0a4d9bd97,2025-03-25T17:20:24.067000 CVE-2024-33411,0,0,c7fc1192b43257dbfc37f7736cca436992ae7a2d5081ea49c225022e5edf1bdb,2025-03-25T17:20:15.283000 CVE-2024-3342,0,0,51b07b32a5bf5639acc8a08f36fb2e522194f2844662aa41bd2be4964a3a2feb,2024-11-21T09:29:25.090000 -CVE-2024-33423,0,0,baaa234a0078f13afbc1354322248bc431d21eede7d75547bec9386e545d8f26,2024-11-21T09:16:55.627000 -CVE-2024-33424,0,0,199f879c92d6b987cb12a369e5cc580c4c4a8cfdd59e620298feb8bbc4a7a074,2024-11-21T09:16:55.843000 +CVE-2024-33423,0,1,0b2f0b1dab8ebfd304ef987151613ac58f27b6a2a54cb345283e7cfab670b261,2024-11-21T09:16:55.627000 +CVE-2024-33424,0,1,92d91ded981558603bff4fb7c5c155521c3b6eee647488b4a80f62663f789df6,2024-11-21T09:16:55.843000 CVE-2024-33427,0,0,3ccd8abdcff44e7066241deadc22dafc2fa7779b4b42fcdbcfd2d0859fc41b8c,2024-05-26T22:15:08.427000 CVE-2024-33428,0,0,3f4950cf28d3f39f6c213cbde4334043d1d65335b4140746e16c212c3beda309,2024-11-21T09:16:56.100000 CVE-2024-33429,0,0,cd5a865eaf88098f8bc7a391b31e7a1b2be15f6cfa58164426e7581f1e1a5cea,2024-11-21T09:16:56.343000 @@ -259383,7 +259383,7 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 CVE-2024-3348,0,0,87517d5c62b02b7f79cb5c966fbe8ea8a9224853a6897fcd4a4959d89dddc90c,2025-02-11T14:42:51.353000 CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000 -CVE-2024-33489,0,0,df09c6082adecbaa43d6117fc420c64f54d31303af2dd3b2c0f79bf1d1aeee84,2025-03-07T15:59:23.650000 +CVE-2024-33489,0,1,5901615e7c16a5829679031c91bfceec0d4b20f4b3edd62f296b6f7040654d47,2025-03-07T15:59:23.650000 CVE-2024-3349,0,0,d089041a729f847d9058185370668553b4546e0cb6c88638587c2c6db3d3b605,2025-02-11T14:43:45.883000 CVE-2024-33490,0,0,2bd7f26e302f1318b2fa50807a128739497edf997adab5a8aabb74d136f70e35,2025-03-07T15:59:33.010000 CVE-2024-33491,0,0,93af8eb78970119b9242ae48d19d7df8adda781ba495fb8446f180ba0fa86cc6,2025-03-07T15:59:41.790000 @@ -259505,7 +259505,7 @@ CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79 CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000 CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000 CVE-2024-33605,0,0,a9cb4d5208af41cc5de9c408ee33e9c45cb9579d6429771105b2c468d7015554,2024-11-26T11:21:59.607000 -CVE-2024-33606,0,0,b47a9d1a9c7a4099a98671fa74b49e1c7ae7a9e03f15f55dd27634be0045fec7,2025-03-01T02:04:54.647000 +CVE-2024-33606,0,1,69d37ecd6f820e55b514c1e2e254ee7a5423e77213af5517b5a0b955f527c1f6,2025-03-01T02:04:54.647000 CVE-2024-33608,0,0,6b6e30ce1fedf01732e282330bf545e2f74a5077f949ecc9582f9d87f8dadf71,2024-11-21T09:17:14.893000 CVE-2024-3361,0,0,f0716051b88e5ec4728f1214cfcf6fc3ac1bcb7d16766937d6b97327197172f3,2025-02-10T23:11:50.223000 CVE-2024-33610,0,0,d559843ab86fe84848331c81e0bccb00eec583cdd8c349293cb7cb385684e94f,2024-11-26T08:15:05.810000 @@ -259514,7 +259514,7 @@ CVE-2024-33612,0,0,6c873bcc0c3bfbf7d886e64f30fdd4c53eb34d48f747397f5259bffa174b2 CVE-2024-33615,0,0,b0077641ba27b9f232ccc1928ba76be8582878949d0230dd977055112bfb6d07,2024-11-21T09:17:15.217000 CVE-2024-33616,0,0,b2c1e64cf451f906f0bc4bead91b511950fec536d39d5a34a17b142a6a1901e1,2024-12-10T16:15:23.160000 CVE-2024-33617,0,0,1e71f02faf23a708ef37c4cd0bfba6875a8643a968de9537679ddd14c247d0b1,2024-11-15T14:00:09.720000 -CVE-2024-33619,0,0,ed183086fc50b97dab088f31513908860999eb3eee26ad3d0c30d9eb540b5438,2025-03-05T19:22:01.497000 +CVE-2024-33619,0,1,50c2e1816a50c05b31a8a7f88f5e8c05466ea2c6ceafb0e1232566d5e57866e4,2025-03-05T19:22:01.497000 CVE-2024-3362,0,0,eab0cddba4b37de4e42c105bda8687b58851d73362d98f935728ecd01c4e4b88,2025-02-10T23:12:23.217000 CVE-2024-33620,0,0,992ad05cd66d5015e97a55a4d9dc858d4fa9bb3b818f3032c52d7b69f766c2df,2024-11-21T09:17:15.550000 CVE-2024-33621,0,0,da4e351d8bc8ea1f19bba428f20f5a1f07f43ca738d7c13849e37502e0f378be,2024-11-21T09:17:15.767000 @@ -259733,7 +259733,7 @@ CVE-2024-33924,0,0,cd91ae14d143fd3a9244e608a4fac373aeff872b53921238973d6be9b0353 CVE-2024-33925,0,0,4d5561dfa9d80b155896c7588c3e85f7c04712a0df905139b501c1e625a90fb2,2024-11-21T09:17:44.853000 CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d2440f,2024-11-21T09:17:44.957000 CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000 -CVE-2024-33928,0,0,95e8a9d8bd0baa2bf39edcebb8f9e632cd7e8fc6a3eac29a1a6ede77f7757fe6,2025-03-19T18:51:43.057000 +CVE-2024-33928,0,1,7eef13d790ff44a98b87cc6b00999b5129c2390e30481c013bcca41a50aff05a,2025-03-19T18:51:43.057000 CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000 CVE-2024-3393,0,0,2cb6709dad3083b7f26d7f89585a29554c2f00b4541726289ed615daeb94da29,2025-01-14T16:02:30.133000 CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000 @@ -260000,8 +260000,8 @@ CVE-2024-34220,0,0,ea3b638a0ad7e7b5b21e6837c13d51fd0282a71ba173fdb7f01e6006ada82 CVE-2024-34221,0,0,5bdb0fc79cd75e9a7f818a361c57194b1225b8358331fcf3592024f663afd166,2024-11-21T09:18:19.333000 CVE-2024-34222,0,0,0c26215edbf7be7db1f1ad76aecbebfdeed9b1a3a427504e193a4c98f675c75c,2024-11-21T09:18:19.557000 CVE-2024-34223,0,0,c2ee839afb9b1fac1c90169923bdab548a7c7cf9533cc5507d2fca08bb6f0a98,2024-11-21T09:18:19.780000 -CVE-2024-34224,0,0,3a60fcfa0164eec7a80099b3676c3554e933619cb6a29b591672b45bc0c440e9,2024-11-21T09:18:20.030000 -CVE-2024-34225,0,0,6d2138de3835c9191c51c4afb4300d242b9779d66092f9c88507f5e324d1fce4,2024-11-21T09:18:20.260000 +CVE-2024-34224,0,1,c5557f0fb86d92317f5590e26f6be50ace7fb6544aa675ad40239d9f209fa5bc,2024-11-21T09:18:20.030000 +CVE-2024-34225,0,1,f3146e8faeabf896e336aa178520c12bda94ed9f95773f9766771d94ac7c6f47,2024-11-21T09:18:20.260000 CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4cd17,2024-11-21T09:18:20.477000 CVE-2024-3423,0,0,456d65d2ad9c99d4ec58261f76c7e557e4123266a4f21d34aa54813f7aa0e6be,2025-01-31T01:22:52.200000 CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000 @@ -260035,7 +260035,7 @@ CVE-2024-34310,0,0,82972b4a7271d7f072b904c774870b602afbf4962a5b24f811801ca0d72ef CVE-2024-34312,0,0,8f4176c7f4d8ad4d83b2238c464790461eb54a022b55d50cdda7a07c2d2107a9,2025-03-25T17:15:56.280000 CVE-2024-34313,0,0,b5500e4fe963557a3d43ad6825a0f75aebadcab488a2fa7d1b2936aa1c688978,2024-11-21T09:18:25.543000 CVE-2024-34314,0,0,6f95c57015c0e4aa6847de08039dd12693874b339496eef219a43e099453f6ba,2025-03-14T01:15:39.480000 -CVE-2024-34315,0,0,d6567e55b3e23401f0a9237df9526520fb9dce0f81214e7f7aed0529835acfab,2024-11-21T09:18:25.930000 +CVE-2024-34315,0,1,b33981540e2f2d3f0d9d86434ef0d546b27902e875fa690f5387a90dcbfa7b25,2024-11-21T09:18:25.930000 CVE-2024-3432,0,0,2140dfaca241723443a0ece3f45fc71a47abb74b3f0db4742cb68eb380ad14d3,2024-11-21T09:29:35.637000 CVE-2024-34329,0,0,b08a14bdcd4393cd09265974bc037d6200f642e7ed0bc10da069cfb326e7ec91,2025-03-14T16:15:31.587000 CVE-2024-3433,0,0,8279a698c9089eafd1ed585a4ecf150a34fd85ba6af103d97510c24cf13d842b,2024-11-21T09:29:35.767000 @@ -260143,7 +260143,7 @@ CVE-2024-34430,0,0,cb8e123ee870d0ae89dcb364b82927e6d901e132d937011b7ad6ee7e86ab2 CVE-2024-34431,0,0,66ab1d2dd8d93fb7cee43d9211bad6e473354e479eb13f9021fbfc509b3bf56d,2024-11-21T09:18:39.577000 CVE-2024-34432,0,0,00c58c84e8b742b123a1a987a654ef145fcf7d781c3fe6330e39d0bf4517792e,2025-03-06T16:47:25.203000 CVE-2024-34433,0,0,d7e888513ff0c09afdacd9ea2e3a72da4e6d670d8ed55cb7f7dbd78948a08387,2024-11-21T09:18:39.817000 -CVE-2024-34434,0,0,3e26b04396c5ee7b9d62802ff3c8b5f5b56cc81f8d35e23583b92332dd8967f7,2025-04-10T19:54:38.783000 +CVE-2024-34434,0,1,4f454e3afef1e5559f28e2ab127c2b688364d9a643bf95512b17fa3c8a5c18a3,2025-04-10T19:54:38.783000 CVE-2024-34435,0,0,71a1145b72cc4faa12fd4b02c097c9bcc91a4d5d67f8bf5c43e35bc8c1193b38,2024-11-26T15:29:59.840000 CVE-2024-34436,0,0,4ed41a1b8a3693bef229e7c2f9a0cb122ee0c441109a0bb8a6053ffb4b0fa480,2025-03-07T15:29:32.340000 CVE-2024-34437,0,0,2a7776ed8512c534ed146e03bc1650e549f2fa80d419c0c5a48eae406e962c5b,2025-03-06T16:24:16.733000 @@ -260157,7 +260157,7 @@ CVE-2024-34444,0,0,cc355ac27b16de5a6fcd556e1c85c97b239311f2ddd889289393e1d51bb6b CVE-2024-34445,0,0,01944c0d96d340c81852499545d972f8d25c97119a00e7cff1e23171a0a65390,2025-03-07T15:30:22.937000 CVE-2024-34446,0,0,5cac8b3c02517797194e9908657ec718d8fa3cf52cee0d279404b32b8419138c,2024-11-21T09:18:41.320000 CVE-2024-34447,0,0,b00738c6531356ed0aa02120777a94355cde344072d753506aa23afe7f8e0512,2025-03-20T20:15:32.217000 -CVE-2024-34448,0,0,a63e9b8a89308818ad1b8e31075a67350d1a77473d68ddf936398fbf4ac2458d,2024-11-21T09:18:41.693000 +CVE-2024-34448,0,1,d2c4fb27b7e8b101cce4a943fc5887b3e539a7082b8e92f4c2a9f00606944aa3,2024-11-21T09:18:41.693000 CVE-2024-34449,0,0,d6456bfb6470cf11f1446051cd51b1857ba93755947121f19b6007a09938d3d0,2024-11-21T09:18:41.930000 CVE-2024-3445,0,0,bfe1cf493d3fbce087564f2604bccad63ca82487396b2170cecb39871d2b6632,2025-01-17T13:48:36.867000 CVE-2024-34451,0,0,5d4dbadcdcf06f0a87f0385c6f6dfd146e9467548fd92052937085c5972e8f94,2024-11-21T09:18:42.080000 @@ -260238,12 +260238,12 @@ CVE-2024-3455,0,0,305f2cbc2538d5789f2b982a6106acaec17b36be71b3c6451f66ea75322c37 CVE-2024-34550,0,0,0700edb8b92fd07441e6badd1d492d48685013af01073aa188bbfd599d709ff5,2024-11-21T09:18:54.950000 CVE-2024-34551,0,0,6612836e0e45ff6a1e9880d2d75602246dbdb39ebeafb01297804784dc0544c5,2024-11-21T09:18:55.070000 CVE-2024-34552,0,0,0fad81b75ba569b15a89d0ffe9f848fad7399e399b280209382812a08fdda8df,2024-11-21T09:18:55.193000 -CVE-2024-34553,0,0,94c322ccf141cfb4893f714aab5e64c1461dc48ec28d181484f89f432269e18d,2025-03-20T19:59:34.887000 +CVE-2024-34553,0,1,41b0f929ba31542a0fddf335a9aed4162913684361ca7147c7c9102d45e6ba0a,2025-03-20T19:59:34.887000 CVE-2024-34554,0,0,bc1f90c1d4c895b197b3772a0f50f08e8a04a047df5503fe86ef42a2003f5fc2,2024-11-21T09:18:55.443000 CVE-2024-34555,0,0,d0f12bcb4d82d389afcaf5f848324c07ad65c55020ea7b0ba0595ae190522526,2024-11-21T09:18:55.600000 CVE-2024-34556,0,0,b3bd7f24a1abffed6d6ca0477755f5eec82bd5f606a7996fb3f5000d4763eaa8,2024-11-21T09:18:55.723000 CVE-2024-34557,0,0,08e414eddf080cbd1e3e8cced93798817c4e1e0dc992489267147d99cc87b886,2024-11-21T09:18:55.843000 -CVE-2024-34558,0,0,eb44a078123dcf2b7805bcf08953a8369023cd109cb4190c74ed22b304b2129d,2025-03-20T20:01:44.623000 +CVE-2024-34558,0,1,aad188873e87e3f9871bf61dea032285f3d2ec1223f5fdcb27c9e4a86e59f040,2025-03-20T20:01:44.623000 CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3d89,2024-11-21T09:18:56.103000 CVE-2024-3456,0,0,68729fd604e300b684418220e7db79b3dbee49735e48ba1830c313ec63f7dd77,2025-02-07T15:10:05.373000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 @@ -260466,7 +260466,7 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000 CVE-2024-3477,0,0,767e17108a9bbff4358ac5d8b247c88723eb29943aa5eb588381bae49f097ac9,2025-03-25T16:15:23.203000 CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000 -CVE-2024-34771,0,0,dba9f7094ad95961402abb310f247604fdca6bc525693b287fafa27ccff2718f,2025-03-07T16:00:12.453000 +CVE-2024-34771,0,1,7c1a2e358631803df9acef23dd3cf2060af1592921a84dae62cbeb5caab09e48,2025-03-07T16:00:12.453000 CVE-2024-34772,0,0,dd5ef517d7cc4604c8915860863fd28dc8c2a5f157d74b6fd3d455fef398996e,2025-03-07T16:00:23.803000 CVE-2024-34773,0,0,afc8e5d829f89cad6321267d1d9d798abefc959405dd6ebbfaf79da9aec889b3,2025-03-07T16:00:29.693000 CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000 @@ -260493,7 +260493,7 @@ CVE-2024-34795,0,0,f82106999e94b8f2b7d62229fdcbe4423ff648a45f3deb2e4e92ac2ae6ffc CVE-2024-34796,0,0,6fe8cfc0bd19b07a6a4e3b7b4b44202b4de9c9bf611df444b8000c6188aff6df,2025-04-03T00:13:43.800000 CVE-2024-34797,0,0,6f530aafb0c79dc6e1942bac34aca54d202e7a50e42a13f1b4f171aef5c26c91,2024-11-21T09:19:25.120000 CVE-2024-34798,0,0,d31a3d4fd1229237b83c5c7aa24a3b9da19c0978a5ec908f9d14385769b6cc2c,2024-11-21T09:19:25.243000 -CVE-2024-34799,0,0,3a804e7cf1bf1801cf92c2f65a7cef93e3d84eb614d9b73830c0b9b15e152bca,2025-03-20T11:11:29.417000 +CVE-2024-34799,0,1,52a80cead1aec4dd4ab6daa396946e77c7df76a5c9ed6cb72f9a3a196e72eb8c,2025-03-20T11:11:29.417000 CVE-2024-3480,0,0,4386cb7c92d4ea0092f4f37d0eaf7cb53af2a8cb277ab46fd30ed1ba5a016e08,2024-11-21T09:29:41.613000 CVE-2024-34800,0,0,260e98247455ca4d7b68d5e5e5aa8394998a0ba07440b738afbc3bc365fd83af,2024-11-21T09:19:25.483000 CVE-2024-34801,0,0,627140b69a4f1b08cf615778bde031ce8ff206c76e21b02504465d28129ab9d1,2024-11-21T09:19:25.603000 @@ -260506,7 +260506,7 @@ CVE-2024-34807,0,0,02fd5ae58db9b645b30f53d34270ccd84a82e634234a9f3c0dfb06f99c038 CVE-2024-34808,0,0,84689f32b1ce8689e5ecf7d32f667bc17dc2689dc60310c5e26541fa7ba4062c,2024-11-21T09:19:26.480000 CVE-2024-34809,0,0,27dcfb66e470cfc816fdb92de7b354028d4b7284db4e2959235ed5c3b8cd8d83,2024-11-21T09:19:26.600000 CVE-2024-3481,0,0,21441da3ee3d7342e7c1bd8558189b4ec572165ab4d93e0a1b2dd42d65b5a24a,2024-11-21T09:29:41.733000 -CVE-2024-34811,0,0,882adddb7344917499b2046cc8c91a0b1880bc5a2f247847c883852769f68a4e,2025-03-19T18:52:08.760000 +CVE-2024-34811,0,1,ae51e2615d15ab58dbc4c496a34ac238af0180ba9ad24d516606e2a8817b1518,2025-03-19T18:52:08.760000 CVE-2024-34812,0,0,7d78e169d7d75ab3c581e8d7397e7b1ac81ce93b9eb08c1119bef68e9fbf19ca,2024-11-21T09:19:26.867000 CVE-2024-34813,0,0,584847820bfe3d61f857e727c2ed893dba1c5333c3b8db21fd5d36e9ebfa09ec,2024-11-21T09:19:26.980000 CVE-2024-34814,0,0,cea73c9ee7cd1afcd6ca5a44d2c50b3a6d09b78f1ff73f9d91349b95d6f3c246,2025-03-20T20:09:07.020000 @@ -260854,7 +260854,7 @@ CVE-2024-35358,0,0,0ec9dea2198846ef8acc2fc12a804a9973c759d0b4e72f06c2280c90633be CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089700,2024-11-21T09:20:12.920000 CVE-2024-3536,0,0,7989c25e2375d082a5474974320e66a71227073e4e43c82e8bb2c43b72686d65,2025-02-27T20:01:21.167000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 -CVE-2024-35362,0,0,7d28cc56b5f65473bfe8a716407a4c594620f271f57b4534c7007a73760c929e,2025-03-27T21:15:48.987000 +CVE-2024-35362,0,1,e5cca5c62f3b2876eb646365cb2c6155074e27a062899a1d9434226410fe1467,2025-03-27T21:15:48.987000 CVE-2024-35365,0,0,1c05bee1a7dabfe40acb221d1e4fd3b9c4ef93fda79ae1a0f764cfd1249a7a38,2025-01-03T21:15:12.940000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 @@ -260916,7 +260916,7 @@ CVE-2024-3548,0,0,2c5b70f4e193253b11ea22cd71cea7bbabd1a22cd43e2fa922200fa68a98e0 CVE-2024-3549,0,0,fa4e42792b87ad0d0a8c4b5d8e7f55d9a4bcf88d4b080da714fb25722a9b01a9,2024-11-21T09:29:51.313000 CVE-2024-35492,0,0,95f9a6ef68591f2158df514fa0b56c27d61acfc840f920f18bc3599e42cac680,2024-11-21T09:20:21.520000 CVE-2024-35495,0,0,390f47c2cbce25898044aeb7d1d5f69964e2bab36870c263144336aca99b03e9,2024-10-30T15:35:10.887000 -CVE-2024-35498,0,0,bb1d6dc6adc06319174305aec52a77d02e9248270cdfbb5d04470bef2b3a6d9f,2025-01-07T16:15:33.277000 +CVE-2024-35498,0,1,9dbe5042c6e8aa3a81442e20cc46f4a491acf891f1bdb9c2c56b4ba1437db028,2025-01-07T16:15:33.277000 CVE-2024-3550,0,0,a348af20d00fce44e48b601f2d3c8c174fccfa03a19fd2c3e450aef353e3c986,2025-02-04T17:07:26.947000 CVE-2024-35504,0,0,01d36097fe3b8849c1a5b5ed514ace039bebf20cb35d6cef55c5f2288e21157b,2025-03-27T20:15:26.493000 CVE-2024-3551,0,0,6dfb995a287494b771bad4f867f53bea4aed5291629de60ee9f068404e24e321,2024-11-21T09:29:51.557000 @@ -261150,12 +261150,12 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312 CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000 CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000 CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000 -CVE-2024-35788,0,0,f7e8ccde12f0171b2a87888475c85420166854b4fcc779b2e610c17b3257802e,2025-03-05T17:33:07.867000 +CVE-2024-35788,0,1,cfbbcb5b1c7b5aed82e1a1721f9174e455396f89b648614529f26e4a443d5e44,2025-03-05T17:33:07.867000 CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000 CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000 -CVE-2024-35790,0,0,a6ea006f59b213697fc96c289cf56dfcd6620e6e93d487cdb8a7c98f9d8fcb20,2025-03-05T17:35:36.730000 +CVE-2024-35790,0,1,c30f63c8f678c10889cbaac8f47d6ba109c2d212846a7f60768931df6ceadc34,2025-03-05T17:35:36.730000 CVE-2024-35791,0,0,85ead07022ef53c0e6f72e9e777d81e8d0ca2cd9792e2767bce0619269c60a40,2024-11-21T09:20:54.250000 -CVE-2024-35792,0,0,354494606b9877d0f42fb09ccc64a6c5077985eaa8e4815fa1f5781a14510615,2025-03-05T17:39:23.407000 +CVE-2024-35792,0,1,b976adee26a670820dbfdbc2839380b04012e83339f2866536e779f8151bc1bd,2025-03-05T17:39:23.407000 CVE-2024-35793,0,0,82ce6b2ac6f53564ddc7616294ad0293384da143f7096dd15ac59cf347e0a71d,2024-11-21T09:20:54.497000 CVE-2024-35794,0,0,2695b1155d89b898f0ed900892410ad905a678f0494cc5e70db52ca5ba102d79,2024-11-21T09:20:54.610000 CVE-2024-35795,0,0,c09e8fe8fee80ead4e3ba2b3693ee3cb2a70789311f668469221ad4e3410478d,2025-01-10T18:10:58.830000 @@ -261253,7 +261253,7 @@ CVE-2024-35879,0,0,fdee953ecf40921e3811620694ea222c4b446f467dc68b15424fdaa22fd09 CVE-2024-3588,0,0,afcab9d939a7e356f73b35985bb8be3dedc5f026f6190181395c275228352f4e,2025-02-04T17:35:07.437000 CVE-2024-35880,0,0,0a8170c333bf0261ae5c11c5ca251ddcbdefcd4ec60fc42a1fc39d0b77cf4726,2024-11-21T09:21:07.003000 CVE-2024-35881,0,0,18e9986624075074b5c849b71ec06ec755a0f3690c4e0f6ce9952cc43be815f1,2024-05-23T14:15:09.927000 -CVE-2024-35882,0,0,621aff3bcd8253275f98f8861e746b0d1abc59c45e6c923f7f090e8013bfd445,2025-03-05T17:40:37.363000 +CVE-2024-35882,0,1,b373f617d33cead0dea3e045f73139783ba40c117ba9de176dad3abbdf5c47b5,2025-03-05T17:40:37.363000 CVE-2024-35883,0,0,a2b640dcae8368f24ce720903948a3e556cd46de40ac218e93d27b39b31c98c6,2025-01-07T17:03:52.937000 CVE-2024-35884,0,0,64236ae9f1f6f6d7559964b4f8856712ac0636f40624bb99449f1adf1f5aae28,2024-11-21T09:21:07.377000 CVE-2024-35885,0,0,f5e4768226d469c9d1acb28dd4e1322cafbbc00c23365add839680801c3e93d4,2025-02-03T16:23:46.157000 @@ -261294,7 +261294,7 @@ CVE-2024-35917,0,0,eab93a0817c66f8a05ad2445d597c153a9b9d84611133e2a6e712f3292d1b CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000 CVE-2024-35919,0,0,99858bae1982db77d7f5cf462658b3ce01ff94846b48ed357015ff74837c7630,2025-04-04T14:23:50.547000 CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000 -CVE-2024-35920,0,0,0ec0b5449e7c1fbab9160ce7ba917247db93f0404680970a5bcce653878ff168,2025-03-04T16:48:45.790000 +CVE-2024-35920,0,1,ee729cc9cf32ae37c057d7db4ed1614a061bbc3bb6c05500733b797e86b0a8d8,2025-03-04T16:48:45.790000 CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000 CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000 @@ -261312,7 +261312,7 @@ CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000 CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000 CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000 -CVE-2024-35937,0,0,20787b5ab1b729218c6f7e48793441c785c51814f8922ce266d448a8a410017a,2025-03-06T12:58:06.400000 +CVE-2024-35937,0,1,cc0bda52cb2f4f5d197f4b304d212ce99bec1b32dd256f52dd2415a65fc4e27e,2025-03-06T12:58:06.400000 CVE-2024-35938,0,0,2efeaa65672def64c85e39f960d3d01dbf5533390de3d3f54f180152cb69f5c5,2024-11-21T09:21:14.773000 CVE-2024-35939,0,0,b275ecea9c74fd7d5d66bfdbd96bb842e1b97b53f548850ac73334b3c0feb367,2024-11-21T09:21:14.910000 CVE-2024-3594,0,0,fac65e3c9a1ec4d365c0ad855597ab4f608d5c24a71b09853c3e37d677810290,2025-03-20T19:15:29.977000 @@ -261331,7 +261331,7 @@ CVE-2024-35950,0,0,ef079ede60c6c9326dca631d7f2fe485843c48efdf1d2a19a2dc54ee92113 CVE-2024-35951,0,0,2d5b5c467639e009ede1e6990ff54fde09b903b47b307d1450eac9b52b502da0,2024-11-21T09:21:16.630000 CVE-2024-35952,0,0,7e1230de99cd6e0ef4828e0aa17edf69431e43a75171aae4948881ed93086ebc,2024-11-21T09:21:16.750000 CVE-2024-35953,0,0,33abfe23421b351d0515548ec4d13b459eb151d37ce4da44fa67c72a29b72a04,2025-01-10T18:11:53.623000 -CVE-2024-35954,0,0,821738f041773a9a3f9bb235884c025738336a7f259bad712ef0753e124fd3ba,2025-03-04T17:05:52.587000 +CVE-2024-35954,0,1,c9e84f6f37c2ad9b2b0827738802507274d61dcfb9c6db8a4bec676d5ccadcc0,2025-03-04T17:05:52.587000 CVE-2024-35955,0,0,529921a5b747be30b617bef99771252677e65cb670794e4efa421f54ec58b919,2025-04-04T14:23:00.177000 CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f402,2024-12-14T21:15:18.477000 CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 @@ -261627,14 +261627,14 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3 CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000 CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000 CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000 -CVE-2024-36259,0,0,15b0952c5fd1fc36f456fd70118edaa2221b710d47399648efdc1dde4be79632,2025-02-28T14:42:55.243000 +CVE-2024-36259,0,1,3e9d11c94479987ce81278730e1c2795f27115224adfec92d4b6928907ae7b02,2025-02-28T14:42:55.243000 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 CVE-2024-36262,0,0,05824daa48c4318e8d4a5a52b3f1e0034cc48ef3f506393164d29adb59c57dfb,2025-02-12T22:15:34.110000 CVE-2024-36263,0,0,f09e8a3287eddd607f9d6f0d56f84686a478025a137c31455da3455bd15eb63c,2025-02-13T18:18:06.243000 CVE-2024-36264,0,0,04e1bcd76c02069965e737d507ebf01626021e491f1525cc652573bb10ac3645,2025-03-20T19:15:29.423000 -CVE-2024-36265,0,0,82ed32b9f7b890ab4fa36735b417a501eb319f0ba86a270440296a771ca098eb,2025-03-19T21:15:36.027000 +CVE-2024-36265,0,1,4bbc454d2c60147889f40adf1bca6521a842a1b9a77ef28c182f4293f1656e98,2025-03-19T21:15:36.027000 CVE-2024-36266,0,0,a6eaa23936f4c045e39e2f0a9cbe9efabaae78105eb4d2322e7417e1acb1deea,2024-11-21T09:21:57.640000 CVE-2024-36267,0,0,3648137b8a65567f0be472a89c4c19f9f4b7a0248bb8012d2cfb3977e6c54cc8,2024-11-21T09:21:57.790000 CVE-2024-36268,0,0,6bd7f2a08d60f857a812fd35ccc84177256999f3bb9a77410d2e76736e372be9,2024-11-21T09:21:57.987000 @@ -261710,7 +261710,7 @@ CVE-2024-36387,0,0,cdb9f9c6e4f44e520b8a3f1244c0462cddbb4983a3da124e2c5e7faf4bb4d CVE-2024-36388,0,0,690f978e1151f8e635cdc2eafce3ee23bbc06cad4b079951035ef356d52a2a72,2025-03-04T18:21:06.710000 CVE-2024-36389,0,0,47a42cb560719bd7ce1f7be386b55d56843d96632d1a8be759052059acef16b1,2025-04-10T19:12:00.540000 CVE-2024-3639,0,0,d199c27729d2cc3d067b398c1ad8ba1ae7ecdef93cc1489a574291968613cfd3,2024-11-21T09:30:03.413000 -CVE-2024-36390,0,0,bbf72941c4419309a9deaab9638c5a1aeb82607d88a72aadd4431b042da2e4e1,2025-03-04T18:19:32.897000 +CVE-2024-36390,0,1,7ab3867e4954d32fdb68f995375e9594b742eca8911a888bfb4737c8c30b1a02,2025-03-04T18:19:32.897000 CVE-2024-36391,0,0,336fd296697671ae3b22824d7c9891dd1a08b3ce2948841fbd11ace4cb520724,2025-03-04T18:18:55.260000 CVE-2024-36392,0,0,bcddbbb7922f6193ab8e0ff005539034d70bdaa739c1da055e6ba7feb17632ce,2025-04-10T19:37:57.943000 CVE-2024-36393,0,0,e6de8af8cf8dbe1c44c586f962e380cbe78bb0f59190258f9558a507012777e4,2024-11-21T09:22:05.170000 @@ -261785,11 +261785,11 @@ CVE-2024-36461,0,0,16950bef91730cef7ea58cca2f4e4f516c7975ea62bd448f68259d85f7964 CVE-2024-36462,0,0,8c4b5999bdee50b55b0e965906447a665c5901170419000f05417b55b2dd91b6,2024-12-10T16:15:37.193000 CVE-2024-36463,0,0,8fb33a20c45e94718b424cd59646a9b6b0ffa316e7dd62c60f1069c8f4c43e5f,2024-11-26T15:15:31.827000 CVE-2024-36464,0,0,24cacab9f7d27b304eb6f6bdbe25e10a247232e8a99785c34e9f4b22e14f17be,2024-11-27T14:15:17.830000 -CVE-2024-36465,0,0,5c3e17b4c09cbd2ea35f83506fa5b2cc3c8d83b810ed64dbae824c213318e1dc,2025-04-02T14:58:07.527000 +CVE-2024-36465,0,1,03784ee5edd1f0441cb43e0d41b01419605ef770daefa82d0522b2770c470bae,2025-04-02T14:58:07.527000 CVE-2024-36466,0,0,ac5c096e99aeeb0fa27711ca22d2ffac4f2b2cd27652a43880a2ca285ef1be53,2024-11-28T08:15:05.290000 CVE-2024-36467,0,0,5e7c9feb825942e85216b48a8df1264717bc1143e08c34071fc19ccd9af44e8b,2024-11-27T07:15:09.080000 CVE-2024-36468,0,0,4d07a97e6229fa96a5beaca4686979827dcdfad71ecdb8cbc5dbb5d925944b83,2024-11-27T12:15:20.383000 -CVE-2024-36469,0,0,5e819f33b857c8834b4bbdcffc786d077f740fb240e626be592617d659531405,2025-04-02T14:58:07.527000 +CVE-2024-36469,0,1,8797401fcf9f194bbce8d7342ac8df948e0dd92e98676f5a9caefcf5bc3fcaa8,2025-04-02T14:58:07.527000 CVE-2024-3647,0,0,a8b1e1d679f8d9c05e4a1efff0d14f5e3e3a3dce82fa801db5deaf7f4eb5991f,2025-01-08T21:10:47.357000 CVE-2024-36470,0,0,26ea06a3b5e7e6ea4708d276d92c32599e28ab056d92e510db470aa6a815934f,2025-02-07T20:10:43.093000 CVE-2024-36471,0,0,45b1b5747853880277d53a2288bb933531dafe70fc1359863c97a067db1b86ec,2024-11-21T09:22:14.553000 @@ -261969,7 +261969,7 @@ CVE-2024-36751,0,0,9d3802c62c0e89383168ef5b3b20c052c11fa8a8d65aaa46953c9d45932ac CVE-2024-36755,0,0,959c7e1c5392de2c0c9f9c3a5e5235cba19560b12ef4e2310e57761b2d2324b3,2024-11-21T09:22:35.883000 CVE-2024-3676,0,0,c25c73186d2926601a4bf9263de9e5912c4170cf55771346041257a143aab173,2024-11-21T09:30:09.570000 CVE-2024-36760,0,0,2eed0d1b029328b3aaf61411ac108b885b75813a77deb3defd7d8df3d154ccef,2024-11-21T09:22:36.097000 -CVE-2024-36761,0,0,65a1b4c482524397a4d97b63df107b2211759a7cffddfa2bfe9ebdcd04b0c807,2025-03-13T14:15:27.083000 +CVE-2024-36761,0,1,27b03077efff7c9d7931ee4f4a0341c2dc80064fe085c3201a13ba00ae8bf4a9,2025-03-13T14:15:27.083000 CVE-2024-3677,0,0,07021611107a484174c9e849553e9a5c71f5f990528bd8af7dd9756cc6dc8086,2024-11-21T09:30:09.700000 CVE-2024-36773,0,0,f0932ba4b91eb06f905e0ccbceb134fffe2143d2c98573a09261c10bb6d42329,2024-11-21T09:22:36.477000 CVE-2024-36774,0,0,e37526fd3e7c0440a90d259249ac5813b9f6bc28f2a67c0d73de83abcfe3c66d,2024-11-21T09:22:36.710000 @@ -262043,7 +262043,7 @@ CVE-2024-36903,0,0,c50ef3e8b790d3ae6fe450d08cb766a6d04241d69a370093f4960b43c8dfe CVE-2024-36904,0,0,98d6f735fc0e69f80deb2775ee6d5ef9e6471c0cc466f9251fa33735b25eca9d,2024-11-21T09:22:46.773000 CVE-2024-36905,0,0,d5655420c4e3e449e82b6c63b4afb80b0339e2202099a683554894c8b046d2c6,2025-01-14T17:15:17.077000 CVE-2024-36906,0,0,0aa76302720abb83a6a595e3140035dda654871b13cfc1eb2d8e0c500a12eaea,2024-11-21T09:22:47.157000 -CVE-2024-36907,0,0,264367259df097e2ec6093637517da1260a169660d75c54db621df23cfdddb81,2025-03-01T02:46:34.373000 +CVE-2024-36907,0,1,ffcc8ba9c8087981a33e390f5bfe4cc5a8c9c80b5d73e0c2a7a0f0128b189a0b,2025-03-01T02:46:34.373000 CVE-2024-36908,0,0,b2108770570b5df31913be21f5585a636aca736b86ffb104b3035a355718cecb,2024-11-21T09:22:47.393000 CVE-2024-36909,0,0,ce8ab62abeb377bee1d2bcd01da69db2cab04518b9e69f70cc2e82cdc2c9b18a,2024-11-21T09:22:47.580000 CVE-2024-3691,0,0,d0d5563495d9075b90bfaa6d2ab5bbf6dcf82c228d110efa49a20a6893129bd8,2025-02-18T19:04:33.587000 @@ -262059,9 +262059,9 @@ CVE-2024-36918,0,0,656c3d5451e5beca6ee6a6a3553611cb012eaaca0a8e7c671e3832a37f49a CVE-2024-36919,0,0,c8236a27af4455ec9782dbde0746332ca88ed9ceccca807d8dacc26bfb3a452a,2024-11-21T09:22:49.097000 CVE-2024-3692,0,0,4dcb31a4127d38bd6452acf10121a61d94095197d226ab1d1d43421fddb139b4,2024-11-21T09:30:11.447000 CVE-2024-36920,0,0,296892b15bf2eebaea9778f89d4376d82d5fbf60b24a815d649d1db5c3fa6f0d,2024-11-21T09:22:49.243000 -CVE-2024-36921,0,0,6e5f40a95c3dc6aa3533a945d9cc7be5766afdcc13e4714ffb04633e8a75e3d5,2025-03-01T02:47:59.063000 +CVE-2024-36921,0,1,35dbab1f6e845f903da7fb2de13220085137ed53b1551bd613a08537814ddbd7,2025-03-01T02:47:59.063000 CVE-2024-36922,0,0,cb456c0e747a1f1081cb6fb9c8ef844df9b204267e34052842655b94a5e35cfc,2024-11-21T09:22:49.503000 -CVE-2024-36923,0,0,701b678faa9446964d2a74a580f59e3d2201d111faf65d5dd713924fed16056d,2025-03-06T12:56:37.050000 +CVE-2024-36923,0,1,048602e0b3d2aef6c5233d0bc8d5b6ea050f0eec991a9a58b8ced1b34e8a22bd,2025-03-06T12:56:37.050000 CVE-2024-36924,0,0,137498aa9e34e1e8acd4de9ea1ba41b050722b5260fa3d73369cc3248a483780,2025-01-10T18:29:03.477000 CVE-2024-36925,0,0,e0ca67c8234568b1dc27df68d69c690ead06aac125c9af02d4ad6e41e9d1146a,2024-11-21T09:22:49.863000 CVE-2024-36926,0,0,800fd4d9a99b5fed12fe0fc1b134ce999c0c2fa4531986545f76a96538c7238d,2024-11-21T09:22:50.010000 @@ -262127,7 +262127,7 @@ CVE-2024-36981,0,0,4ef7db0d01c8ae7f95bdcef9bc0bd36c40a986a629272624fe257c629fcdf CVE-2024-36982,0,0,cc4a220fdd8a42e8aad7f2c8c8b02865c677b908a7047d3d5f217be9bc0ea725,2024-11-21T09:22:58.247000 CVE-2024-36983,0,0,aed0afdc3459f0ca0501343c384bed52df8bf10959191eea2bb1b48cf2d58c46,2025-03-07T17:13:55.270000 CVE-2024-36984,0,0,f11d3efdcdd60c381969f172d873cbacbb178947838fdf40e72a6c8c775b181f,2025-03-07T17:15:09.307000 -CVE-2024-36985,0,0,f9661995da12de3c73cb229956d65ad39f137ee0251ef8809f73551ee5e5125d,2025-03-07T17:16:34.747000 +CVE-2024-36985,0,1,20466be98fbca5bc04cdd042b6240f444dfa7a0ae4b644a4e30f74a89f8bfae7,2025-03-07T17:16:34.747000 CVE-2024-36986,0,0,6171be6e726f563ccaa9f4e95f354cbb3f398a584112b7c348b97cc1f2873e12,2024-11-21T09:22:58.763000 CVE-2024-36987,0,0,2a177ddfb0ad1ed8451058008e2f729ba11b7a19f464c2d679b71cf8d8cb6f78,2024-11-21T09:22:58.897000 CVE-2024-36989,0,0,12e451674a72a486cf884a3b99bb279fbbbdec54b7e8608f5263c20d98ef01b3,2024-11-21T09:22:59.027000 @@ -262211,7 +262211,7 @@ CVE-2024-37066,0,0,240837f9d82f0f01bc6ee55d7b74ae4428500497a54219c7fce44e32d094f CVE-2024-37068,0,0,c3afdecda336d72de98ec07e1d7aa9f3118914e9a8f778e3cb5b72dbdf60d490,2024-09-21T10:15:05.793000 CVE-2024-3707,0,0,999dd383007b2d055934067affe146a02aeec3372415f71b35075ecab7272c50,2024-11-21T09:30:13.203000 CVE-2024-37070,0,0,c022bbfd510d9dfa3803db541238e2871b96a3963a669fa0a3bab8924a1c69d4,2025-01-26T16:15:30.837000 -CVE-2024-37071,0,0,a67e9eb57bb911747e859e4f8acbe6d9597b1ffb725d99346231b7b26bb39319,2024-12-07T13:15:04.047000 +CVE-2024-37071,0,1,d74bddc2af4c6527a357297c6fcda916ea636394d58fc6b273476cc2fc3d4604,2024-12-07T13:15:04.047000 CVE-2024-37077,0,0,a61753e8a7bc9b974748648e270addba7b9a945731807708a3fa2aad01161089,2024-11-21T09:23:08.803000 CVE-2024-37078,0,0,bd89123a0c458e38196f44b5c84293b821a2198e363b4989eb386f33a6b35386,2024-11-21T09:23:08.943000 CVE-2024-37079,0,0,454c56f1d8b19fcefc03455b77a1e2f219146e569591e4dab0b63586cd5dc651,2025-03-14T14:15:16.010000 @@ -262295,7 +262295,7 @@ CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d909 CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000 CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000 CVE-2024-37158,0,0,b4d40e12771683f9d5a53f64e9d553dc97ee8e5a0c9b805783b3e212a30eb015,2025-03-07T16:39:07.263000 -CVE-2024-37159,0,0,5d23deb0675ccfac28af9228e324e57028d22154f229f7470567002b08d6dd3c,2025-03-07T16:41:03.003000 +CVE-2024-37159,0,1,38b8fc37b6415a0d96044243201abe11b2d81bf8866a1f16c1ce6e8add7e4562,2025-03-07T16:41:03.003000 CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000 CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000 CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000 @@ -262692,7 +262692,7 @@ CVE-2024-37543,0,0,f341b1b989b7b09854007db11d1dd27a3372cd6302c7a1127e1dc79c03105 CVE-2024-37544,0,0,d805f40352bd0ff1b6f963f4eb4e1e40a583869d3bf84385d8889e3a8fe75f70,2024-11-21T09:24:02.510000 CVE-2024-37545,0,0,fb90924d38457d1dd3980d6196d7b7d50a9cba7f79a772178a977ff07aba98d9,2024-11-21T09:24:02.653000 CVE-2024-37546,0,0,94cba47491c6527d0c496367312fafbcf43143c4bc5b99da55566f99264fe5a7,2024-11-21T09:24:02.800000 -CVE-2024-37547,0,0,2b4d5bf742186ea007a420c0fd64bf5a9f414230ac06321c240323a10afe229d,2024-11-21T09:24:02.950000 +CVE-2024-37547,0,1,8514d385a12b7c17ad874f63a147f5f3a45daed516a13389229763e42a0af104,2024-11-21T09:24:02.950000 CVE-2024-37548,0,0,9e7d007754367f255c486f99b8a8687f3436c9c397720e1ba343f53d91a297a2,2024-11-21T09:24:03.080000 CVE-2024-37549,0,0,612f7172420250cf6064162aa8583362e27d08d5ed9cb040421da8945931586e,2024-11-21T09:24:03.220000 CVE-2024-3755,0,0,eaff3b010bb69d97908ac8de27fc7be61a0fb4f47843c12b5b57227b99469efc,2024-11-21T18:15:06.730000 @@ -262830,7 +262830,7 @@ CVE-2024-37803,0,0,ff871d2843c5255d8de994bced5f1adf9770794e42f5abdafbf5c9617ed3c CVE-2024-3781,0,0,44a00f36ba2e30fbc616767205015d4a10316a91fa9ef45aec45b25e4dc4a3e6,2025-04-10T18:42:29.753000 CVE-2024-37816,0,0,0255491dd0ac61fe8f883862d2c202814fc8f53a759901f88a06c7013f4661c0,2024-11-27T20:15:24.903000 CVE-2024-37818,0,0,adc0803b390ef119b7312d5c108656cbe1c41da7e77dc9f33c1c6c84e04bc7b6,2024-11-21T09:24:20.427000 -CVE-2024-3782,0,0,dc5685241c7c8de1440e9b77e1a1c0d60b24a5b9a973cb162a1981bd6e059f0f,2025-04-10T19:54:59.537000 +CVE-2024-3782,0,1,32a356e63af8f93362eeac25a2a26f8827c645d591aba7a276da70c8e06e02c8,2025-04-10T19:54:59.537000 CVE-2024-37820,0,0,cd852e1dadcb7edc135763a1f4f8f423dcb6c177e797c3b00dca3df88e5d65fd,2024-11-21T19:15:09.450000 CVE-2024-37821,0,0,1453a655cd572a4a0dd83a571605e37d7e86ccc97e2d883b331db535ee79a9ea,2024-11-21T09:24:20.780000 CVE-2024-37825,0,0,9415ecb729c8ea23547630f5e9156dca92043a10d0acfd9c137211bd64cfbf2f,2024-11-21T09:24:21.010000 @@ -262947,7 +262947,7 @@ CVE-2024-37956,0,0,61481c48e38db3f8a05369765f4eaaf2b442602110bfe4e8231954f68887c CVE-2024-37957,0,0,a8222dc719812e73523fa0449020fd6bfaed368e79ee525e6fb73e85d9b8f55e,2024-11-21T09:24:35.307000 CVE-2024-37958,0,0,540c02bec92c5d8ab60f85416bf350b9ade7701699ff3e5af971452f58e69d79,2024-11-21T09:24:35.440000 CVE-2024-37959,0,0,2862307e6b6656e94395dac2d8ff6f12ad600e913a0f2b2e4ab9d9950e1d2714,2024-11-21T09:24:35.580000 -CVE-2024-3796,0,0,e1b6ac21af9f7f10711d092ec5ab6faabf6158033faf98b842088fc7c7652d25,2025-04-10T19:54:51.197000 +CVE-2024-3796,0,1,f7a1f98e312f525f6f47999a2dc83cfc0e5c81d040279f08962521f0701ef5e3,2025-04-10T19:54:51.197000 CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000 CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000 CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000 @@ -263259,7 +263259,7 @@ CVE-2024-38266,0,0,060fde92e194880266c41ef30a7682e84ab7768b766c1e4ba043c4d3895fd CVE-2024-38267,0,0,2f2200bdf622493906326d5acab6e766450e36cf9e37a3aef0e32c2106f2c357,2024-09-30T15:52:52.787000 CVE-2024-38268,0,0,eab46e6b7e36a54bfbfac467119830961637a950b96b9b108bfef786c50054b7,2024-09-30T15:52:29.977000 CVE-2024-38269,0,0,432ee47481f8a3dd52097e6040b22531583eb4901adeb010f3b35ad3ac7431d5,2024-09-30T15:51:55.567000 -CVE-2024-3827,0,0,ce965a0444cdc5713b38ce9eded6d6038f7716bd84b25b2d2ca7a0657fa28be1,2025-03-01T01:39:04.417000 +CVE-2024-3827,0,1,5a42a9fb219bf565b7139ad06465576a4c548c6968bc2b3f90ed2d2ba1201c60,2025-03-01T01:39:04.417000 CVE-2024-38270,0,0,eabae90b4ae91fff1d5d90f6993f2d2fe396210c74a360c10927fead87a9c647,2024-09-18T18:23:40.977000 CVE-2024-38271,0,0,d61519824913b32d9db6135a6f9bf4e005ca382421a801af6f54f26773cc4f54,2024-11-21T09:25:12.390000 CVE-2024-38272,0,0,a428282e2328d115eecf027212d7fc44c92f6e65ea02e4ce22f32e52f49e01d1,2024-11-21T09:25:12.743000 @@ -263350,7 +263350,7 @@ CVE-2024-38372,0,0,570b446c55639a8b3cf30afcd230e75668a96ef7abf04430a90f666f7b3a1 CVE-2024-38373,0,0,d9056dbc5adc05726d404a5bc86822fbf383ea7d308c2978f441a25e48e268e6,2024-11-21T09:25:31.550000 CVE-2024-38374,0,0,385755f3250b38fb390f3e2ddbafa7c01f92ce5e9a8df222f7a857dbc7f46619,2024-11-21T09:25:31.790000 CVE-2024-38375,0,0,4c41e9a4ff81969e1fa3e41474f45e6d6b8421eb3496c17ace4d49eebdaaf189,2024-11-21T09:25:32.063000 -CVE-2024-38379,0,0,2071c6703b1261b061e540a482bd89fd4b379f3945b44f9a64f1907ed35d66ab,2025-03-19T15:15:47.657000 +CVE-2024-38379,0,1,234fa57dab4b5a8fcdeba034fc3433fb5dc8019e01e38fa32acb223bf9d40bbb,2025-03-19T15:15:47.657000 CVE-2024-3838,0,0,ecb2f637693b0f52b22a1ce5c265c7718bccba4ed013cdda37dfec46ec17e1be,2024-11-21T09:30:30.233000 CVE-2024-38380,0,0,e82d406bb5fd1bf3bc4ad66f322cc926d0134eaf47dc73f6bb3f7459fd1be2e6,2024-10-02T14:22:25.323000 CVE-2024-38381,0,0,fd24c84d99f21dbb0117f725b97738bb666c17675ace06f5e8d1b2e5ef39ef65,2024-11-21T09:25:32.840000 @@ -263445,7 +263445,7 @@ CVE-2024-38473,0,0,bbb5e11b003247980ea92e43b9234c78ba249d78fc42472835f589d6b2f6e CVE-2024-38474,0,0,45036bd99d11fd8070d056b74d456256aea510925aabe908e2e90a3917fc161d,2025-03-25T19:15:43.623000 CVE-2024-38475,0,0,cffda6a953163d4e08000545cbd4d92ba2e5d3654b5efce5be8544cd35b12e88,2024-11-21T09:26:03.180000 CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 -CVE-2024-38477,0,0,4a424730069430bf103722b4487020936d441c65347ffcf0b7bfe70f711e69c5,2025-03-18T19:15:42.683000 +CVE-2024-38477,0,1,d6e33e4742edc4adac89b8f3cd05a29976b8b88837d06a0160e443a54d13d5d3,2025-03-18T19:15:42.683000 CVE-2024-38479,0,0,c70847aedbd201cfc354e550e0b90cec56f97441e95e9c598b1abef167a9ff30,2024-11-15T13:58:08.913000 CVE-2024-3848,0,0,1bb91ee395c277a929aef5b89902a90b679e2d6a3388b7e9b3f685b088b1075c,2025-01-24T17:28:21.717000 CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade0d8,2024-11-21T09:26:04.080000 @@ -263525,7 +263525,7 @@ CVE-2024-38552,0,0,720fe50f9f09822193355713378016678554e327fdf10962760ff63ce824c CVE-2024-38553,0,0,7daa674f39b9fbc7f9a8957c03f3f61bd55305270fb94814d9818955a2978ffd,2024-12-02T08:15:06.310000 CVE-2024-38554,0,0,df13f1949b7bd7172dedebdb3b62a0c27acdc95d1295e38abf4aeb7af3ad3c7b,2024-11-21T09:26:19.990000 CVE-2024-38555,0,0,48d1e5dfc3dfc2a4b0fa5c5ab09979a6f28a54ef666340efda4f6723bf60db30,2024-11-21T09:26:20.137000 -CVE-2024-38556,0,0,7c01ae50884104ecc3e9ea6757e218322b58c083dbb9d51ac9e7658baf1ed970,2025-03-06T12:56:25.937000 +CVE-2024-38556,0,1,84c5d861e12cc259eec807ed084854fba1f283039a34d27e96be0e627db78cd1,2025-03-06T12:56:25.937000 CVE-2024-38557,0,0,0dfaaf21c71ac44704804f687fb153b22f5d2adac3615ba3150b80b203367d77,2024-11-21T09:26:20.410000 CVE-2024-38558,0,0,bb5f5c588cc6220a8f52a1016f93a06d7e93f2566de01426efa76e676cd4b0af,2024-11-21T09:26:20.560000 CVE-2024-38559,0,0,85a3bf9b041ccb103727960b0bc5de92467579647a8c7907e7dcc64ff0650fbf,2025-04-01T18:22:56.827000 @@ -263580,7 +263580,7 @@ CVE-2024-38602,0,0,6074885d7e84857d272e5e137d9ef3004b7d1aeb12bd595cc6a908e5bc762 CVE-2024-38603,0,0,2b3756b5f98fde6d2e61eed6983eabc482f401bb309bc43a7cc9339b578c9f49,2024-11-21T09:26:27.690000 CVE-2024-38604,0,0,fb5dc88ac4d02670b799830b7a6a54f5a6ce8e126f7a992e07bd7920b7ba6b1e,2024-11-21T09:26:27.827000 CVE-2024-38605,0,0,d8acc8c39ac66334346e9e3021419ac507c7bf6bacf776455725e6241505ea5b,2025-04-01T18:26:12.557000 -CVE-2024-38606,0,0,758180837a1b4e65b7b30560b005d3b3d48d56f625f7b812ee1d59a78a0a0cc8,2025-03-06T12:56:14.747000 +CVE-2024-38606,0,1,9417b6106f523726504417b6b9faea2bc774e1f42d396190404e2a92c524c707,2025-03-06T12:56:14.747000 CVE-2024-38607,0,0,55432cbb40c6349effbcd61958d80414a37550b349345ac1cd3aae9bdab797a7,2024-11-21T09:26:28.270000 CVE-2024-38608,0,0,9047d5fa6031e3edcce1a9b27f9a4f65f4b59fc23ac62e10259c6e642290f89b,2024-11-21T09:26:28.400000 CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000 @@ -263757,7 +263757,7 @@ CVE-2024-38765,0,0,45b024f9c43bfe47a4a4716b5c6e2cfd83a268c867cdb7c9b65775b0a2295 CVE-2024-38766,0,0,8c7b8ba00d9d03d5710b03920d96ecdaee1da3dd08661f9ae5ffbc66e9a580a4,2025-01-02T12:15:23.487000 CVE-2024-38767,0,0,fbf72db56b2c3319d2ba5902f993c4818e7574fe761f64435b5a8fda9e194b17,2024-11-21T09:26:47.073000 CVE-2024-38768,0,0,1781e9cdce247930168e6c5b1c9c0f37c8e6be3f68f19088409e9a79f49dba3e,2025-01-22T22:08:45.223000 -CVE-2024-38769,0,0,b87d8cd55391e6f3aa3dde777e288dd5c5978f03583d9c629b55b80c3f5b38b5,2025-03-20T20:47:44.543000 +CVE-2024-38769,0,1,a76c70cff897bd967213d6510b4b5a3bd2e6fe41c066bfee30b5f0011c218a81,2025-03-20T20:47:44.543000 CVE-2024-3877,0,0,7dc053b251c7f8e4c852bf34c6e8a9142b79d84ac3f1a22d95dc5dcefec80237,2025-01-21T16:34:51.410000 CVE-2024-38770,0,0,0c9e03582a12319870a45ae32b8320368f33ad592fdd5a171772f822ee858897,2024-08-02T12:59:43.990000 CVE-2024-38771,0,0,27b468612455a91733eb84f694387c7d5325ed26015a10d165eca1c1b024222f,2024-11-01T20:24:53.730000 @@ -263772,7 +263772,7 @@ CVE-2024-3878,0,0,cf8c5000e1e69ee2cc3732767f8c87bceb9cec1cb07ce8c3b54e41ae6e97a2 CVE-2024-38780,0,0,59b516bf2edeec5bd5de1b6b25f5c18b14158969877e153ee0fa0692d018e06a,2024-11-21T09:26:48.823000 CVE-2024-38781,0,0,0dc3c569223570b22ffc9a0a837f27528b499c6a7317b28bfc390c2a6de9946a,2024-11-21T09:26:49 CVE-2024-38782,0,0,01160802fd0f189b240fc641a37384c195bc1f20e754065643d1aa6713819e12,2024-11-21T09:26:49.157000 -CVE-2024-38783,0,0,27c54f46434013b011de48a5be410f75d192b34aa93a6b65650dadae01290383,2025-03-20T20:52:23.083000 +CVE-2024-38783,0,1,d742fc7ddaf09c95c564dd4d701dace667c9fe334414ad4f6ca2c6deef1499c5,2025-03-20T20:52:23.083000 CVE-2024-38784,0,0,03addd84db3add4831a4f6d50e89fdb195a454b99cfeda4c4ca8cd5939fd881c,2024-11-21T09:26:49.410000 CVE-2024-38785,0,0,07037cb16ba94bd50736745d5c922040bc2ce584dc2d1b68e039c17ff796ae63,2024-11-21T09:26:49.540000 CVE-2024-38786,0,0,a3945d26053fac2588fcb2b904e0a138f2d9f54dc61623305952d8af8bf018ef,2024-11-21T09:26:49.673000 @@ -263876,7 +263876,7 @@ CVE-2024-38924,0,0,871e59f17b901ada524d7b7c96fe3f0381755c09a997732b9d1a783220939 CVE-2024-38925,0,0,73ffcfe04cc3235f5e61c15c9bbf972540028c029edcada6b9ecaeac915be23f,2024-12-17T20:28:17.307000 CVE-2024-38926,0,0,e8aa241fa4ef4f40380c778236abf3b2fefa57ccca198f4c3595a57fe341de54,2024-12-17T20:28:03.277000 CVE-2024-38927,0,0,abfe11434474364e77539bf1ef520124ec57a47fc17409062fe7ded067bd7713,2024-12-17T20:27:30.040000 -CVE-2024-3893,0,0,09efe4cc959eb8a4000a2996938df3ee2abc638e569f1f06c5c89fa7fb7b0036,2024-11-21T09:30:38.763000 +CVE-2024-3893,0,1,d8d7b88028c214843018da3781e41fbec20853c183243a46ec846dc594922082,2024-11-21T09:30:38.763000 CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000 CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000 CVE-2024-38949,0,0,37157e233df90a73366a05c90945fefa68ba5959ff251c7bc601be03a335c73b,2024-11-21T09:27:00.007000 @@ -263894,10 +263894,10 @@ CVE-2024-38971,0,0,b7c78d93e7ba94ca61ec629bf009d83e9799a9625a3f8946293d7b9ba9df4 CVE-2024-38972,0,0,7707de3c6947b8e1ffe23c88844dd9dd19cf445aad94cf380ad21fae1a2fc6ca,2024-11-21T09:27:01.880000 CVE-2024-38983,0,0,be6b092943c2a1ae6130cca34427de8922ce8cef29425d25aedcf97010d9f50d,2024-11-21T09:27:02.123000 CVE-2024-38984,0,0,2b479628f29ebd45adcd8a5caf6913dde07fd154c7e2005f9252d659b08e0966,2024-11-21T09:27:02.373000 -CVE-2024-38985,0,0,df6a30d16e726272fe25bfa58d41b796830f1f763119d90c4b6bfebdd3e553fd,2025-04-01T20:26:30.593000 +CVE-2024-38985,0,1,a1e214ee0bc813a289acf917e491e5dbfbfdc8b23fa3a5b3063c6f65fae5a8d4,2025-04-01T20:26:30.593000 CVE-2024-38986,0,0,e3d8b5578e820ed169b54b5d3d475ce0d98dc94831a9245b278493a3468d803d,2024-11-21T09:27:02.613000 CVE-2024-38987,0,0,f9d8e9a22d9ef04171295b20085a760b39c7d10e768785f425e47a881c5c599a,2024-11-21T09:27:02.847000 -CVE-2024-38988,0,0,ea7058a3ab8523b19f6acb1166bd0b5d60eabc4e857ea6ef671d650483000ae0,2025-04-01T20:26:30.593000 +CVE-2024-38988,0,1,4095055389998c89fb22d230349824d4fa189f86c296d1c87e29fd706a499429,2025-04-01T20:26:30.593000 CVE-2024-38989,0,0,1d2ecdafa56240b5a583bb368c389c5a8fdf57bdc1b9172c4284561b4636d6c4,2024-08-13T14:35:23.670000 CVE-2024-3899,0,0,340116e2af643c79a77ce4bb339669e37ac57aee73d7bdf4365cb70a15a720e2,2024-09-25T19:37:28.347000 CVE-2024-38990,0,0,560b97a0b199ba787c98e58b54f17a37af596ef0b2f066d9b4a16d2e354a81da,2024-11-21T09:27:03.307000 @@ -263947,7 +263947,7 @@ CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a CVE-2024-3908,0,0,32cc26b53789ac42f9085c7424d4e7e5e1385983e1e04bf11b22f248840a758b,2025-01-17T21:16:07.327000 CVE-2024-39081,0,0,1ea98431957362ab56a3af379eeef002d3bbd99853a222b010a3be68bd797b7b,2025-03-17T15:15:40.787000 CVE-2024-3909,0,0,d5574f4925d57273c75b63e724e2aae982f973388b6e621ddd87893b5d997ccf,2025-02-07T01:57:01.643000 -CVE-2024-39090,0,0,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000 +CVE-2024-39090,0,1,df62c3109990088ef0f522c89ae6de34e5de0e29c10470188aae0dc016a6c451,2025-04-05T00:12:27.873000 CVE-2024-39091,0,0,c140294e78a78cd7474377e032af5887e358fd95402a58bcd7abb93d413219ea,2024-08-13T21:35:02.617000 CVE-2024-39094,0,0,3489f753e4de88b28bdf0c4a0934830757dd9bc356968fa920ba404447b0e998,2025-03-13T16:15:20.363000 CVE-2024-39097,0,0,2ffe2246b6dcf8095996d63654e4d34504f5907f265a5a3acdcc049adc39575e,2024-08-27T16:35:13.930000 @@ -264064,7 +264064,7 @@ CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e32936 CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000 CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000 CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000 -CVE-2024-39311,0,0,172d6f5add6f04a85c711ea9d40b7d10ad3967612501b201e58dab840287c504,2025-03-28T18:11:40.180000 +CVE-2024-39311,0,1,0a4cacfd3571826c5e1c4bee706f04257866bed286590fb19a9133432e8b81c7,2025-03-28T18:11:40.180000 CVE-2024-39312,0,0,244e5eeda7d77b8f762732664cb450aa8179af57ae55ef58be1fa7ad940fc27b,2025-04-11T14:09:48.327000 CVE-2024-39313,0,0,b115d3b78f35e7dea98a72603bba4219df7032cb204602053744e9732af62a26,2025-03-06T18:04:02.763000 CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000 @@ -264255,7 +264255,7 @@ CVE-2024-39503,0,0,bfb8778b93d9dc0e3353fdde95567e557faa2bac791848eaa56eec80d82ee CVE-2024-39504,0,0,03a15e491e92fc31a2f489e2f508052010008630cdd84ebe3d7f8047088fc997,2024-11-21T09:27:50.633000 CVE-2024-39505,0,0,90a964e49c1df1a8320475bf163c491aa6a65384a876c0c3c686e952d6b3f1c9,2024-11-21T09:27:50.837000 CVE-2024-39506,0,0,531242bb57168b2c94d7c9f571365b7ffc2568e0de39b689dd6586cfb83bad6d,2024-11-21T09:27:51.840000 -CVE-2024-39507,0,0,f3e9ee5324e25379f428238af5b2eb05e057722e54c428729065248065f1f344,2025-03-06T12:56:02.940000 +CVE-2024-39507,0,1,3dd4cfc7bfd8ca1318fc27539ee21aea1fe96f5bb8d1112730e2191f9f22ac3e,2025-03-06T12:56:02.940000 CVE-2024-39508,0,0,b61527ede473f71ec957d7f063dfe9afc808de70d8a3a6ea55db87260a93d703,2024-11-21T09:27:52.240000 CVE-2024-39509,0,0,1d8d55009f9cf6a11df5a012ce860d80d98e7fff9e22285b239717e5da5825e4,2024-11-21T09:27:52.407000 CVE-2024-3951,0,0,fe866e4ae1f51945bb25f7c9b08a9604548e90afa543b0c28badacc4120fa05b,2024-11-21T09:30:45.817000 @@ -264533,7 +264533,7 @@ CVE-2024-39777,0,0,d544fb5c8af3d11cc0bf86238933c07737b24f611dcb10d9d356ddde3e445 CVE-2024-39778,0,0,9acf5afdd541cae045e7bdc26465b94e6c92b67cd02d0fd987512cce467c195a,2024-08-19T16:20:52.980000 CVE-2024-39779,0,0,88a98cded7006229eb9e6198e6a0913ba739bc6556fc7067d144510fc57eacd4,2025-02-12T22:15:37.117000 CVE-2024-3978,0,0,482c21d01e49c69bca4dc15aede6173bfc8d79c5700a49fac23ff27e1403ed25,2024-11-21T09:30:48.857000 -CVE-2024-39780,0,0,19148a21d96099df3ca74e1d57ec8d14b88ecd95f9333fcd00be35e18932189a,2025-04-02T14:58:07.527000 +CVE-2024-39780,0,1,4282b190f77907c5041c03fcf6476dbd44ca458f23283ed00958225f3781bf4a,2025-04-02T14:58:07.527000 CVE-2024-39781,0,0,cd7ec078c3d17c622583b3e23660ac213bd8eadef2f1c6639a74be6e2f789062,2025-01-14T15:15:22.900000 CVE-2024-39782,0,0,2c4a0c996115cb53bacadccd26e56de9d86433511bcf2ca9387251a8d2006990,2025-01-14T15:15:23.090000 CVE-2024-39783,0,0,f6f01647f22663a1a4237028be2f09d041ea4a7b798078632e4cd7d6dc559f9f,2025-01-14T15:15:23.253000 @@ -264602,7 +264602,7 @@ CVE-2024-3985,0,0,8f03264baafc07298f97f70b4ff78c785056a15ca84e8beab59019b2a1407b CVE-2024-39853,0,0,a224043399891653f1bf55094c6d78bc499427db95adef716d68626986175f2f,2024-11-21T09:28:26.447000 CVE-2024-3986,0,0,7c22c53a0878a262a608a9d1c3fdcc329a9d6483cd2f7affa5dd9450a42b232b,2025-03-13T14:15:29.767000 CVE-2024-39863,0,0,2a4fab41b36270083c53945f9453e9d3f204a719fe1df5d3475aa7899200c551,2024-11-21T09:28:26.660000 -CVE-2024-39864,0,0,5dcaf0251db9a4a8b34ab0cd74288199c362c01406eb3a4689eeb3d76c12a288,2025-03-19T15:15:47.880000 +CVE-2024-39864,0,1,827a777bfe237d29269604f6d7e5a3ed267da5bce9813ed0c487ef2e5dd05a36,2025-03-19T15:15:47.880000 CVE-2024-39865,0,0,443cd5bbb734cb98d2b9a7fa46db9e8a16c74aae3b32c34251af7edee550c7a5,2024-11-21T09:28:27.120000 CVE-2024-39866,0,0,82b29e674ee72cfe4fe2cb6cd4236597fe7b1a4de664d989bd3b771e42ae53f3,2024-11-21T09:28:27.273000 CVE-2024-39867,0,0,f0b8dcd08f0b46b06a51b8c40e348483b76c46f078f38321c09db0be6a96b1a4,2024-11-21T09:28:27.420000 @@ -264634,7 +264634,7 @@ CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027d CVE-2024-39894,0,0,837fc8c618bfe9d6e461716736e26d7e181457ee03d982b2663ef36e61ce7eda,2025-01-29T22:15:29.073000 CVE-2024-39895,0,0,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed78d,2025-01-03T16:29:09.890000 CVE-2024-39896,0,0,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000 -CVE-2024-39897,0,0,1fe8c15d51144feed84c1e5fa558bc6be619a155ff2844bf83ef3c70cc09d415,2025-03-03T14:35:41.590000 +CVE-2024-39897,0,1,6c46d076623993401ad81f435de7bd37b53268c0347969781ed92ad1226ab12e,2025-03-03T14:35:41.590000 CVE-2024-39899,0,0,297d432e5e8cf7a69d6c2d2c76a3c5e549155c2d6082762ac7bcc58bb5e4f590,2024-11-21T09:28:31.470000 CVE-2024-3990,0,0,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b48,2025-01-28T19:23:34.850000 CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000 @@ -264802,7 +264802,7 @@ CVE-2024-40433,0,0,1e9095d72ece5911563f9df15281aee72be92aab8deaf5f19a613b735edfe CVE-2024-4044,0,0,01aada30b695e7d560576a60975ec8e82150fda0d77225fe8e43f6b57e0df318,2024-11-21T09:42:05.590000 CVE-2024-40441,0,0,9c641a9199d7b49691eb0d0ccc6b07376d4badef46335bcb9698dfcaf7f96c2e,2024-09-26T13:32:55.343000 CVE-2024-40442,0,0,2f4e5d396d491f4f4f7019855f484e167cf80b7edaec8e55b61d220cacfb6bc0,2024-09-26T13:32:55.343000 -CVE-2024-40443,0,0,147b377ee266797261a250ba803472c270d9ef21a413c27fdf6f00f8560e81c5,2025-03-13T14:15:30.023000 +CVE-2024-40443,0,1,048764d1902a134cc67045bcd96d86fe069cfcd2506440a731b441756171050a,2025-03-13T14:15:30.023000 CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000 CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,5878b4f11374ce80d4d41d44d59efbce20daedbc5c85efc7aca55090bd0e4410,2025-03-13T15:15:46.557000 @@ -264905,7 +264905,7 @@ CVE-2024-40602,0,0,64d3f402d3f53289ad1ba6df8706a05bc3520d6f6cab664d62af31c1edeaa CVE-2024-40603,0,0,9b6684d222a7a0ec72b43842915255a57c21d1269fb8fee78413b94702508ca0,2025-03-17T22:15:12.950000 CVE-2024-40604,0,0,e77a737cdfb3cd35d797c9c67078a444af648fb1dd8498e14c02ff77f8f92075,2025-03-18T19:15:43.277000 CVE-2024-40605,0,0,ec0691a64f01599ac002394a6d8c51c45d9aaf6fc0e3b45509572cac28871ac4,2025-03-14T14:15:16.200000 -CVE-2024-4061,0,0,434b9f563f4d748c2b021ed0b470e35aa7ad514124555df7ed27430225e83492,2025-03-29T00:15:23.787000 +CVE-2024-4061,0,1,6b263b1c8fd4e397a0b6948442c14114d50bcdf33bfe92c0c5d04becaf268036,2025-03-29T00:15:23.787000 CVE-2024-40614,0,0,7b470bc2eae0c988a1ba65e093b9ba66a6230d3405f5a4a45e19fcc08e4ff159,2024-11-21T17:15:14.190000 CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000 CVE-2024-40617,0,0,7198a52b435c3b915a129354925ad4fbda1fd56a8e45494a34f555ead642c0be,2024-11-21T09:31:22.627000 @@ -265160,7 +265160,7 @@ CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000 CVE-2024-4090,0,0,c34c2e004c8df900b9681773f17eb639b851ef9028540c2f050185017679d9bd,2024-08-01T14:35:12.593000 CVE-2024-40900,0,0,2eef31d80f1ee0f80eb06d995c8bd5896501640278c957585e3a2ea9a3d37e66,2024-11-21T09:31:49.010000 -CVE-2024-40901,0,0,703c38470391a6391d283c431d4abe8025b6f753d0a15be58ce3e306b333b01f,2025-03-05T18:50:38.790000 +CVE-2024-40901,0,1,abbdc1fe508c2030f62aac2db7001ee59f715241c8ac8285395dd6fb0a0182ce,2025-03-05T18:50:38.790000 CVE-2024-40902,0,0,31e499e82c88bfdbc05e678ce43a92fdaf145152d612e5d4fb61a2c9d2151728,2024-11-21T09:31:49.273000 CVE-2024-40903,0,0,4d483aae7a92b16abcc2bd61bd46681ff4177178359ecc7b304279ac1d080254,2024-11-21T09:31:49.493000 CVE-2024-40904,0,0,0f6cde693bb9d512633e88be646eea9062c67a7f552516b15184ca79bb263ff5,2024-11-21T09:31:49.620000 @@ -265186,13 +265186,13 @@ CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e CVE-2024-40923,0,0,5efd6b4ae80a0f1404002746c36b7cef623484910276e4bb035c5a2f595a19f6,2024-11-21T09:31:52.723000 CVE-2024-40924,0,0,0f9d33d7b2d19938ae91198bf63ca56eaaeb77e2f520287ce7027ad8d2f1cd68,2024-11-21T09:31:52.850000 CVE-2024-40925,0,0,952bfc3433123f21d86aa6aae5c34aa75b8dbf982f063d2a21b34992f7bd7f1e,2024-11-21T09:31:52.970000 -CVE-2024-40926,0,0,a46cc653aa32503cbf18b7d68621687a541b62d68c78f50f4721116e28c71205,2025-03-06T12:55:55.323000 +CVE-2024-40926,0,1,e82e3b0532d846468e4dff0ad79a509564db3bb7a7aed5d1bec8ffca8e2fd05c,2025-03-06T12:55:55.323000 CVE-2024-40927,0,0,3e45cd4c7d7b84f311fd8311cd12a748117e2e084a0ae25d71c9b0f17cb60f82,2024-11-21T09:31:53.210000 CVE-2024-40928,0,0,6bbb47c365ce69b1a36872686a7534abbb78ea0d91fdb478bcb9952597ccc35a,2025-02-03T15:37:36.703000 CVE-2024-40929,0,0,12ca49b2c39711ccc5bc7ec2bc8205b440ce5ff05e6cbcb5d341b829355f554d,2024-11-21T09:31:53.453000 CVE-2024-4093,0,0,85c600e205c1e1587bc1a4c34a7c9462d6d80825a565056bd63de6baf2e1fc7a,2025-02-11T15:33:25.337000 CVE-2024-40930,0,0,223e3bb5f491ddf209a9c6b0fdb035fae8a1844766aa0528db1cea737cf6605c,2024-11-21T09:31:53.580000 -CVE-2024-40931,0,0,3db4138c3d15a9406f43c248652d978fc75e347470239d783fed495533c50593,2025-03-06T12:55:45.233000 +CVE-2024-40931,0,1,cf0b3df3601b4034042d16e3db592e3a1d76152abbb577b86a1446b0d99a7b28,2025-03-06T12:55:45.233000 CVE-2024-40932,0,0,396501b3682afb3f6991ae19df88e118e519447a6804c55f105fd35e30fb00dd,2024-11-21T09:31:53.817000 CVE-2024-40933,0,0,7c0cb98e6ad09b1eb03291e4c89ea0fa86745de6ed168fa2a93f9f27003a69b0,2025-02-03T15:38:11.110000 CVE-2024-40934,0,0,715b4cd58b992c333d81aa8ac045f4eea34f011597b59a061268df50bd4135a7,2024-11-21T09:31:54.097000 @@ -265250,7 +265250,7 @@ CVE-2024-40980,0,0,de3031711db513dcb148f704b93b2dd78d8a01c6b42c8e20d4a48c56f1176 CVE-2024-40981,0,0,37c3f0cff46cff282ec46d2f86b939aa2408325f560b29ec75fca4a796526834,2024-11-21T09:31:59.973000 CVE-2024-40982,0,0,bcacd4044a55751834c2f177b012689b5a04e030964cc42170ae5439258936b0,2025-02-24T13:15:10.790000 CVE-2024-40983,0,0,4f1e7e94a10f77a2a960c5963137825b1a7d9ac1338f04d0af0e9fa582272b5b,2024-11-21T09:32:00.260000 -CVE-2024-40984,0,0,0586c61d6a5b34ee9e4c55fbd36cb8b4ba310de26129d58f299b07587c9b999c,2025-03-06T12:55:30 +CVE-2024-40984,0,1,5923fe3ac8c8e1e24b0718790b1af845d37a6ae2c76d7873493dc7c4ecdef2dd,2025-03-06T12:55:30 CVE-2024-40985,0,0,53f2aaafe6f291a7057a7769a5566edb3215c6fde96a4df2ae27d2aacc836123,2024-11-21T09:32:00.513000 CVE-2024-40986,0,0,70433503e15bf19a04d4804979b973ebc8834bf0f36157900d4e6769acc11f76,2024-11-21T09:32:00.620000 CVE-2024-40987,0,0,8c6da8c46e3a70e3ea00130ef8dc2384edf3f6f8358535f996c64f7236534443,2024-11-21T09:32:00.723000 @@ -265283,7 +265283,7 @@ CVE-2024-41010,0,0,7d2daef6e7d0ee3e0487437fe1a45624bf889ddd16049d1a5a89a934f340e CVE-2024-41011,0,0,9f4ff30565fcca32f4ad6c1fcd8959c5c6e4a1ef7a7a74225d8f93f4f9f215c1,2024-11-21T09:32:03.737000 CVE-2024-41012,0,0,eb5eeba32dbc20c53f5d8ec529e31bdb298f6fa48fa5e0e88492ead04150e399,2024-11-21T09:32:03.867000 CVE-2024-41013,0,0,5d2d648bcd81be2d07c67cd7c293fb6286aeb556fc436fcb8cbc4e97f940239e,2024-12-27T14:15:23.343000 -CVE-2024-41014,0,0,2fd7c77631f65ff5c708e8d882a8a1ced88dfcab905b8ecb901bfe608a05899e,2025-03-05T19:02:36.107000 +CVE-2024-41014,0,1,22ec70bcd9c2147a233fbc228d676384c5b06fb848026037c24a21afff4a49e4,2025-03-05T19:02:36.107000 CVE-2024-41015,0,0,9b3ae1f79342e0b13e2fef94889a75a92c8d75d0a17ab7cd43a433c966ccfd17,2024-11-21T09:32:04.217000 CVE-2024-41016,0,0,8df47623ea6d364b67b323c6874ead4a0fb1cdd6a839c86e81c3f8df2e89dd14,2024-11-21T09:32:04.357000 CVE-2024-41017,0,0,3fd60b423aa4c60ee66b8bf5eeacf56b9cd985844d17ae8be2e46577f1ee5370,2024-11-21T09:32:04.487000 @@ -265293,12 +265293,12 @@ CVE-2024-4102,0,0,ea088797f5a1f6024b4f86bf2b9bb7d0379b6038529d3a08c98b4f1f4cefdd CVE-2024-41020,0,0,388363ca783b8ff606e303aa949ebe0fe44c028a3ba3d2711ef057fb8b92f984,2024-11-21T09:32:04.857000 CVE-2024-41021,0,0,66764aba5cc0a5c5056e989ff515d25782a6a55671c8611b91ac5c440b5402b4,2024-11-21T09:32:04.980000 CVE-2024-41022,0,0,e5388dd233dedf6e0ea6968f1647488dbffbbbcd9bb61c2feac751c6fbb5d937,2024-11-21T09:32:05.103000 -CVE-2024-41023,0,0,0203d88a626bea38a3f6c05c26fdd21f3c61dcbff7ee4c09fc6076e6ec32cbf6,2025-03-04T16:58:01.263000 +CVE-2024-41023,0,1,ef03250d84eff6f8b615e94366c64369fbdc28cacba660908bf1977d7fffe0bf,2025-03-04T16:58:01.263000 CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000 CVE-2024-41025,0,0,de776435d7227d8dd4a23ef7e5396bac477026279e493e401efa28a0e142b9b2,2025-02-03T15:43:55.150000 CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000 CVE-2024-41027,0,0,eaa63e74c3ce16129be48c23bd10b961f700b28c359c1860f0f1e79e575ef9f2,2024-11-21T09:32:05.680000 -CVE-2024-41028,0,0,b3e7625842dc8ddf580232072af33a639d7daa2536ab5cac233fedabc7af80d6,2025-03-06T12:54:17.947000 +CVE-2024-41028,0,1,7583cdf03a31a40794e81b4dc736959a2e58ee5b99bd428da6146baacd32db20,2025-03-06T12:54:17.947000 CVE-2024-41029,0,0,f9db8ea6446b76e46dc00691964188fe35e2a1ac13ab357464786adaee900744,2024-11-21T09:32:05.920000 CVE-2024-4103,0,0,aaca6600ff13db66884b3ef298ff81547c88ad56078acd57bcd1d6a0339d855f,2024-11-21T09:42:11.887000 CVE-2024-41030,0,0,9168be225963c75def9fd0a94bac40604a890ecf2829523390253cb24d1adb15,2024-11-21T09:32:06.033000 @@ -265376,7 +265376,7 @@ CVE-2024-41095,0,0,a4a292866e3068d2f57a8254661b1866731b922f2dd7e200baf567ba1f054 CVE-2024-41096,0,0,8fd4c9d4ed264f2885567b62f2a34922ebfa56dcdd0edc053176d3013a5b2964,2024-11-21T09:32:14.257000 CVE-2024-41097,0,0,da1adf0b3a12bf0132b0aa72e2097d79037ba33782764c156f4094087589b6d9,2024-11-21T09:32:14.393000 CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb6634064fd,2024-11-21T09:32:14.563000 -CVE-2024-41107,0,0,a93abd184a4a2e5ef9685f6e0dd1470a51a39ccdd8cca44cd0b0a2ac3c2dc133,2025-03-19T19:15:41.073000 +CVE-2024-41107,0,1,b65b0c852b15ec8ee1efca6cb1356fe023fad73fddc88175eabf07ded42e340b,2025-03-19T19:15:41.073000 CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000 CVE-2024-4111,0,0,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000 @@ -265778,7 +265778,7 @@ CVE-2024-41760,0,0,b4f0afc16edba57e674ab684247d68ec8bac5e6e8402e570fc600a4b5b409 CVE-2024-41761,0,0,48d0303faeacb5aea64f43156f94a0affd943a18971bba4b04fb6042b87c2c03,2025-01-31T15:26:34.900000 CVE-2024-41762,0,0,c1974aea0e06b2927c18784e57637a55268819be3644cbae33cf4f7fc7ed3224,2025-01-31T15:27:03.190000 CVE-2024-41763,0,0,bbfd35f539642f5a0ec30f31fe11d1bc4c3d83eaea4f5027f188888062df540c,2025-03-21T14:06:11.730000 -CVE-2024-41765,0,0,f734577dab707fd4353e597266c328faa321004bc2c433f91251a2717c984060,2025-03-21T14:13:55.840000 +CVE-2024-41765,0,1,c2107a6a0debb8a59b9dfacb5b691692437f09a1f96b2b6fbd1bf77184dc540e,2025-03-21T14:13:55.840000 CVE-2024-41766,0,0,dd35c57e9aa5f7d7837057d9828d68b9b89a1c7c422941ae45fdd3d8b46ff76e,2025-03-21T14:14:39.607000 CVE-2024-41767,0,0,956d8f7de601c6bcac7b7ccdc250baccc2d0062da3d4c1de8f32c9268880aff0,2025-03-21T14:24:59.037000 CVE-2024-41768,0,0,d57308f9ed18a37a10c395428f222efe169825ceacba0996716de984ec2c9762,2025-03-21T14:26:59.907000 @@ -265798,7 +265798,7 @@ CVE-2024-41783,0,0,ae1c0de72e5dfe79735ebfb7f8ec730c4db19a9e6ca5a3f003214d7fa45e7 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c8540d1d43d0438fcf633df69d213201ae76d612d879b3fa5839154f3178ea9a,2025-03-06T21:32:02.937000 CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 -CVE-2024-41788,0,0,1f69c712180e732affbc1e3a3b33b8e7bdf15fa5f9e9ecec795ebccc5494a258,2025-04-08T18:13:53.347000 +CVE-2024-41788,0,1,22f4efc1ec15fa2e99586c7a0a5cb4934c6bbb9032cd386c939cea4033c46f03,2025-04-08T18:13:53.347000 CVE-2024-41789,0,0,08ba41aadfac42b364d55648c7ec4e4bdb7166b059c87342cb05aefd121d3669,2025-04-08T18:13:53.347000 CVE-2024-41790,0,0,3ed4d34e61c87ca08946e4484fc8f121057b59c67216f1dd94d2bed181782ac3,2025-04-08T18:13:53.347000 CVE-2024-41791,0,0,e5f03679d91eec4eadcb07f61080f9da9ae850886aaca7a19f099786e42e2eba,2025-04-08T18:13:53.347000 @@ -265936,7 +265936,7 @@ CVE-2024-41932,0,0,1abe0cfce1ee58b08103c4b11983b06cf9d6d018f246ca811a21294fed0af CVE-2024-41934,0,0,c3fe2996b06b004a747a099b6fb369c6f7ebba5b16ba8e7e349a65e494c1decd,2025-02-12T22:15:38.313000 CVE-2024-41935,0,0,97e87f9da1b20b0c02c2d1055e7a663ebdcd03109f5d41c24a14b0c4db033df8,2025-01-11T13:15:21.083000 CVE-2024-41936,0,0,64ce2ae8e3169355e34359bf99267a611a1742bc1bfc36bbc702c61622f21dd5,2024-08-20T16:26:54.663000 -CVE-2024-41937,0,0,9a90a2f928765512ebf92bccaa8bb6a95ffd5157cefafd05a7fec235803bc642,2025-03-20T21:15:21.303000 +CVE-2024-41937,0,1,008233c93c3c76c2fc7a7a03c23e1a3c7865736699856c95ccb691e22d36f464,2025-03-20T21:15:21.303000 CVE-2024-41938,0,0,4277105443b1bdb4071ee825d52311ee975b42802885acaa0f8f388e2b2c3200,2024-08-14T18:08:42.777000 CVE-2024-41939,0,0,6f430049f64b0c9b65aeec311d055dc934e03d63544768afcb163484130ce670,2024-08-14T18:09:24.030000 CVE-2024-4194,0,0,a7d46f281a00a9c57f6c9b08ce53d9943e9143913ad7b9aa0bdac3ba37dc5e3c,2024-11-21T09:42:21.970000 @@ -266188,8 +266188,8 @@ CVE-2024-42187,0,0,1a7e90ec8fd6111568607e7fe4efa4740b10d0987e11092bcc048a6df4194 CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000 CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000 CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000 -CVE-2024-42195,0,0,25be1bbcfe19ccb6d2a3ee91045d9ea1242797e882b8752f28a38a75bd1e17af,2024-12-05T05:15:06.923000 -CVE-2024-42196,0,0,74165ceca6e8e10016e2eeb4a033a572e7a1426e3140b48f5bdc3f16162b9281,2024-12-06T15:15:08.550000 +CVE-2024-42195,0,1,c65de58c728753f86038d98c371fbbe3457add02821d0b6bcc2d79ecc064624f,2024-12-05T05:15:06.923000 +CVE-2024-42196,0,1,be6df038fe28ac3b84eb7ac5a27a96dcbbf00f988a24aa0c1f489d84fc2ea21a,2024-12-06T15:15:08.550000 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 CVE-2024-42207,0,0,7999bd374d3d2e00ca96b064d6050023c869b6b304031749819fd6f354ea6a70,2025-02-05T16:15:40.447000 CVE-2024-42208,0,0,7279db8edf90469f45fbe58ad50ae0f2729b6abb33262abb49e045282c050905,2025-04-07T14:18:15.560000 @@ -266243,7 +266243,7 @@ CVE-2024-42260,0,0,eb52125b7ac8aa328b971df28fae3672970357ac79f1958c3b76d2a4939b7 CVE-2024-42261,0,0,72fe870a41ca864453ed4788fd4a91439d6c4b246a2a5f09a56b04af1e7ecbf8,2024-08-19T12:59:59.177000 CVE-2024-42262,0,0,7f3d17e5526185f5375daae7ba422211b70f3364ede237c89feab9ff5e43cedf,2024-08-19T20:05:15.407000 CVE-2024-42263,0,0,3493b915ba1505678529c159f5fa9faa50bc66ec51cc9c94e8dae616046ad302,2024-08-19T20:41:11.240000 -CVE-2024-42264,0,0,f060ad1973e599389a139a6b38b5d92d9ecb7b747d226b0eb5c0aecbcb614f00,2025-03-06T12:54:05.200000 +CVE-2024-42264,0,1,4faab09cac0ef9ad58fb647e41e87fb6880f08ea17fde5998917382f2aef3ad1,2025-03-06T12:54:05.200000 CVE-2024-42265,0,0,dc9a1e67a9f4810f2841027c6483efefd3f1789eb7007a2fd693f56892bd11a5,2024-08-19T12:59:59.177000 CVE-2024-42266,0,0,e3773d6d9416557898775f8e251bb3caface8cb0ca7f14ef02f46bb386d50723,2024-08-19T12:59:59.177000 CVE-2024-42267,0,0,881474d04f014e3df273462be8ded36c9d57a485e542f49fb9e4732784ec7797,2024-08-19T12:59:59.177000 @@ -266309,7 +266309,7 @@ CVE-2024-42320,0,0,87317ab2141acd008e043c8eaa6dab96445c25e2aa2979d6ebc74ae4a136b CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 CVE-2024-42322,0,0,495402050de521e98ba39d6c1520ade554f104240349031b37bf9bd3aa4c94f7,2024-12-02T08:15:06.753000 CVE-2024-42323,0,0,656daa24883f524773394b4822795b2daaab62af8324d74a7a92c39f4885162c,2024-11-21T09:33:52.577000 -CVE-2024-42325,0,0,6b82c23e8dff7a998717f6b274c3a8b6137b22bd816598c2ea4bdbac4260e8f4,2025-04-02T14:58:07.527000 +CVE-2024-42325,0,1,71f56139300c7dc747a387bfc0e3e683d8e392aa841c113f4fae8f2a1ef68b8f,2025-04-02T14:58:07.527000 CVE-2024-42326,0,0,21fb704aa8898ae64cf89b4e966f1eaadb9ba109923e781dfb4c8f173a19aef3,2024-11-27T12:15:20.520000 CVE-2024-42327,0,0,63ae67200fbea60df25fedcb431e17f408dbf52b0f0e22acc1c30d738390d4c9,2024-11-27T12:15:20.640000 CVE-2024-42328,0,0,d5b3a09ea19b25729fe779b1e2d71d336851fba26408a3cd4180861a13be7af8,2024-11-27T12:15:20.757000 @@ -266425,7 +266425,7 @@ CVE-2024-42440,0,0,e21d9b776ef80bd04d695f0a47e516545028ac8225f143837019c4c0b08b7 CVE-2024-42441,0,0,04cb6e9a13f27c86bb2051d7eae465da3e0fd75a34af891d94c6ed0cb275f3f5,2024-08-28T23:58:06.960000 CVE-2024-42442,0,0,c95b9702729f1aa9eb8ceba5f94968c5cfabdca93c030d049ba8bcc0788889f5,2024-11-12T15:48:59.103000 CVE-2024-42444,0,0,9c10c1c787216d53ad642f4276dcecfc578d8b3c31bd900159c9e2c546a3099a,2025-01-14T15:15:25.997000 -CVE-2024-42447,0,0,843ec3fa73afb4902485a61b2fa099bd531dead989f89cee9abc86af2f033419,2025-03-19T15:15:49.917000 +CVE-2024-42447,0,1,ec5028ca9c2877d724d58cd2657776d064c01b5e53d51b90e7da16171d64fb63,2025-03-19T15:15:49.917000 CVE-2024-42448,0,0,b2ac39b31ded9216cdbe436ad867b986a202acfcc6e34d426fd4cbd2727261bf,2024-12-12T15:15:14.230000 CVE-2024-42449,0,0,a09d477f9191a243dd0b7eb184529e19171d31e1535b84282591f537d6708169,2025-03-13T15:15:47.283000 CVE-2024-4245,0,0,be3a6e7e50f89039b3f92716fad77dfc4646bdeb99ea52a5e8d78cc79838f227,2025-01-27T18:28:31.410000 @@ -266789,7 +266789,7 @@ CVE-2024-43040,0,0,24c7fc00bcabba765361dc058df000d90f1495a06d1cc7d23caabc1efe8ac CVE-2024-43042,0,0,7a4652f9042c3f41111ed646c3bc80b0acd0b77a5c21df60dcb23d137df071e0,2025-03-19T21:15:36.690000 CVE-2024-43044,0,0,c4209c28206f9930924ad89b590b0214e2b8c592601a3113522972c0c3512431,2025-03-14T20:15:13.470000 CVE-2024-43045,0,0,e1d9d7cac2404f2fa69e6a0d5951f7e836ae37782e145990d14492651417b2da,2025-03-25T17:16:05.413000 -CVE-2024-43046,0,0,7b32888bb7386e69eeac8ab09bb0a7e08649c9d168806b4b1213e477ae218627,2025-04-07T14:17:50.220000 +CVE-2024-43046,0,1,e7e7db6cb7ab2c1b699f2cc62f1fb89ec6ab63b83737c6ecc3c049112295cdab,2025-04-07T14:17:50.220000 CVE-2024-43047,0,0,2c5673a0391a31abbf47c1d000c3d121e6564230b66ed0524b815e5850f22723,2024-10-09T14:39:06.540000 CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be659,2024-12-12T15:27:48.080000 CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000 @@ -266801,7 +266801,7 @@ CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a CVE-2024-43055,0,0,7e68211c963d2ff760c24658730a611fc46626d88b11ffcade7ed8bb42df2da0,2025-03-06T21:10:26.277000 CVE-2024-43056,0,0,c709d99a9c57195719219014d58cf5e642c2b7965166d3a5f70846b24eb1e019,2025-03-06T17:45:19.570000 CVE-2024-43057,0,0,5538ac0e54d78c3c5f43cc7d8d3e67e9f64cfefd871834bfb39f91c51faf6afc,2025-03-06T17:45:06.040000 -CVE-2024-43058,0,0,644201085716c501eca08532e44edc879c887cb3354962f26642c93e8dd38c71,2025-04-07T14:17:50.220000 +CVE-2024-43058,0,1,82a958051db1dda8e11994111f0b16358a7bd6bcf7bf88f2c9bebb2045ab8b9d,2025-04-07T14:17:50.220000 CVE-2024-43059,0,0,d22b29979bbbb30378d68440ca3150b1ca88ccf70d8d61f49a1a1b7c0bcabc6c,2025-03-06T17:44:58.433000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 CVE-2024-43060,0,0,e41eb30c9c993454ca734a3f293648983ebcd9ebaa7031f549a74814e1ef3eef,2025-03-06T17:44:50.600000 @@ -266809,9 +266809,9 @@ CVE-2024-43061,0,0,fb182e78e0995c70b127000883dbbc7ed4ab09a8eb85c1eb852bc4e1d3c9a CVE-2024-43062,0,0,36f03b47d147510dd25f7b8f8bf05b284295e8006754a49f54a555f3c2ad2fa0,2025-03-06T17:44:32.433000 CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000 CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000 -CVE-2024-43065,0,0,6e17952ec54980291ad3284edb9ee048829d866b5bfc258fa4df5c9d38e3117f,2025-04-07T14:17:50.220000 -CVE-2024-43066,0,0,d63aa12775a78def8589a97faf1e9fa6a07c367daeb8a3b478796a487b002b32,2025-04-07T14:17:50.220000 -CVE-2024-43067,0,0,23b972f338c0ae7497e1c68fdd4d9a343c2e19f01a7ccd4b34c51bb1a8f6f8d6,2025-04-07T14:17:50.220000 +CVE-2024-43065,0,1,731729fdcbbf194b12dda9c8cbe0f48707ec0ea86cc2f41e497ad742ebf79874,2025-04-07T14:17:50.220000 +CVE-2024-43066,0,1,700ed28f629389d8245a70adef8ceeafad813e06595d9a6076534a3cf3963230,2025-04-07T14:17:50.220000 +CVE-2024-43067,0,1,7717dd2ac1f847b09590952644369ae9463d12cae889a80b7e5782a6c3d58722,2025-04-07T14:17:50.220000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000 @@ -266920,7 +266920,7 @@ CVE-2024-43196,0,0,28690c662f8f211bbcd40514363aadaa12a39094a3c559cb1e0c49f1d6ad4 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 -CVE-2024-43202,0,0,0306e27fa0f5d2471ca52d2752524c42228085c0227d9635d8c9c20b8e214708,2025-03-18T15:57:37.460000 +CVE-2024-43202,0,1,3aad16a3d06709dc20c7712b71cba8a56931c4fd655b2ecc6c2ea5b7b8be8554,2025-03-18T15:57:37.460000 CVE-2024-43207,0,0,99a8fcaea9f2d7bca6bcde4834954a187c4e78154a0eef48c8515243d2e23912,2024-08-19T12:59:59.177000 CVE-2024-43208,0,0,6ef73e79f1a23655911b75f5e499093305eae324ee0b651606b8f67181713805,2024-11-01T20:24:53.730000 CVE-2024-43209,0,0,13afd83d8f5f709b4e8cdda05cb0b2f4c1178a58cc15194cfbdf53d99012ba4b,2024-11-01T20:24:53.730000 @@ -267053,11 +267053,11 @@ CVE-2024-43324,0,0,d5b4635684ae2bc25e4bbed12b4f41ce303d665bd646f5460f92aa12c5404 CVE-2024-43325,0,0,6f5f6b04ad04f0cda7b11a88cc5b76b5cc7af28264f940de1984d88e498bfc7f,2024-09-12T21:28:20.137000 CVE-2024-43326,0,0,446246555cc6c5649b053b5746bcc08658e93d2ec2c0ceb74828c0014a091d22,2024-08-20T15:44:20.567000 CVE-2024-43327,0,0,ce3c2152e49d6d960b5db133d9e6e912c18bf5bc04bfe0dbb5da4ff9a0e0f5ac,2024-09-18T17:07:45.553000 -CVE-2024-43328,0,0,96d3dac02771bdd5ac8e9dd419cee11008a62230318a56bbe9c51ea584a4aafc,2024-08-20T15:44:20.567000 +CVE-2024-43328,0,1,2c04907d2c2308c0bfb0cd503bdb95e8024be4452ca1119ba961ef9793262aa3,2025-04-05T00:30:50.010000 CVE-2024-43329,0,0,6571774f6c8fd88f0784ff8e7d9379cdf66afc8a05fddf684b6376b6fec0ffc6,2024-09-17T19:59:39.933000 CVE-2024-4333,0,0,a6d205ba44ee948927cff870ebfc2f44376bba94d7e4b38fca4189220fb96013,2025-02-04T16:23:41.580000 CVE-2024-43330,0,0,de1e029e710a50a8fdcf88e35914bcd709af0e53818ad280b1212ae996b49ab1,2024-09-17T19:53:40.987000 -CVE-2024-43331,0,0,dc80f09f27c8298c5b61115b014613f6fccd8e6eb8f20e163102b90c375c7206,2025-03-19T18:52:24.573000 +CVE-2024-43331,0,1,025664322110c0c027d99cd84710e694013a5a44ce0687284a3850fe3e9da36e,2025-03-19T18:52:24.573000 CVE-2024-43332,0,0,f167203969591a662d9eb35fd96489f40bda598ba4d24753bb004adb26d22093,2024-11-13T01:25:08.657000 CVE-2024-43333,0,0,fa6b02dae1883de1fb148b98324c0e9a99a1742032b0f262d9477cb0c1c7f458,2025-02-03T15:15:17.207000 CVE-2024-43335,0,0,c1f646d4628edb84bd6ad7ba250c6419e109e4d8bcd82ce3fac5dd3b0e24a156,2024-09-13T14:25:12.027000 @@ -267708,7 +267708,7 @@ CVE-2024-43980,0,0,38cff8fad22f548993867b2a34979c97f748fc454cf1ec8469969cc4aafdd CVE-2024-43981,0,0,149f7c0df031c66ffe9eb383b9d0158cf6af072534c3e4e4ce862aff4073db50,2024-11-08T21:10:35.093000 CVE-2024-43982,0,0,bf6178861ad98b98ffdcd5288376583212890782d89da1cbac27c286f03aeb67,2024-11-08T21:11:11.747000 CVE-2024-43983,0,0,964361a960b10f60f361219123c1c7e25d2a245e60c52ff9a7ef2d0262bd7a9c,2024-09-25T14:11:22.450000 -CVE-2024-43984,0,0,25998b48dbeb9f7e2c1a9ed5cf5183dcaa785dc791c564b22a79c376312e3eeb,2025-03-19T17:13:49.970000 +CVE-2024-43984,0,1,adc6dc65111f9627b481b022b5b8dcc038735414d6879e68cd505820a55100d4,2025-03-19T17:13:49.970000 CVE-2024-43985,0,0,f13a84c56ae01192cdf5506e89e0d9a2df7f801fd1391e74e0667132f9d3de8b,2024-09-24T19:33:16.910000 CVE-2024-43986,0,0,9cde2290e443f99b4e6d3d02e29a56a6e3f00448aa6423a4e53958d9425e074c,2024-10-04T13:22:56.253000 CVE-2024-43987,0,0,7e1894972e500e67d2cbb462582eff330f8d5373d9c5f8da83a513a5d5922fed,2024-09-25T14:08:22.987000 @@ -268054,8 +268054,8 @@ CVE-2024-44411,0,0,8fd5fe7aefec485ddb780eb5069c8ce23d4369f7df235e556eaba490480c9 CVE-2024-44413,0,0,1c7331724e1069528ea71c914e597a80f9fee01b1f49db10e059a4f381495403,2024-10-15T21:35:28.267000 CVE-2024-44414,0,0,dc7d65251b691aa26fb8772136cea972c688c2155fdee90c6b03421b6c48346a,2024-10-15T12:57:46.880000 CVE-2024-44415,0,0,c95e4fe9c4cbb98c419c230ec020cce90c8d211b357893d315b155eb63f177d3,2024-10-15T21:35:29.017000 -CVE-2024-4442,0,0,844d8a9e1a5332f1ad3d82aef05b898fff95bdcb7b0afea7ea7412d62890853e,2024-11-21T09:42:50.383000 -CVE-2024-4443,0,0,9f5ae4b42b014a184dfd312fa3b54f5f9b3875281cc192800531f7d29bdd308b,2025-03-21T17:58:40.147000 +CVE-2024-4442,0,1,518097a60171314df73792bee8db504db6452f95665f5ca1270baba7099ec600,2024-11-21T09:42:50.383000 +CVE-2024-4443,0,1,76a3e5cef0eeddb17199177000f450a4fe754e45b11118cbf98d6832e3b87631,2025-03-21T17:58:40.147000 CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512dd8,2024-09-19T01:38:06.317000 CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000 CVE-2024-4444,0,0,39fa2450f325301ad817fc86319bbebd1813f8dd3cf2b80a01c74cecff95e276,2025-01-14T21:40:27.670000 @@ -268080,7 +268080,7 @@ CVE-2024-44541,0,0,360d36038a09153826fdb7f75c9d2e58a990ae541d7e417f9aef6615b41fd CVE-2024-44542,0,0,69649467d837964ae89a10ea879537e85831463615e76c2141ca248d248803a6,2024-09-20T12:30:17.483000 CVE-2024-44546,0,0,e2c66d94fd13e792ad683596bcac74d7412b12faf579386ee0b995b81a04d1c6,2024-11-19T20:35:24.240000 CVE-2024-44549,0,0,a5aaecd9ba75cc32cf841f25e868951de8e2b2b047d881486d13d5755c1993c4,2024-08-27T14:28:55.157000 -CVE-2024-4455,0,0,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000 +CVE-2024-4455,0,1,86fb5ac865589bd6dbf1b2f040499164e25192c3199bbf5250acc72b40c8d8cd,2025-04-04T23:49:13.973000 CVE-2024-44550,0,0,6e5e7c90073553915c6cbf84e10c6c9591a0626baa58af3865b7686a30be241b,2024-08-27T14:29:02.370000 CVE-2024-44551,0,0,491acb9f04edacb91a77c381669fbbb0354d22a271035ec891cb7e6dae2aedd9,2025-03-26T21:15:22.887000 CVE-2024-44552,0,0,a087d6467b3cb42f42c6e6b84dd6f027e5da09823e0cbf8267d22b995bc21428,2025-03-18T20:15:23.460000 @@ -268372,7 +268372,7 @@ CVE-2024-4506,0,0,228a4a465a028398b0941f6b4789f16630aaa2541ecec409f49ce1e1c4b4b8 CVE-2024-45060,0,0,fdf3192e213f43713fe94dd4f660c140c402b48e19c6be5f44cc86908a9d0e81,2024-10-17T14:14:11.230000 CVE-2024-45061,0,0,05b1c7309f8ac21a996408c3f436219993810ef39c6cdbea2d2923f33822314f,2025-01-15T17:15:15.113000 CVE-2024-45063,0,0,1409a1792fb044d0180db60765e18242d949607976f55c38d4cb7d3b87690fec,2024-09-06T17:35:18.370000 -CVE-2024-45064,0,0,2c86a5093de9ad74bbdc334778858d8767f56ca416c4f9359333a2f0939174e2,2025-04-02T22:15:17.837000 +CVE-2024-45064,0,1,f9743d959694386bb54450caed4c891cbc8d8760238efdc92821b602741223ec,2025-04-02T22:15:17.837000 CVE-2024-45066,0,0,d33701ba745edbfb429176564dad3e868c8fa86bb8965e021d0d157e59195ffa,2024-10-01T16:18:10.680000 CVE-2024-45068,0,0,c8edc7e1dd2efd4150730702fd7fc207bb2cdcb6fa3089f6d2a2ca2cb86ca5f7,2024-12-03T03:15:04.953000 CVE-2024-4507,0,0,0cce0099e9b56e6c38adf32141097ae968c74e9462bd520a29ad2d370b497aec,2024-11-21T09:42:58.820000 @@ -268688,16 +268688,16 @@ CVE-2024-45413,0,0,97b5271a249aecdac1531eb5157c85a5f824b705455cfa2b1a660706fe101 CVE-2024-45414,0,0,254358147ceadb1c2a4f90200d9c3b24659f014da45263ea141552de5c6691ce,2024-09-20T12:31:20.110000 CVE-2024-45415,0,0,d83394ff1f05f84e069e60652d41ee778a43f03cca8284d8609c990371d96646,2024-09-20T12:31:20.110000 CVE-2024-45416,0,0,56fbbfc6dd3fbd26ecb2734f984767a580adba040688fa0a1ad6dd44c8338b07,2024-09-20T12:31:20.110000 -CVE-2024-45417,0,0,9cdd524c307068e51df0c27b3bc5b99b0f2fc3adc30b2a8447b252bdd3567524,2025-03-04T17:36:57.857000 -CVE-2024-45418,0,0,514a7c73b6dc19b975d1baa900b123b863b7bbdeb4d816b37563077d22a4c41d,2025-03-04T17:36:43.377000 +CVE-2024-45417,0,1,a43a65c3297681edb8e59b5ee32d27f5f7fb1bf1646f984c35a8de96dff8ae05,2025-03-04T17:36:57.857000 +CVE-2024-45418,0,1,402861645847cce028aa527a6f8bb3dd4c2529c5a3bc3c8f79f6ef8c74f04115,2025-03-04T17:36:43.377000 CVE-2024-45419,0,0,e29987400dc7a70a46eaa15282ddd07daa810db0126cea2d64216241ae00d0c5,2024-11-19T21:56:45.533000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45420,0,0,03f4264734f64936227955b0cd7295bf6ba9995138d84e0a2d97323a06156f95,2024-11-19T21:56:45.533000 -CVE-2024-45421,0,0,b505b785304c7acccd7af4289092b3a3ed1396cbd95cf2285335c4bdff086521,2025-03-05T13:53:35.033000 +CVE-2024-45421,0,1,d54ab91c06dbf75abb388705020f6edd247337050f05114fd25d945e55d06074,2025-03-05T13:53:35.033000 CVE-2024-45422,0,0,852733e0a4a28635312204f04762ccb7170e0a34bd9b9b76b76475e8b074cc76,2024-11-19T21:56:45.533000 -CVE-2024-45424,0,0,f56d75719a86c5649f65fed4bd4533ac8bb4c377dd0b1d758aefe99894f53ca3,2025-03-05T13:53:53.100000 -CVE-2024-45425,0,0,ba0fa47ee1c4fb76b3e3b51f3250a344ef1c564f741d407c38206d4d7f8a239d,2025-03-05T13:54:29.030000 -CVE-2024-45426,0,0,6e7187a7a32d7795a5907473fa02f6dccfbc4baab0e62e42008a33324a52234e,2025-03-04T20:43:35.193000 +CVE-2024-45424,0,1,686b7176158c8053a99fd0c6f90902dc2c73ed86afafc5a0974d95506a7f092c,2025-03-05T13:53:53.100000 +CVE-2024-45425,0,1,66d24feef50b3b58fb10f9a7dd9b14995a91ad6e454f6a9b8b0399a448804565,2025-03-05T13:54:29.030000 +CVE-2024-45426,0,1,2a604ae05989fe8e80fb54bbe41161d651e7a314a24f5f4ba4d29a33f466a363,2025-03-04T20:43:35.193000 CVE-2024-45429,0,0,659f5eeaff797d5d8b9ce505e008f26182cc41e4e0aaee5fad90f1432b744096,2025-03-25T16:15:24.393000 CVE-2024-4543,0,0,9bce683dcafed21194de784f36310cf5dc5033963875cc73daa2b50b23cbbe10,2024-11-21T09:43:04.340000 CVE-2024-45435,0,0,37f0d591070e12a5a02e0dabd27d209725a2e9e84d47f1671760e29b19f30212,2024-09-03T17:23:36.073000 @@ -268790,23 +268790,23 @@ CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0c CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 -CVE-2024-45540,0,0,b2a4580e07cff805802343c99c0aeba0eb17785b4de0c138efc21f9fad6c130d,2025-04-07T14:17:50.220000 +CVE-2024-45540,0,1,b09b110705666bc4bf8ce9d57dae2d179c3d6f14a2634a5e488ce288cb66f365,2025-04-07T14:17:50.220000 CVE-2024-45541,0,0,7bc24c44f4f9bd7697d862f7d910f24b6bebcc62d1e5328093c22ff5b5ee1516,2025-01-13T21:50:41.947000 CVE-2024-45542,0,0,544927305ba1aba828ea865286fa34c1bb838eb7cbfd7cf386021b4578f770cc,2025-01-13T21:50:54.197000 -CVE-2024-45543,0,0,966d5514fdb1815a4a2f8ab985f2e68086dbb27b52ee777bc965d0e7e89c05d3,2025-04-07T14:17:50.220000 -CVE-2024-45544,0,0,1520d8f575ac7cb7cca951dbf1dd3201ae89270acd1a5b903910ddc49e41b6e5,2025-04-07T14:17:50.220000 +CVE-2024-45543,0,1,11ddde7a0350379f159feab8ab0738d3bba121cd26c3b1f435e79327445555f6,2025-04-07T14:17:50.220000 +CVE-2024-45544,0,1,b9b8ebc33873015e55a1459cf6e1117a5a07788b6209be120eaf7637220757ae,2025-04-07T14:17:50.220000 CVE-2024-45546,0,0,45d0e78965279e2527d9fac31d804a2ad5a6404ea1571336157308334b299190,2025-01-13T21:50:47.413000 CVE-2024-45547,0,0,5d512f519ac50af5c2d2303fdbfb1d0aab0102e735aa75e851d06b0043ee4734,2025-01-13T21:51:01.123000 CVE-2024-45548,0,0,1ab6b9cb5f94b9efb2c033a1ed336c76093923588ef73962d79be6376d1d64da,2025-01-13T21:51:07.337000 -CVE-2024-45549,0,0,f69f41d787e856b98ab130d9898acd4c44b214c116414181c4483ffb1605f149,2025-04-07T14:17:50.220000 +CVE-2024-45549,0,1,c887d79820f26aada74aa2a54ebda29691aba6b5fdae401f0aed86917327603b,2025-04-07T14:17:50.220000 CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000 CVE-2024-45550,0,0,a4972bc0de06d20bcb20a737d9e8c081db8380caa2905028e2db10cf8468771f,2025-01-13T21:51:13.887000 -CVE-2024-45551,0,0,a52906a951c4500fec51c0edd616d29eb1e89623b3cdf18ba7999520548f4c30,2025-04-07T14:17:50.220000 -CVE-2024-45552,0,0,bee350fb1d5927b974324d7b581e598abf3e0bc34d51939ae4b464a030908f62,2025-04-07T14:17:50.220000 +CVE-2024-45551,0,1,4c9f9f617116040a5c03d17da647ad51a06c0a21cbb271b3e6f5a408e2910dc5,2025-04-07T14:17:50.220000 +CVE-2024-45552,0,1,9a86282173927dec25d70163a3d33de1d4eeddc25463e3f09242160885829f6e,2025-04-07T14:17:50.220000 CVE-2024-45553,0,0,7fc1115fcc4cbae9ef381abdf5e17528d41d4f9e9e105e72ca41b105ea39f881,2025-01-13T21:51:19.557000 CVE-2024-45555,0,0,37d9964aa5a5598b86f51c3b20f7264cb39cb234f7fce44f158d3bfa241e58c9,2025-01-13T21:51:26.350000 -CVE-2024-45556,0,0,b73d704e8dcbbe1f4399c91b7315ccb878a8c64e843ac7f44d0384a6494d1678,2025-04-07T14:17:50.220000 -CVE-2024-45557,0,0,d442f5176422bc2bc91b011af0b6da6c26dec6102120a7253d446a78c81e267d,2025-04-07T14:17:50.220000 +CVE-2024-45556,0,1,618ff9780b9eeaadff25ebe18b6a8472acb420c9b46823514fa4369b3bea407f,2025-04-07T14:17:50.220000 +CVE-2024-45557,0,1,a6043cf12ea9212eb443e38662a6d7e81f03e2f6473877693499f79a4603d604,2025-04-07T14:17:50.220000 CVE-2024-45558,0,0,b9999ea78a1f11bf4fc1fe70871249484c10ee1e56b900705f3a520779ba736c,2025-01-13T21:26:05.320000 CVE-2024-45559,0,0,cc245f066c5b0f42456e436b7037643fb918a30c87be08fac8ad402ca0ee763c,2025-01-13T21:26:24.027000 CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000 @@ -268884,7 +268884,7 @@ CVE-2024-45659,0,0,0895159fe44731498b416385a0a001615f3ff6fe1f25bbc34c263b64f34b8 CVE-2024-4566,0,0,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000 CVE-2024-45662,0,0,42e3213cdd9e0313fa4ca25aac2349a283b3056fe3b2b35deed0feef55505b61,2025-01-18T17:15:07.343000 CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000 -CVE-2024-4567,0,0,76caadaf49bc92c6b77868d6f4dcc6ff7c004a9f227c657b19f4832be4529fbe,2025-03-07T12:37:30.023000 +CVE-2024-4567,0,1,f9422c43c79efa82ea99c9dec60f6662a26312cd8fd4cf90d580aef590f63be3,2025-03-07T12:37:30.023000 CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000 CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000 CVE-2024-45673,0,0,e9142b96a11c2da6e8935b8ba85a49a6d6d905f4935db71884bc83f6e6ed47da,2025-02-21T18:15:18.163000 @@ -268906,9 +268906,9 @@ CVE-2024-45695,0,0,3eabe527fec52db857863f7f086e48dab3d6d2c9664782af646b17557768b CVE-2024-45696,0,0,6982b31d1be22ba5acdc84f62e0688ab65eb7862c34376e493af80a8e67477d7,2024-09-19T21:42:36.557000 CVE-2024-45697,0,0,4d6013ece75c89c7ebd7f548b03f6b65c319f5b222f7e0a175968746ef6bbc5e,2024-09-19T21:40:37.357000 CVE-2024-45698,0,0,316175bc8d87c54751e5f830d0c89fc0b0fa33ece0352e2604bf4d6f48f9ed4f,2024-10-15T10:15:02.853000 -CVE-2024-45699,0,0,e741ef250b7672534e30d2bd7c8e4f52a545708b6b3a76c517bc8881e6525a52,2025-04-02T14:58:07.527000 +CVE-2024-45699,0,1,eb8d8f921c8cf3b6194fc77de938eabdddf332f1d4ca4962d4384b02c213d5b3,2025-04-02T14:58:07.527000 CVE-2024-4570,0,0,c1a5258b7eebc866c0c77ceb5f7502c7f3d128f87f2b93b98d2ddb7dd60e07a5,2024-11-21T09:43:07.933000 -CVE-2024-45700,0,0,7a41a3b3f8c8047bc79399a63aaa04c22f7e66bfca0c237f74c92ae92336bafa,2025-04-02T14:58:07.527000 +CVE-2024-45700,0,1,a3fbb577109d60fcf11dada7ac554f09a8aa53ed07ca01357d8ee36c6fc39331,2025-04-02T14:58:07.527000 CVE-2024-45709,0,0,a0d4e56bb263bc9e47877f3006692003a99a930acd527517129f8ee5e89f2201,2025-02-25T17:20:37.920000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-45710,0,0,d5d20bd0fdb7865f82e5f4b909a4d875dc5f3d77d52392f9ffe78a5294c66c14,2024-10-17T20:18:04.277000 @@ -268990,7 +268990,7 @@ CVE-2024-45795,0,0,0ace2888340c95d52caf74b29da506737cbb10ad50f261e4feba8a7246194 CVE-2024-45796,0,0,01c9127a9e7d6e535a3a930242bf9f9d5c2a1cbeadfdf8175a5c8fb0bb4be623,2024-10-22T13:37:57.930000 CVE-2024-45797,0,0,c0e1be6347abac425449f47676a763a975c106d59a62f40b03ce1e77538a7791,2024-10-18T12:53:04.627000 CVE-2024-45798,0,0,fea99c7cbe4f7358cc9928c55c589558529479320a58488f1851b8bf163d2d3d,2024-09-20T12:30:51.220000 -CVE-2024-45799,0,0,15c27e3f1b5eee87a6dc0045a3ae6645ebac308bcb0de61cf8ecdd2647231c30,2025-02-28T15:29:12.560000 +CVE-2024-45799,0,1,3b9760a6702f25328463b0883b5aea4028cfd06df24911e02b9b057825c1fdf7,2025-02-28T15:29:12.560000 CVE-2024-4580,0,0,df067ac1e886d8dc479c776ad840ff90bab8aa03d23a01baeb5e01d13144d370,2025-01-30T15:55:44.283000 CVE-2024-45800,0,0,4167c45d50337de65fd2604084d1d9f0801e36db06bae66cff5994f6ce8e5eaa,2024-09-20T12:31:20.110000 CVE-2024-45801,0,0,7bd2125c176a54840b4a07da0d08e9005539420f0eaa027e673835a41ea39c26,2024-09-20T12:31:20.110000 @@ -269391,7 +269391,7 @@ CVE-2024-46668,0,0,92978c4aa13b62f29de9eb65197784fc4f6bdd9165d1d91b822132ada935f CVE-2024-46669,0,0,556fb44d48a2d1617893e813f90d3344679c0b14f9451ea92282d16149a97525,2025-01-31T16:11:27.577000 CVE-2024-4667,0,0,0ba4feb9061227f326b9f44983ec481dee587f64e4899bf77e538f69f9f74063,2024-11-21T09:43:20.190000 CVE-2024-46670,0,0,75ccf01e37b9b8c5ff22f079d1f2a636cf187d1c3561208c729c3716dba92382,2025-01-31T16:12:16.597000 -CVE-2024-46671,0,0,5e1cee334b25c60e4a67d6d7d0432030917c8b2235a22699797aeb5c7d225b87,2025-04-08T18:13:53.347000 +CVE-2024-46671,0,1,14cf29c4f4b12fc177d66e200c5621bb7bb93b5b38ee369d3229275409dae76f,2025-04-08T18:13:53.347000 CVE-2024-46672,0,0,bc507e64d04ea5640093bd9a3ca6fe7f0c7a71643b79e70f9ab8ae27db60ca75,2024-09-13T16:29:17.123000 CVE-2024-46673,0,0,3f51c09e700b38d12ae33fe015bc01f6f75ee9c1181458b7ce2541d901e5897e,2024-09-13T16:51:39.117000 CVE-2024-46674,0,0,658c5615ef5104d2b41abc83d32329287f71abd731b08493051a521ab04d6ebc,2024-09-13T16:51:45.103000 @@ -269502,7 +269502,7 @@ CVE-2024-46769,0,0,40643ddb474afdfedd905f2dbfc0be97258fd07b0c12401838e6e364e7aaa CVE-2024-4677,0,0,88c5586392ca332ee2daa8fdaa9b61610ee7b94334a672f1645bac5dd7960920,2025-02-19T18:06:26.043000 CVE-2024-46770,0,0,3f28505d665ed7d2a19c63b8d28261802b71417515044c3bbe4e51a66d26181f,2024-09-23T16:13:25.563000 CVE-2024-46771,0,0,edd9de48a6966046e6e9b6c2d3d272bef734ff444f550b1023dacf571ecaa1d8,2024-11-20T18:20:03.130000 -CVE-2024-46772,0,0,afcf8398bcb8b5d49420fe654ab10de5262316d2cfe3755e79da89b909086d39,2024-09-23T16:52:17.577000 +CVE-2024-46772,0,1,b2c6ed5053aa341269ac29fedbae440b943ba220fcede06edf01c3cddaf3d726,2025-04-07T09:15:15.800000 CVE-2024-46773,0,0,9cb44fe5397f6f84da684c8a0d3f69b229955bd83404f07dea2f1ec57ef48521,2024-09-23T16:51:59.983000 CVE-2024-46774,0,0,5616693bab5df14c3169a37ca0a9ef9486a44d834706dd8ad30ecf59471326be,2024-11-20T18:19:00.327000 CVE-2024-46775,0,0,dfe5d776fd445a63c4996e3d7df7495f59178368d527e55e62a9c064e9c37ae2,2024-11-20T18:17:13.750000 @@ -269808,7 +269808,7 @@ CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77 CVE-2024-47103,0,0,f2d938e35b4cd88b650fd9ebaf68a8a9213474b354e226db1e4a7eca8a26d434,2025-03-05T18:25:14.727000 CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000 -CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000 +CVE-2024-47107,0,1,83a68ca10aff101a96de3250c1131824959ac1049e7605a6db7f1c75f87fa7cd,2024-12-07T15:15:04.123000 CVE-2024-47109,0,0,3df70960f3fd8a2d18b204a885afcd8f024202ba7b8dc307176911f567b1bbe1,2025-03-10T16:15:12.703000 CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000 CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000 @@ -269900,9 +269900,9 @@ CVE-2024-4721,0,0,7b2e578af20701a97d300f5059b980c32dd72d226553c4eaa6bfe13653e629 CVE-2024-47210,0,0,7b078d282e49f2a1336ae546c0b723ff3d199712c9c99c4465d9098c519caa6a,2024-09-26T13:32:55.343000 CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b8899bf,2024-11-21T09:39:31.500000 CVE-2024-47212,0,0,3301d958588bd8d56cdd4439a0a32f1d49e101afc033519c8f5be640828b017f,2025-04-08T20:06:27.003000 -CVE-2024-47213,0,0,04b30dd06b47bd624c0ea92317eb571bb18e7eda14f9a4173d1f19a4597595f5,2025-04-07T14:18:34.453000 +CVE-2024-47213,0,1,f2e985d7ac3c7bee05e87303ca85cc92d4305f65960b8380c6e462d3b7e83a12,2025-04-07T14:18:34.453000 CVE-2024-47214,0,0,fdf63583cb8c718454aba155a2144e7a411e8ffb79f3de417801c77469d8b72d,2025-04-10T13:51:22.130000 -CVE-2024-47215,0,0,d058dd10bb1de131f6b594cf9eb61be90cf5dc89e729180c84d1d89902a748cd,2025-04-07T19:15:53.300000 +CVE-2024-47215,0,1,30e18cdb535f7988702867803257d9bf7bb524b67f46c8e44e9c62686082866c,2025-04-07T19:15:53.300000 CVE-2024-47217,0,0,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000 CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000 CVE-2024-47219,0,0,3cd8ebfcf52791de5daa3f0450c6087b29daca73e6af6b22502f8faf72bb6596,2025-03-14T17:15:47.760000 @@ -270475,7 +270475,7 @@ CVE-2024-47823,0,0,1f1502b27c7af525eff79f9c30dccf2bd02e9be220676107a53cfd7f6dd38 CVE-2024-47824,0,0,a6ed6f23ae40be69a679bf0b38da4a6a4364f56979ee1f794b9647e1e4c37eff,2024-11-21T17:15:17.650000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 CVE-2024-47826,0,0,c4f33e7bebd2379ead32307d8a6391982ffd919a32cfb4a5d9b964741d396101,2024-11-08T15:41:00.787000 -CVE-2024-47827,0,0,d3c16613487cd380de03335f1c8e5b08a0a4d0bf3e668170c381575f6a060fe9,2024-11-05T16:50:27.330000 +CVE-2024-47827,0,1,a20ea18e0bbfb29126cb4174dd742ea27ece0478611bf4731488979838584bad,2024-11-05T16:50:27.330000 CVE-2024-47828,0,0,f2c2241d50091646d8dc52a9b7faf3ab7da7e5424685ad1326bd33f9486f8035,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,05210fcf6766abfe9da77d691eaf27c7cb32d23d5c537f0a16a8aef37faa0dac,2024-11-21T09:43:36.243000 CVE-2024-47830,0,0,743064bf130fdd14a137794859b60609448751c54b54b84343bbf33a11303c27,2024-11-12T19:55:58.010000 @@ -270850,7 +270850,7 @@ CVE-2024-48535,0,0,f71df9b7b2cc7480171bcbf0923fcc76b3301321d152055ed2a3d65039697 CVE-2024-48536,0,0,ad1cabe4756bdd45e3d36c20554a63d5c7afc4d878e12201ede6e5b570703da5,2024-12-03T16:15:23.253000 CVE-2024-48538,0,0,1c4ede1f555d70e81f82d67ca8da54448ac67dab2f4859d97f5a35944265d174,2024-10-25T12:56:07.750000 CVE-2024-48539,0,0,b60642a89728d3bb4c7ddab0edfdc61403762655a4d2305eed48000f52ae111e,2024-10-25T12:56:07.750000 -CVE-2024-4854,0,0,4041adf5cfaee7afe4cdd293ddb0ac83b1957b671d520214da99e44b4b091e36,2024-11-21T09:43:44.263000 +CVE-2024-4854,0,1,e7a62a1c14b1ff2ad77c51c10da96b3aefcd3128b2d7307a0fe2aa570bd86ed5,2024-11-21T09:43:44.263000 CVE-2024-48540,0,0,77ffdef0c38f4a5937c9cffb5be81828296f07db32918f4ee6a918bc972d26cf,2024-10-25T16:35:11.093000 CVE-2024-48541,0,0,fa6f2da753c8a07210a0674569c82c071e4ff3a7652ae7c058f6e7995af3b55f,2024-10-25T12:56:07.750000 CVE-2024-48542,0,0,172e79becd42308c3a00604372eefce3d7a8b5d3a3b1bd59cb77e36720311801,2024-10-25T12:56:07.750000 @@ -270878,8 +270878,8 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,43edac6988670c251a3268565520d2147fd38eb2c203678751a12426c018f3e3,2025-03-25T17:50:50.723000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 -CVE-2024-48615,0,0,2e894bdb443d062f84624ffd4860fc111ca01158493b694f036fd0ec2ed1bc5d,2025-04-01T14:15:20.253000 -CVE-2024-4862,0,0,f2cdc4c8590cc224b89516a71786d6254cfba1f6171c0919e726c428cf5def93,2025-03-06T15:07:23.547000 +CVE-2024-48615,0,1,1de9726f8c1ee0935470aa1d7bd9789f15c010e787c2b1c50f20e210a88f7436,2025-04-01T14:15:20.253000 +CVE-2024-4862,0,1,453045c210f1e38f678a17fcd64bbd2bd8a94a5f813de99cce0e9769bd3007f0,2025-03-06T15:07:23.547000 CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000 CVE-2024-48624,0,0,b59b0332a99ebf3cde2350cd4a8321152317b6a93e251b6b8063e9f34ddc5f48,2024-10-16T16:38:43.170000 @@ -271035,7 +271035,7 @@ CVE-2024-48883,0,0,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90 CVE-2024-48884,0,0,5fd0bb45d4daca6fec84e3590a2c87e5a7fdfd8e521218f0c75f216ace5f8df1,2025-02-03T22:18:16.507000 CVE-2024-48885,0,0,f1a5e74246adb6d7bd8e325564baa4055ce18f2e80eed587565e5479d790b2f4,2025-02-03T21:11:41.750000 CVE-2024-48886,0,0,0c43c603ad0a80f9c21978b3b5043d329abd064d0a00462c64b3fb5285dce5fd,2025-02-03T22:16:04.733000 -CVE-2024-48887,0,0,c15c11634b56aa84a8dd870423efe5714ca743efc84dea9dea33cc9d6f7fadd5,2025-04-08T18:13:53.347000 +CVE-2024-48887,0,1,e5f36371957d4862dd374156d2fb4255b22ed5fa861b55573bbfed74b2aa7f25,2025-04-08T18:13:53.347000 CVE-2024-48889,0,0,b91146ff80af9e0a70e60d177059514309aa07d3d1ed7c0d2244bb40847957f1,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 CVE-2024-48890,0,0,e4c2ca148242c15d7451f4a3f4325a96e3aaa804db1c474d5b5964d77366de86,2025-02-03T22:13:42.850000 @@ -271431,7 +271431,7 @@ CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b CVE-2024-4936,0,0,65aabee0287633aa4e9b722904c429d1aa9ebdaddae4c2e6efd6328a98b01c23,2024-11-21T09:43:54.530000 CVE-2024-49360,0,0,2f416d472f9e1e4d8a2e89b815e30ec60b8a63378897a83d489ff8cd1e223e79,2024-11-29T18:15:09.307000 CVE-2024-49361,0,0,5c68e704b74611841c8fbae38a5cac59cbf1d64f57e6e089b8f58950a417a465,2024-10-21T17:10:22.857000 -CVE-2024-49362,0,0,cb41828f41cbfd9d94a37b10c52c4b8bc01b80ab1348277e88a46d81d0d466a8,2024-11-15T13:58:08.913000 +CVE-2024-49362,0,1,a2250856f638c62bcfc5b48da3d9182e714bda9aa3ac9243c33fe24087bfc57c,2024-11-15T13:58:08.913000 CVE-2024-49363,0,0,00c396e356a3ccfb42609ceffdd1d050b93f8d59c5f6b1feb3fffdb5ff3fae8a,2024-12-18T20:15:23.073000 CVE-2024-49366,0,0,fce76dfb2074699c434c110844725b5b8a135e34e57b5d5783c61b5329318085,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,ac627424ca9c2e09c2a9cb25bb1842cfc2c94c36b69a656744a4c01e163e5d71,2024-11-07T14:57:17.393000 @@ -271558,9 +271558,9 @@ CVE-2024-49559,0,0,f90e99fcfcd847f672ab154a15c60ecc3ca296cb460994670eb3d57ca173c CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000 CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000 CVE-2024-49561,0,0,1b32846a009c403b581ef70cd7919967c62d38ba68386993b5ed55b52ed1e315,2025-03-17T18:15:20.270000 -CVE-2024-49563,0,0,20d72379e90a82f6198fa96d9547c1f22c06b5ad1df48163d8e27303bcc719cd,2025-03-28T18:11:40.180000 -CVE-2024-49564,0,0,07f321521b5163a0368e5c33746f4a6203a3dec0e5e7166026f77b219fddfb37,2025-03-28T18:11:40.180000 -CVE-2024-49565,0,0,8f6d7cf46e37c64d904a0bb4122f4ab213ab513a87656e25cfb67ed7b6b2556a,2025-03-28T18:11:40.180000 +CVE-2024-49563,0,1,827ccbaea80bb5467dfc7289ca91a4d25f83cf30606ab4fec461139f2338b4eb,2025-03-28T18:11:40.180000 +CVE-2024-49564,0,1,8fb79c39b275f39082453aaf778c650f840e21c30d5bf7f5f4c7b0874de8c9d6,2025-03-28T18:11:40.180000 +CVE-2024-49565,0,1,86e9989132e287d257bb63a69e2b6ee4b796cbb5c943261cdbbee1512f302599,2025-03-28T18:11:40.180000 CVE-2024-49568,0,0,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000 CVE-2024-49569,0,0,b1379fd025e32fab88c21975ab9b6f766098726076e1ee1ddc484d172b3d093a,2025-01-11T13:15:23.840000 CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000 @@ -271583,7 +271583,7 @@ CVE-2024-49596,0,0,b7966d34c19feea70dac540d15635d0013692b6eb03f14dffb223315ddbf0 CVE-2024-49597,0,0,0f43b6a26ef992927181ec924f91412689184ed4ddb965d5c97b9a85a48751d8,2025-02-04T18:08:57.110000 CVE-2024-4960,0,0,ab992808fb9ee8848a3377965f63c287d94fe1a52846232bceac2f30716952e0,2024-11-21T09:43:57.130000 CVE-2024-49600,0,0,e76167604d13f2ebffa0b3a871c9ce4a992612d959351091d21477e455c1050e,2025-02-04T16:10:48.620000 -CVE-2024-49601,0,0,cccb2577371ae3b3023a00e66b6eafd547b4b144eea744dde7d78ea596a667c3,2025-03-28T18:11:40.180000 +CVE-2024-49601,0,1,57e5fbf97565427483aeaa04b5ef1117e54b8ac9d925f66112da316d76af8ad5,2025-03-28T18:11:40.180000 CVE-2024-49602,0,0,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000 CVE-2024-49603,0,0,a4bfea8d6205a36c6ccbfdcc6517bedb6fb1c64a34415f1f1c91481a5593a5b2,2025-01-09T15:46:25.277000 CVE-2024-49604,0,0,52d4bcd33cef053b3c621fc8feb1ba701ad78ff56ae956fe76566248ea674eb4,2024-10-23T15:49:25.567000 @@ -271688,7 +271688,7 @@ CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87df CVE-2024-49694,0,0,0d6f13ba9d257598e8b2ef9ba3d33dc447bfa87d7e595941924aca91bd604a70,2024-12-31T14:15:23.567000 CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000 CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000 -CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000 +CVE-2024-49697,0,1,41ede59895ad06a722b71180590650476fdc08e1ff7ea6107bd60ce35f7f9b98,2024-11-19T21:57:32.967000 CVE-2024-49698,0,0,0da674ff14e9a1aa3e4bc23d228b70f80e183926d4686276e19237b19658e09f,2024-12-31T14:15:23.697000 CVE-2024-49699,0,0,4ee8c413bed1ffd4b90762f39700b8d457afb872cbe86f74864072dd78b97b85,2025-01-21T14:15:08.780000 CVE-2024-4970,0,0,79daa602151eaacf2520b960e10e3437c5c7370ad2718a07f80b855f1b69edf7,2025-03-18T15:15:56.680000 @@ -271787,7 +271787,7 @@ CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67 CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000 CVE-2024-49840,0,0,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000 CVE-2024-49843,0,0,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000 -CVE-2024-49848,0,0,7ec420ddbd2b5fd6c0b49adef787d044de94ea61f4394701e7b0c2672221f594,2025-04-07T14:17:50.220000 +CVE-2024-49848,0,1,88db08c127c2a20b9a326462482044294e11bfc34c25e08f4e6d943d0efdc8a8,2025-04-07T14:17:50.220000 CVE-2024-49849,0,0,4c197046e42110980b5301c4c35d8eb0ed58e6313d8c00bfbed7bed4a77a071a,2024-12-10T14:30:44.780000 CVE-2024-4985,0,0,fc8c0365ee2b64c353c64b1a67bd27d7de7a0e1e77bbc681619c3fe31e9edf60,2024-11-21T09:44:00.330000 CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000 @@ -272012,7 +272012,7 @@ CVE-2024-50052,0,0,8e1166b11b73a0cbc906f464db8f67520364e38f19292f66596c205740cd9 CVE-2024-50053,0,0,6dfe22a4a684f5c9853b0f941790a991b76f792e8755d29d50bcf7e4ed874772,2025-03-27T13:10:43.443000 CVE-2024-50054,0,0,08baaf13bb0c7df4a1d400e49a73de2988f5185aee0ae70dc49353985a3374fa,2024-11-22T23:15:05.510000 CVE-2024-50055,0,0,9028163ae3316ad82ac4618afd3be3a51cc82bbdf53d38e6c862b63f5c1d1a6c,2025-03-13T13:15:41.767000 -CVE-2024-50056,0,0,6e1878ca857c7740064b6e0cea5e8f40f7e2214667bdf3941548e6206395176a,2024-11-20T20:18:00.460000 +CVE-2024-50056,0,1,59761e44577c1c023cb08654f7027825bb21056a2f5f860d7ee03fb6b9dd3521,2025-04-07T09:15:16.003000 CVE-2024-50057,0,0,a10cd6dc354a2d77e0013444b9b201aae6c588c2cfa818942a769dc0c20a4363,2024-10-24T16:12:52.007000 CVE-2024-50058,0,0,8f49ac4215c90d50a4d5f1ff80b2fe19d773607c840646a0312fb0c43fd7f59d,2024-11-08T16:15:45.117000 CVE-2024-50059,0,0,577529404fd9fa0a1d35a86ef576d85d5107fcc14193362298bd7157ce8a723a,2024-11-08T16:15:45.267000 @@ -272100,7 +272100,7 @@ CVE-2024-50133,0,0,13c1cd7465b48aa25814a39632f462a103df89235e5513a5a7e914dc44df9 CVE-2024-50134,0,0,9ae15a3bc3915addaa6551104a1be1fc1f749ce8c5d5ddc62c65af089812cd8f,2024-11-08T16:15:47.593000 CVE-2024-50135,0,0,b36b41e635c240a67d626d6fabefd228ad12084e77631ca7d5211634a4ae223d,2024-11-08T14:34:11.293000 CVE-2024-50136,0,0,a928bf3b3860f9a7fb4714193f4497f4769632c74698b515d62d54e2a331810b,2024-11-08T14:31:09.813000 -CVE-2024-50137,0,0,6212d9695544fdaba0478af45cb3639e0608fc200802f115e3783d5ee8219c08,2024-11-08T14:29:05.563000 +CVE-2024-50137,0,1,caebbd0f9055dcbf0b100406142500522443b8962e94b30543718583975548fe,2025-04-07T09:15:16.180000 CVE-2024-50138,0,0,6bb34775a83315c5bc7b92d2964f21b2403c5516756a8aef829995ed2b965119,2025-03-24T16:15:19.417000 CVE-2024-50139,0,0,fe84206a5f1cbb1e40b947675cb6edaab6f43e54c6ef7e5832132cfa708d36f2,2024-11-22T16:42:41.420000 CVE-2024-5014,0,0,458990e8d7c39137094d546c4996c02bb514819d01927763848433df296fc3c4,2024-11-21T09:46:47.063000 @@ -272364,8 +272364,8 @@ CVE-2024-50380,0,0,d4e11193f3f76d5180fce845278522bd8a63a21c96c16b2254e9955d09fc9 CVE-2024-50381,0,0,23b66c0a7e80cb6c3712b466f32400daa97e372a5c8ec65fc2a992d4a9e84030,2024-12-02T17:15:12.160000 CVE-2024-50382,0,0,2cfa180fa7d224151e21be0a844cd37583f94a12b921c730fa9877110a6887ec,2024-10-25T12:56:36.827000 CVE-2024-50383,0,0,4de5dd807ee67133ee2b2115c18d50902580ad7a7cde07b8a41a7c3d45d6f1f1,2024-10-25T12:56:36.827000 -CVE-2024-50384,0,0,bee59fa1e67e345ae6d38c63de4a6ef0aadd6fda625f2c327704a64a3d1ca214,2025-04-02T14:58:07.527000 -CVE-2024-50385,0,0,d6955a212d73b1d013e25e9d8369400d668e4ec2f5707f9344a11c334fa7a31f,2025-04-02T14:58:07.527000 +CVE-2024-50384,0,1,fa5d02818b737fabafe9666706899976e3beddd4e57cb7d5152b73220a838bf5,2025-04-02T14:58:07.527000 +CVE-2024-50385,0,1,360abc9247172b2bb304b7097f3e76de8fc4d5e7386b919c640c8bd475a510a8,2025-04-02T14:58:07.527000 CVE-2024-50386,0,0,1b56b3c9c8e815f158292f03da10278a7fc33945f7c029b4686c5ce361032d8b,2025-02-04T18:23:49.057000 CVE-2024-50387,0,0,acfec5d4d4cc80fa5f6348d5ec56946ae7c6740c84044c594d2169b0248e16f2,2024-12-06T17:15:09.247000 CVE-2024-50388,0,0,ceaae89a7584b9dc450bb8edc74105b925067d554de9f0a5040b1238d634d613,2024-12-06T17:15:09.373000 @@ -272407,7 +272407,7 @@ CVE-2024-50422,0,0,7c909eab3cac21ba2b8d7fd600c20415becbf7d7ee8870ab30293b309953b CVE-2024-50423,0,0,6184f82e37e4d6c23ee99095815cd15c692ef867b0d7e52e5fab6a6a9cd1faf7,2024-11-01T12:57:35.843000 CVE-2024-50424,0,0,fb56462fce075f88464c202b44787fcb83821e04ff228904d7e2b5e815aa56a7,2024-11-01T12:57:35.843000 CVE-2024-50425,0,0,19f399f9eda18844bb68fd59f45c3b5cc4c8725c800119a1aaace9b3395f9602,2024-11-01T12:57:35.843000 -CVE-2024-50426,0,0,98769a301248ad186b7e320e6f92bca25c0540eb506a791637c56998d13194d0,2024-10-29T14:34:04.427000 +CVE-2024-50426,0,1,c470a56e9a5278807c62cde38e8abe53d7451d155118189a7c87f17d2dd511d0,2024-10-29T14:34:04.427000 CVE-2024-50427,0,0,702031a1ed6dda9d16b78e1dd7ccc6e9fba388e64e08ea86e6b91ec53c1e826c,2024-10-29T14:34:04.427000 CVE-2024-50428,0,0,a7bf4206d763675b7c0e7c1bcd562757c71fc1e1898a0938c8a86729d3bd6772,2025-02-27T20:01:07.630000 CVE-2024-50429,0,0,d064b4b20809a127eaac94a65743379f8ff26580e984b69d0ba38477f38c7d2d,2024-10-29T14:34:50.257000 @@ -272552,7 +272552,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1 CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 -CVE-2024-50565,0,0,2b2f5bb21f497a05ec5d76ab171fcb473bd2be744dc1b4282672f94cfb71a45b,2025-04-08T18:13:53.347000 +CVE-2024-50565,0,1,0052767052bb2f202b3f6a2bb66a26d0a376b1c95ba46901bccf288399e729ed,2025-04-08T18:13:53.347000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 CVE-2024-50569,0,0,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 @@ -272580,10 +272580,10 @@ CVE-2024-50590,0,0,7ac2793bcaf79e1f1fa7bca2914647f7413ef012999877220f0e6304d12bb CVE-2024-50591,0,0,434506db9cfee6e105c4ee3b251a4f03ec7ee59d909550cd24747f433f058b51,2024-11-08T19:01:03.880000 CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0cec2,2024-11-08T19:01:03.880000 CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000 -CVE-2024-50594,0,0,ffa751618523ee28d72c7691722a770093fa8c1260c17549a8c2d3e47bcd4486,2025-04-02T14:58:07.527000 -CVE-2024-50595,0,0,18d5b49dc14afc3d88e25155540dbc46c9a0ae26ee70ee67ea7b78cfe1e74246,2025-04-02T14:58:07.527000 -CVE-2024-50596,0,0,a6a5bf2944df51a87c0080ce83da746ec8ca68f90440def6aa1a522797555cd9,2025-04-02T14:58:07.527000 -CVE-2024-50597,0,0,97b9069e5db742f4e7cb258e4530299c275bf9ea7cdf2d9f6c7d4f6f8891b14c,2025-04-02T14:58:07.527000 +CVE-2024-50594,0,1,6dbe79a3a6a50a6894d45384aecc4fb27a81de6f83e2ae6d2ec632656ac35449,2025-04-02T14:58:07.527000 +CVE-2024-50595,0,1,4eaf90809b961211c96ef8b5d025fd52173e939b70ed21593c1b64372689d1f3,2025-04-02T14:58:07.527000 +CVE-2024-50596,0,1,47d15c730de656a9380a8bf9a04998558236318a8db036981b1487f27751ec7e,2025-04-02T14:58:07.527000 +CVE-2024-50597,0,1,d8dbc554fc3ff5fb6396f190f0ab34c2b83fb6f943f9d89405dbd18a887324bb,2025-04-02T14:58:07.527000 CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,9259331461b85b218344bae9506c1ccc79a5eb7cd745e49fb425d4b8636feb8f,2025-04-04T18:07:39.117000 CVE-2024-50600,0,0,1f18a87c7801886bd3cde354ace808a7f14db6d1a9a3674ff94ef2cb61a86901,2025-03-07T15:15:13.750000 @@ -272723,7 +272723,7 @@ CVE-2024-50854,0,0,bb5d731f5457bb2cb62d77947784bbb4fa68264e8b2122e6fa5c5efc9bd7d CVE-2024-50857,0,0,53627bb5de949d80e2b47c21e3006f0c81c95660bfedd14b7a79d7b9d9db109a,2025-01-15T20:15:28.023000 CVE-2024-50858,0,0,8341977f994abccd8c38658e3b06a5b441ec6a76e63e75e17a4fe56b3ad395d1,2025-01-15T17:15:16.100000 CVE-2024-50859,0,0,75da573e20014a6b551d90c7c2fa3e61ba7a75fa523715dcb057e9b0bb0b512d,2025-01-15T20:15:28.193000 -CVE-2024-5086,0,0,cf52a571498a1a90242609bf8d2bd04294b568ed98739fb0d515d3cad0b412da,2025-03-01T01:58:40.277000 +CVE-2024-5086,0,1,7f10d8ba795af89db85d1b8f6f1b48d270bb28da70470fd315edab7c1fd68a74,2025-03-01T01:58:40.277000 CVE-2024-50861,0,0,daab97f5069a3bfda43517026828d2c16c97699dbe9561ee4716d07ce3db0cff,2025-01-15T17:15:16.257000 CVE-2024-5087,0,0,31abeedd94931ed5c0834d8eca1075c48705227fc52b3830e1422827a9f66ace,2024-11-21T09:46:56.403000 CVE-2024-5088,0,0,cb760213addc1b272fedcd03b93efb771012fe463aac9fb68544dce6e855ac4a,2025-01-07T18:03:40.723000 @@ -272767,7 +272767,7 @@ CVE-2024-50986,0,0,5c6709380990f392049398271a42b083d54548c1c87cb3e159e8a4f7bc208 CVE-2024-50989,0,0,3ea16f2258939ba7699d8ffffb9e162a7c1074b1287d37a29649ff27af039c77,2025-03-27T17:57:39.710000 CVE-2024-5099,0,0,bda83cfdd75817e519e801952603024ae976922692eea776b8a4faa211c011eb,2025-02-10T14:27:10.093000 CVE-2024-50990,0,0,bfd5aba686c1c3649f0b59341f8357525fe80b6226d5b955d61d8fd1797fcacf,2025-03-27T17:34:08.310000 -CVE-2024-50991,0,0,0c42cf787371e6b15aeb89a69b801008213796a15bc0cc6ca4fecd986ff1f8db,2024-11-12T19:35:12.040000 +CVE-2024-50991,0,1,8122b668e68e7ff2631d7f870d24a0601fc388e38742210e13c58b7d6694c059,2025-04-04T20:00:24.057000 CVE-2024-50993,0,0,c7468d0e26d1517ae50472d4de36ab73ec4046bd9fde421c17e1c0157f1399e1,2024-11-05T17:35:19.567000 CVE-2024-50994,0,0,762724966c27dc38dc03f87547ab67e254a15c31988322ed60daae17f36e0def,2024-11-05T17:35:20.363000 CVE-2024-50995,0,0,feb5d7131633e5f1f3df6bef41653a1043234d7610c055c5b4870961703879b3,2024-11-05T17:35:21.167000 @@ -272962,7 +272962,7 @@ CVE-2024-51409,0,0,cd9d1809dedee806ed461a1ec4b55cc7a32280d7a8caa4ca197781f860925 CVE-2024-5141,0,0,ef1fc3a8abb2248dc1075aaa92c468f9b71ed2a6f95f513df5e167bd1a7726ac,2024-11-21T09:47:03.473000 CVE-2024-51417,0,0,24b3b814afe084ed71e339ba2341ee7732881cb0faa4316aa437c8928628803f,2025-02-04T16:15:38.033000 CVE-2024-51419,0,0,98a28979982a6ebbf942e483f64a66dcbb5943a8a4d7c3ddbfd245760ff332d6,2024-11-01T12:57:03.417000 -CVE-2024-5142,0,0,28d366194e46fedd003b12f3a84846b37c2575735dc1102e978ddb35258d165e,2025-03-04T17:46:05.827000 +CVE-2024-5142,0,1,65fba9401629723801728d9d5b7780d97fc2a0a67d8f876d50ee206f57f783dd,2025-03-04T17:46:05.827000 CVE-2024-51424,0,0,1f71d6224f9befbfc3f88ae1ebc8a838b12024ea8e79eff1bdf093cb107029be,2024-11-04T06:15:03.767000 CVE-2024-51425,0,0,4ce3f4757897fe8b12cee70bbd11414152d8bb59d86daf8081e050d1f340930b,2024-11-04T06:15:04.053000 CVE-2024-51426,0,0,3fa74adcab5127a3248acf90d9a43a17a348d90986dfa77989fffa61c22b2779,2024-11-04T06:15:04.200000 @@ -273148,7 +273148,7 @@ CVE-2024-51620,0,0,9f3c5342b04529a4ba1988a0378987633ac6cb1420149d0012236cb557c55 CVE-2024-51621,0,0,ad990faa68f653d7edf7c4f127742a95822a936152b7da682aa6af8f3bdebf72,2024-11-12T13:56:24.513000 CVE-2024-51622,0,0,a8223a947586efb89290aa6e2c15be7977fcd06db44d443b9982678fa8c720d2,2024-11-12T13:56:24.513000 CVE-2024-51623,0,0,6703f5b025cb8d843ba74bc3560cd376d306a31d87ea460aef29dbc5f0ab92c2,2024-11-12T13:56:24.513000 -CVE-2024-51624,0,0,b176b770b69bc91aac447e29f80b3be13171fcf76df24ba13a898c09a3de561d,2025-03-28T18:11:40.180000 +CVE-2024-51624,0,1,e26852e9bec04f051031fbd4407c86be7bd92f8271f5b69cb2f484d396b9de95,2025-03-28T18:11:40.180000 CVE-2024-51625,0,0,09d0e1888715d9f8121d4711c3d9a85a6cbccc4072e1d4a8a7b65f0a1d54580a,2024-11-12T13:56:24.513000 CVE-2024-51626,0,0,3ea6cfbecf6d0a010e47ec7e18ebc64f13a22acb8963c62d98cc5b7cb452635b,2024-11-06T22:10:20.517000 CVE-2024-51627,0,0,9441dbfd558987f77e4ef79fd5c47060c88079ff7367a501635d73f88eaccb82,2024-11-12T13:56:24.513000 @@ -273501,7 +273501,7 @@ CVE-2024-51959,0,0,f604383362406c4560c188f1da500d7d34cd2ee9741e140875fe05318700a CVE-2024-5196,0,0,6d90077174f7697bbfa31bc4f0436f8c9f218990f5eb59e7edd22cabda3ff370,2024-11-21T09:47:10.230000 CVE-2024-51960,0,0,7231b29ad5325a27fca1bb7ccd54c3b6502b3a8dc65460bed29ec199e63c9799,2025-04-10T20:15:21.360000 CVE-2024-51961,0,0,8f954748f70c96470e90bb69dc4db2a74735eb331c7cf568e7f1f00aa5abb724,2025-04-10T20:15:21.467000 -CVE-2024-51962,0,0,aa5b86386886c09d6f7775b329f01551003fe6d3a5aeafe034e2c76e33a39082,2025-03-06T14:34:53.797000 +CVE-2024-51962,0,1,a7fa463bf9655f0d742f7b17d48e23d88711a28c686db9e69c622745aea76919,2025-03-06T14:34:53.797000 CVE-2024-51963,0,0,73f2ba67622b6e73bae01179fb42c0ea64a9a3b1a20853017c8ccd0893ea04b5,2025-04-10T20:15:21.723000 CVE-2024-51966,0,0,32c3a7b41e61b1ad6b4a89a702b04f09361d7a553fd60ff9ff2e4b6fb26c3434,2025-04-10T20:15:21.850000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 @@ -273512,8 +273512,8 @@ CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b239 CVE-2024-5199,0,0,d333876b86dd47d072d00d7ea63e4dd70ed8e2c600b5ff8b7c9ccd7e5bfa86b1,2024-11-21T09:47:10.500000 CVE-2024-51990,0,0,9ede6495077ce4387cff0262327d989792f5ae4f5e91ddd40c08013523ab4959,2024-11-08T19:01:25.633000 CVE-2024-51992,0,0,abe3dd87e571aedaed7f45c8497cc934b59698d127808c4551bbc7ac77323e85,2024-11-12T13:55:21.227000 -CVE-2024-51993,0,0,86647ceab5aaea8ea2b488cdb44d303e9930a25cf6eb2e270e52e09e79516ae0,2024-11-08T19:01:03.880000 -CVE-2024-51994,0,0,4e90914b31fe68639773b838dabedb2fb7ac0cb1e48ed0b056dfce8a70f981f7,2024-11-08T19:01:03.880000 +CVE-2024-51993,0,1,6fff9f8be3a1371206df91a0681d43041964e0138134dfc7c2d4e308447095bb,2025-04-04T20:05:22.140000 +CVE-2024-51994,0,1,2ccd3f88135b7a1fa2b617c85f62ce43418b647c198262905991a5c5066fd04f,2025-04-04T20:03:59.507000 CVE-2024-51995,0,0,1992d2322fc226b33a5684039bb4ec2b0294491b1347d873cbbc207dd7559b56,2025-03-27T18:29:13.487000 CVE-2024-51996,0,0,ff85801f2278caabbb88a673f5522aa23a97c2f9d7260bda4506e22cbaf33529,2024-11-15T14:00:09.720000 CVE-2024-51997,0,0,acce3d20366994a4b626635e9d1a5180796478ce8a1652c0c783857ab39acd0f,2024-11-12T13:56:54.483000 @@ -273563,10 +273563,10 @@ CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c15760 CVE-2024-52050,0,0,a125e535af130d2fd1b3ef043255a982025942f8bb7617619bc6741a1327c411,2024-12-31T16:15:26.313000 CVE-2024-52051,0,0,656266c3e17fda1568434d2f818078c8b57e08b84d09e2ab4567a20e5395f0c2,2024-12-10T14:30:44.957000 CVE-2024-52052,0,0,ea9afd631fec94ee7e01b6c247a948c9240ec5b352b2461d21e5911cfd201d86,2025-02-26T20:22:26.340000 -CVE-2024-52053,0,0,c773dd847c1677d2b0dfad2e5296bced6ce3619230e10c8ac8af2ce9251f3879,2025-03-03T19:23:08.117000 -CVE-2024-52054,0,0,e27d85f2a48d2bbd71fb93b1e448cbd1592c0ce6bd5999c1e13d270c09f44cc1,2025-03-03T19:20:47.837000 -CVE-2024-52055,0,0,52d58e6dd6008cd2b25e13a0e0f9c8c6cb710054abbd29f7cac1fbe6812480c8,2025-03-03T19:18:22.647000 -CVE-2024-52056,0,0,c521a52878d7935ea964a158529bb295228542e2e0d1fae5a7999feee84ee207,2025-03-03T19:13:57.427000 +CVE-2024-52053,0,1,2b0d7384cd5399ac212029f0ee9c2ad45221000a0a080c1f7fd2e1352114d559,2025-03-03T19:23:08.117000 +CVE-2024-52054,0,1,fcf6021ac2556c6be9f2f6ebb1b2f5b65aef2bb8846179e15165646239d69b82,2025-03-03T19:20:47.837000 +CVE-2024-52055,0,1,c3ab3afa77d37a30283afcbefedd6a3327b61548c3424bc9e205bbaf0fbd57b6,2025-03-03T19:18:22.647000 +CVE-2024-52056,0,1,cb12bd80587a5701e337c11fc75ef398bb6fddd529c76e9533fcbdfdb4bb744f,2025-03-03T19:13:57.427000 CVE-2024-52057,0,0,922e5baa0db89d0b3ef1414acbf1f76b8743d0bc8c56b8ddc64653f05761d067,2024-12-13T10:15:07.320000 CVE-2024-52058,0,0,a40c35190bc59cadf1786a052e6cb2bfe56ef21cddce10f130ad038177c4b357,2024-12-13T11:15:07.900000 CVE-2024-52059,0,0,f17f383c0e0243861f53fd6a568f9c80dc4fa6b10e841344c88e4b79de4bb7ec,2024-12-13T11:15:08.080000 @@ -273598,7 +273598,7 @@ CVE-2024-5222,0,0,765bdbf94274795e0fc1b811fd6f135d689fec521f11dafecd72c01866fec2 CVE-2024-5223,0,0,95f7d2fdf2e33de84dfa41b5e6bd5f7fa2a48058f5fdaa0fdeb029222c73bc3f,2024-11-21T09:47:13.097000 CVE-2024-5224,0,0,19bab4d52c55b31a325c37ec973f1563a0cdca43b7378195c49febac95f71d36,2024-11-21T09:47:13.207000 CVE-2024-5225,0,0,c2f67d0a4a1b2d56ec5220ea993f27b92584fcee94414a7abcc138983fd21c6d,2024-11-21T09:47:13.340000 -CVE-2024-5226,0,0,e8ce0c5f5a937d96b4b3d25c0111abb8394deac1ffaefb6941caf14dea51f546,2025-03-01T02:25:41.580000 +CVE-2024-5226,0,1,d240d6acb73b260ec82634eb1b1c4b985dce56037f2a930ede0af8ae90b97b0a,2025-03-01T02:25:41.580000 CVE-2024-52268,0,0,e5e6810a9747e7af7c298c06e1bd599e3a19597b915ead434817b591748910f8,2024-11-19T15:57:03.780000 CVE-2024-52269,0,0,1984c004a24b3c622cb0f53f68ce10dc64d8badf37c82f08ea26b5c75658e5e2,2025-01-06T18:15:20.720000 CVE-2024-5227,0,0,f65c704701ee5ef9d493a1b05a58a3a7dadf46e543650b1ca0e9bd9636f84568,2024-11-21T09:47:13.570000 @@ -273957,7 +273957,7 @@ CVE-2024-5265,0,0,691c50f4d5013793de86ff9e07e35394445319972e07ed04ec229bc6aad2b8 CVE-2024-5266,0,0,3731b7396e170170ac11c36d84f1c0762b17d57725455fe979ad2f9d11c02557,2025-03-21T19:17:04.483000 CVE-2024-5267,0,0,172bcb56620775314491b31c299c77b1d5a3bea170b31d266d710cade98bed11,2024-11-21T09:47:18.787000 CVE-2024-52675,0,0,8bc44cb79b879ef61af5ebda5994e2da1884f17d92d3949022ed42ea98732fce,2024-11-21T17:15:23.900000 -CVE-2024-52676,0,0,07a21a59fffbd57b0e87dc5ceee7a6305cf9629856619ba6c0919fe0dc4de1ce,2024-12-05T20:15:22.530000 +CVE-2024-52676,0,1,5d7b9a664a05e25b8969098683ba92e07d4d25d1d035b8b7d3138173f7e5f854,2024-12-05T20:15:22.530000 CVE-2024-52677,0,0,dcc1bd63b3f3e009950b9812e3f79b06dd656d2e600d149ddb96360f0693f5b6,2025-03-13T16:15:25.247000 CVE-2024-5268,0,0,07739d8abbfc44545bd76af5d1a35f3872b4a4bdfbd00fd64dc806fc1a4d4e9d,2024-11-21T09:47:18.913000 CVE-2024-5269,0,0,cec368873afff634fedda1f0b7759fbca5a4e6608be936596d5d49b3e7ed2a5b,2024-11-21T09:47:19.030000 @@ -273981,7 +273981,7 @@ CVE-2024-52754,0,0,48cc5ef43bab6bce1fa386028923c49e7c0923b15806ef09a5c3018ee7e7d CVE-2024-52755,0,0,de05a221f5f303a3571b07e9ee4904991bf517e05068473d4c58937000dd6d05,2024-11-22T17:15:09.970000 CVE-2024-52757,0,0,7f8fc8be0915a027b31c09e256572b3c7a9077292f6f9e0c888cfd25a0470d57,2024-11-22T17:15:10.150000 CVE-2024-52759,0,0,8e96e54d579bea017f42ee64add5580e7ddfbb0696f13a1d140017fedbef2f3c,2024-11-22T17:15:10.323000 -CVE-2024-5276,0,0,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000 +CVE-2024-5276,0,1,5f4d0d1d8da4f71778d386f61f8318d411a2daa5050a355330b05dfbb58c55ae,2025-04-04T23:59:36.307000 CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000 CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000 CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000 @@ -274104,18 +274104,18 @@ CVE-2024-52902,0,0,a3380a1085a80da252bc071d60beac51ec60c4709d752c512c4410d14d967 CVE-2024-52905,0,0,a9327b81440c72b84de5e99b76ac1dcf189fe6b815c22c3fc715232a781b5c5e,2025-03-10T16:15:12.887000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 -CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 -CVE-2024-52913,0,0,3182ee9c1e3fb83798715d4b9c300b62667d15206aea663fa8688a39a2c605f0,2024-11-18T17:11:17.393000 -CVE-2024-52914,0,0,f4405e45f5f97485232891cd6f6808b9568ff72ffe95597d547b59eb906b1c93,2024-11-18T17:11:17.393000 -CVE-2024-52915,0,0,07c9bb5842c4232fcb0566255f389a784701d1ed790d846930c766e0e94ea4ba,2024-11-18T17:11:17.393000 -CVE-2024-52916,0,0,b1ff1c2764176e6afd8d31c12a96aef9f80bdb4ed5559b55daa1ebfa392d9ca7,2024-11-18T17:11:17.393000 -CVE-2024-52917,0,0,3c549dadf8d36c1401b42e62678ad46148461677c43112aa474c92b3eee049c4,2024-11-18T17:11:17.393000 +CVE-2024-52912,0,1,2104bc7e66ebc5d8a605e18503a8129a11cf6a5f3195a00413363461252b61b5,2024-11-18T17:11:17.393000 +CVE-2024-52913,0,1,0bb39723d780f35c9f8757b73518efffd4874e01c6345df3d9ca0c38330f1e19,2024-11-18T17:11:17.393000 +CVE-2024-52914,0,1,eb8b96af7df3e4c73d916115e4528b7db15a958893c5d121c14ce41e60f3656e,2024-11-18T17:11:17.393000 +CVE-2024-52915,0,1,cc97395e5ccced98570981826f62f1aaf98ee0bed2f3d3887c430249df458527,2024-11-18T17:11:17.393000 +CVE-2024-52916,0,1,65d381271771dbf38744a5ef972ddbc3c643eb8b5a765247c5d490346eb2ad36,2024-11-18T17:11:17.393000 +CVE-2024-52917,0,1,e2e60c6fc3ce767fd796c82dc48ae3148e246744c1597ed8d493f5458d6fea15,2024-11-18T17:11:17.393000 CVE-2024-52918,0,0,16ef5addc2129ce4047f0484aab1421d2f40c87fe1b663dfbe427d300b72a435,2024-11-18T17:11:17.393000 -CVE-2024-52919,0,0,238f2185440ab9a7adad8d8e1c063a28a8207fbc84cd7ea72072a8657f7a1670,2024-11-18T17:11:17.393000 +CVE-2024-52919,0,1,2cf04b22e484a8dd28159f168192c69c40c84569a28f6f033c1dc6f5088c9c86,2024-11-18T17:11:17.393000 CVE-2024-5292,0,0,1452aec2e6f1e5f02e53c45b3ee750a7e5d33f92b8e7382e2bc21f3b08b3e5c6,2024-11-21T09:47:22.380000 -CVE-2024-52920,0,0,d51c19b029322a73c74b6821f9cbcbea373837a9a5ff27d72ff8adc9e86cc1bc,2024-11-18T17:11:17.393000 -CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afcc15,2024-11-18T17:11:17.393000 -CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000 +CVE-2024-52920,0,1,ef0f3bfbc3e30c79df801650fdc787c4eba78fea6f5c3381bbe6a69fdbb50a7f,2024-11-18T17:11:17.393000 +CVE-2024-52921,0,1,a98abba8dfff0ad740d7bfde4d6f427b6e8c4efcd303881bf6f9f52671b13f6a,2024-11-18T17:11:17.393000 +CVE-2024-52922,0,1,54efeecc301c037842d3c354fd1a62718dc98f2f8e2b757d3d09bf6275d239d4,2024-11-18T17:35:09.720000 CVE-2024-52923,0,0,6f34fb742e74067aa1a4f68039f14950c236244450b5d64e81d2c2f33b717952,2025-03-07T20:15:37.073000 CVE-2024-52924,0,0,1caa48fe4634cba5983edde48ae3e1b45587c8eac0c13175fed54df80d3a4768,2025-03-07T20:15:37.240000 CVE-2024-52925,0,0,4d21065ff66a1748231e5c3543316979502c5f13302562a708f4fc89ea5a4eb2,2025-02-26T15:15:23.867000 @@ -274128,11 +274128,11 @@ CVE-2024-52938,0,0,25ccbcee31d517a9492c1820a88aa96739f339ebff7e4c4e42b2b7d66f53b CVE-2024-52939,0,0,7e46c98d1c22143749e5192ddd8bc71c64f41cfcba94bd9b958e9653061ce802,2025-02-24T13:15:33.387000 CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa253,2024-11-21T09:47:22.597000 CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000 -CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000 -CVE-2024-52942,0,0,6cf0c15b5ef83e2051f563ad012c7c2537d693f3e904a0a40513e3040d82563e,2024-11-18T17:11:17.393000 -CVE-2024-52943,0,0,2194f04bffdb46a4ca879705eec2d98deb95c8f6b35fb9e7bdb9944c4be3f4d8,2025-03-18T20:15:24.340000 -CVE-2024-52944,0,0,13f4728598a9169659ecc5ab8bdcbf29b2aee05592382aeebb2b7ebc79d90c2e,2024-11-19T16:35:19.310000 -CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca631e4,2024-11-19T16:35:20.020000 +CVE-2024-52941,0,1,993fe003b96e44b9159e45aa0b472640c7aa324a53c7b2c3fa0211e30515e53c,2024-11-18T17:11:17.393000 +CVE-2024-52942,0,1,6a068d758b0fc2510570c40030e7c55acb351c421962b81d1c5e1192a7fa0ed0,2024-11-18T17:11:17.393000 +CVE-2024-52943,0,1,f0968e26e9d4fb70e2691754e9f455d9fbb97829c08996662918d5fe84660875,2025-03-18T20:15:24.340000 +CVE-2024-52944,0,1,e47e2c12e757b4bb972431f1a103d9837232749a689cfdbfc8c56f506687d5a5,2024-11-19T16:35:19.310000 +CVE-2024-52945,0,1,e4f3fee59a8d112e30e4a48bbdd0f3249b84d02d762d5447243a17496e6a4572,2024-11-19T16:35:20.020000 CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000 CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000 CVE-2024-52949,0,0,cb23b6ef0a9bb53a480204b40ad699c02cbfa8874cbd0745429e335a4cfbe2c9,2025-04-03T16:15:34.420000 @@ -274143,7 +274143,7 @@ CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 CVE-2024-52960,0,0,fae4551d6f5890cd1cc0118af23473ce9c16850a8f8d27eba0836b043bfb643a,2025-03-11T15:15:42.813000 CVE-2024-52961,0,0,dea18f81475188c7e018159200e77f633cf269c0485ba3fe6589eb2b7c40b189,2025-03-11T15:15:42.960000 -CVE-2024-52962,0,0,9b538e52f2505f09c2cb78b32e2dd201d8fc29ae01c2b7bfe057f4556cf798f3,2025-04-08T18:13:53.347000 +CVE-2024-52962,0,1,9240ade3fad853885a25bf28704e25cc341a5380bdb89f44660e2092b7a63982,2025-04-08T18:13:53.347000 CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000 CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000 CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000 @@ -274152,11 +274152,11 @@ CVE-2024-52969,0,0,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb55729 CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000 CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000 CVE-2024-52973,0,0,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000 -CVE-2024-52974,0,0,866a7323747846e7e1c49392c810fd741839cfdc09f523ecaf284117d172d0f6,2025-04-08T18:13:53.347000 +CVE-2024-52974,0,1,a8358d8012896ef4c4a2b3ea4fa435c5cf814eaafc1b268f6c6af497dd4a99be,2025-04-08T18:13:53.347000 CVE-2024-52975,0,0,087fe0fde0ceab7286a929c06c2ac45f511973f6a98162a3e6dc355fe877ca5e,2025-01-23T08:15:16.990000 CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000 -CVE-2024-52980,0,0,cc05d7e106d5b14b7571f78cf4ea47c5f911e8818eb629b48d5ceda5d0b31568,2025-04-08T18:13:53.347000 -CVE-2024-52981,0,0,529915e776388af10a55d971e5aee79a0afce03af1703c2ac90c635b45cd8660,2025-04-08T18:13:53.347000 +CVE-2024-52980,0,1,a2a800027a33502fa8a12787209970271cd0c9aa666fa3e000dca10cbf500fa0,2025-04-08T18:13:53.347000 +CVE-2024-52981,0,1,d725b7fd04fdd764dd7492c0853d0fdd8c67a8b1298e3647dd866ce874bd17f0,2025-04-08T18:13:53.347000 CVE-2024-52982,0,0,87ddbec0fddbec6a4eb61fd0607c77d31103b1dd9283c5a13ec4d5a36a8ccef0,2024-12-18T18:22:52.637000 CVE-2024-52983,0,0,6cf30a09aaa853464d214fc07b1d213f931e08bd912522971a9cefc2fb965c45,2024-12-18T18:23:06.273000 CVE-2024-52984,0,0,11fbf459d3485030a8f786e9a22df0fcdca9965df622457357e14148db310355,2024-12-18T18:23:18.347000 @@ -274337,7 +274337,7 @@ CVE-2024-53159,0,0,0efe60c571308791e08c5af46e2d936d40b42d7671e5dc75fbe9400ec226f CVE-2024-53160,0,0,4057796bb00f7bfb6f732886520cc805fa7c46e82813820ad292c8bad3293b53,2024-12-24T12:15:24.340000 CVE-2024-53161,0,0,eeaec3335f10b57ba4a8525bcd94f1272174075b2c57b00bf93a768e727c0f4c,2025-02-03T15:25:26.370000 CVE-2024-53162,0,0,44df583a61fbf11c841d1516fa9edb46f5d5a5222e14b3dc3473f54ca34f317a,2025-03-06T12:52:03.940000 -CVE-2024-53163,0,0,dad9a6a1a721e4f7c23dbc9cfb267e37404fc4418dd39468bda163b37b4c63ec,2025-03-06T12:47:04.980000 +CVE-2024-53163,0,1,c45db68938c5ac5fec7dd8a708dab942faa692276a2cd3a414d8f59e85e4e0e9,2025-03-06T12:47:04.980000 CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 CVE-2024-53165,0,0,a4943f78f99297463146bf300537cb48a621a1dff9c540e1bec71a9d3b2949f4,2025-02-11T16:15:40.500000 CVE-2024-53166,0,0,df1e2e2134692327c93f8c4b149b3eee4d7945b0cf559d41ecd431fd06521650,2025-03-07T18:15:43.973000 @@ -274423,8 +274423,8 @@ CVE-2024-53240,0,0,9b22f872478d25b1b8d5510910ebb2d032d63f29cc9ff7aa44552f79bec6d CVE-2024-53241,0,0,a7e121cbe6737ad10ede045c0fde5c0fb585d55680124447ad43e1c369544bc7,2025-01-05T07:15:05.377000 CVE-2024-53242,0,0,951ddb4b6f620a267d348f005ad18e193ee858461e708335d3d7b94c2b54cee0,2024-12-10T14:30:46.700000 CVE-2024-53243,0,0,0055f373ee76668c96d6bfcf8a6f00835a4bd98d186934410e0656653ee7c808,2024-12-10T18:15:41.093000 -CVE-2024-53244,0,0,0ebf81965708fba707a5b29916f2a96fbe3aa7ac179aa41c29bd72876f44e2eb,2025-03-06T20:15:11.390000 -CVE-2024-53245,0,0,716c4635ab7ce19867d7d9b547e02bcc3473a308fe679391a206d5f256c8e9c6,2025-03-06T20:11:59.973000 +CVE-2024-53244,0,1,d08199c46a99e5b5b7a9f5a40aa58c23e1fdafcec568d4734f3ace988dd76faf,2025-03-06T20:15:11.390000 +CVE-2024-53245,0,1,bbaf790c56552939aca5c8b0b69c541d0159ce842f973f5655626596ff1d6a97,2025-03-06T20:11:59.973000 CVE-2024-53246,0,0,34e585e05f28ae48c7c3f558b7d30a2bc57f5e1f8870a047a7f4db29a060fb2f,2025-03-10T16:41:47.730000 CVE-2024-53247,0,0,bc83b9af87256557839cb9887ebc94d8027f3118f62d49387889799a0e85c9ce,2025-01-02T18:15:19.887000 CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000 @@ -274443,7 +274443,7 @@ CVE-2024-53263,0,0,82d21b8eaefda32bab9e77811a02437ecb56e86491b7bdd941c4ecf68c4d7 CVE-2024-53264,0,0,2e84fcc6a3bdecd579c41829f7e25546f1a50440246e3610b7f334911fa33e65,2024-11-27T19:15:33.400000 CVE-2024-53266,0,0,ddb9eb1f47a1a9d580514c0cd9bc837bd66ac77ee28f373a559fe11e9a7d8135,2025-02-04T22:15:40.347000 CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000 -CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000 +CVE-2024-53268,0,1,07c087d62664b2dc80223e50da83b006e80cf12dd11d3c01ed0cabe0d1bf225f,2024-11-25T20:15:10.583000 CVE-2024-53269,0,0,10f17034cc92e946addde968e4d2b396d89d8d27bdb763a678137e91a2a2579b,2024-12-18T22:15:06.763000 CVE-2024-5327,0,0,e29c75a8521b0948d0023b68721c524107b2ebe0935445a5c84a8df70950f042,2025-01-15T17:49:36.757000 CVE-2024-53270,0,0,dea45b4a7668a2f5619a0d43a87d45dac27f679bda966ce8145929dde1e96ea9,2024-12-18T22:15:06.883000 @@ -274540,16 +274540,16 @@ CVE-2024-53476,0,0,445cb11a55503c7fabeb917897f4172db604756c11d8fca90e521e45b43af CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000 CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000 CVE-2024-53480,0,0,7077a8a07c5ab9aea3b93f3fb1448ae811d99f326da3b432b1ee3a545cb8bf96,2025-04-07T15:17:50.370000 -CVE-2024-53481,0,0,0453d7bb23d45c28537ff3d9115de38f138ad3094a8be118621cb8e6918ad351,2024-12-10T21:15:20.003000 +CVE-2024-53481,0,1,27b27d853d2a318f2e3ccb184ed5441547a06d4988dea849df8a41c061ceed2e,2024-12-10T21:15:20.003000 CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000 CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000 CVE-2024-53490,0,0,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000 CVE-2024-5350,0,0,96d11c8e31022561524caa809e0cd78f545854ba6dbf3bb0f9f80968626b9017,2025-03-01T02:41:15.660000 CVE-2024-53502,0,0,877c583ef29b126aadc317fdb70da023ced288d1cc148d9762da8722dde21234,2025-04-04T15:06:43.840000 -CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 -CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000 -CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000 -CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 +CVE-2024-53504,0,1,9961976e4db60fee5588e4482b1cee4f280ff3be8e36208eabef493b516a6955,2024-12-02T17:15:13.047000 +CVE-2024-53505,0,1,7c8f29e95847d5be6e925fd78b818e0d66804d47399809d4e1430536885b2678,2024-12-02T17:15:13.257000 +CVE-2024-53506,0,1,73ac38f9f53b1740c00c2ed8ba8ca4e641f472ddada7eeb543bbf2a9260ca55c,2024-12-02T17:15:13.497000 +CVE-2024-53507,0,1,e35399cb65617a50fe45e57f7e52f9d7f936824660eeb675b03a02887f4088ea,2024-12-02T17:15:13.707000 CVE-2024-5351,0,0,e54da7647b2ec568192e76777a6d33133a8359c67f763fe86fa9a09a444d4ab6,2025-03-01T02:43:03.853000 CVE-2024-5352,0,0,3ce8cb21510608b4ca4a9803045f2a7774e40ced6d041e7dbf2be5cc97527508,2025-03-01T02:44:37.920000 CVE-2024-53522,0,0,4cf27771a36f742e1b4b9b4ff1149b39f782c38d11efa74f0ad2b7f1066f5059,2025-01-09T16:16:21.560000 @@ -274879,17 +274879,17 @@ CVE-2024-53958,0,0,e4f482e2a03eae216a10399e99f654a343bd239d8a996661687745f01455a CVE-2024-53959,0,0,68036dd248b75f87e5f3d9391181f98f189af951a522aae2a41316aec0dfe235,2024-12-13T17:50:13.643000 CVE-2024-5396,0,0,2803237f0e4901f868b2411248b7afc43d8277e9ca0b5e570c7ca4af0c8d407d,2025-02-10T16:21:53.437000 CVE-2024-53960,0,0,980ae01bf410da0473069e1a3eb7a3f001cc1d8a12dcc0d46a5730cb7c2b0449,2024-12-13T17:50:01.533000 -CVE-2024-53961,0,0,e34826d48b231b184990a62d5fa4a5a06683c46c753735bc9f64a21923729666,2025-03-17T21:15:13.290000 +CVE-2024-53961,0,1,c412c266a64d4c5286c3de65edf6d2541ddd254e0509b3d14d8324d5932edf9c,2025-03-17T21:15:13.290000 CVE-2024-53962,0,0,f816b9290435a8f8ae7fa8a19e543c13c55fe4fefbcc09532a2831249cdc5667,2025-02-11T16:04:54.073000 CVE-2024-53963,0,0,051446204e52ba5a494312330ee7e3ab35674dc0b04bf6faecd732baa765e078,2025-02-11T16:05:06.490000 CVE-2024-53964,0,0,8b957f9c6ca1dec43d35dad3b6547f3c315ba420617d586a20a9f871b1db47a0,2025-02-11T16:05:17.890000 CVE-2024-53965,0,0,fe5265ed578fcf02d9c7551665c4d02d94d57b5c2a197155d2f383c80e4623ad,2025-02-11T16:05:25.927000 CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85133,2025-02-11T16:05:33.017000 -CVE-2024-53967,0,0,51e891f72b2fac9c108208a3222970bbe3cbdc199d93442cee027b1cfb5d9ca0,2025-03-19T17:15:40.313000 -CVE-2024-53968,0,0,8edec868c478b541356ded3422105a2339070ab7eb8b4d488cb989ddd964ab53,2025-03-19T17:15:40.467000 -CVE-2024-53969,0,0,1a08399271b104b41a52a21217b378af82c422b54a908305c9d9a4310dade8e5,2025-03-19T17:15:40.610000 +CVE-2024-53967,0,1,9703dc45ae795bb12b869f5b22c327be14c1f45789163177033eda10f6e950c2,2025-03-19T17:15:40.313000 +CVE-2024-53968,0,1,ee98a8a260f4ec5c75e76f83ac33f11113e2940a93eb5f3b3a48c0e84bab6e65,2025-03-19T17:15:40.467000 +CVE-2024-53969,0,1,91ee5c8a2376748ccb3bb7f7ff9e4e350b1b45fcfd56aa8cee58aec97a2000cd,2025-03-19T17:15:40.610000 CVE-2024-5397,0,0,e240e353d0c3a2a1734a4b7c92d19485fc4c6abad443fc8646294b9e529895fe,2025-02-10T16:20:41.830000 -CVE-2024-53970,0,0,01ad1c9f6d7624438797fa1c48f22543558b20c1d1e10c1773cd31b7052f0679,2025-03-19T17:15:40.750000 +CVE-2024-53970,0,1,c819d6f44d7300c0cbf7ea546b0588f4a765538a1183e62b72001d5e23d72b35,2025-03-19T17:15:40.750000 CVE-2024-53974,0,0,52052a572e52b9dbc089a516bde1b3fe92dc22cc036b47b932527a527df79bc8,2025-03-04T14:04:30.393000 CVE-2024-53975,0,0,1ef4582fd4bc5bf12a2226ef1587e7e199747f5394364a72a9c8e29bbaf92b0b,2025-04-04T16:19:53.597000 CVE-2024-53976,0,0,3c4e290755b1122ca5eef12abc826a22f34cb5f7c1451690e25b02ebe35b73d5,2025-04-04T16:15:43.123000 @@ -274932,8 +274932,8 @@ CVE-2024-54016,0,0,639aa106bb3e1987e1e073164a35006658ec1d494dc571ebf11ee73a840c8 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 -CVE-2024-54024,0,0,6ceeef9496cadcc64e79b1844370c0fa1c02fb938bc5fca74c230591ca1e23d8,2025-04-08T18:13:53.347000 -CVE-2024-54025,0,0,e5a745fd97cf96434a4b8150a9903326f6b1ece4d8be99488b5d30c7eadfea0d,2025-04-08T18:13:53.347000 +CVE-2024-54024,0,1,b12992324e708add852aff73cc4680ab70c64cd77d627c575cda6c4714aff0b9,2025-04-08T18:13:53.347000 +CVE-2024-54025,0,1,8aa32b233e56da713dddb0eb535be2617e97f8dd7601088b08118f98be13f739,2025-04-08T18:13:53.347000 CVE-2024-54026,0,0,723fec38eab4317b0780c9816dd56e900186889e5e56922795660677a81a6c2f,2025-03-11T15:15:43.307000 CVE-2024-54027,0,0,7544813701dc95fd0c5530c62bca74c9e14470944bfaab3455d456f59c4e66ad,2025-03-17T14:15:19.613000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 @@ -275130,7 +275130,7 @@ CVE-2024-54266,0,0,d444be4e1ee22dd451822fabc010f4ef86c2b038c294a565a8a8c51aef896 CVE-2024-54267,0,0,76f7008cb7e3a38e8545f73bbc644c092c440137c92b5ce9caceadf7f166993c,2024-12-13T15:15:30.923000 CVE-2024-54268,0,0,f538eaa0e543c3d25ea09ff86a2cd74f03b7aedc9a5dc9f4cf64a0eb856ebc9e,2025-03-12T17:48:01.570000 CVE-2024-54269,0,0,80ac095d31433aafabf7debefee962a6f6c2eac87daa457c3fe90f17fcc9678f,2024-12-11T10:15:07.790000 -CVE-2024-5427,0,0,99df26b8a2e9ba6f69c7339a30f72d5548d17ecc340b7a91fa258448195e5282,2025-03-06T15:04:31.553000 +CVE-2024-5427,0,1,82cf62cc24466dc38027b06f581f3336e5602600e521a5c0f9a0032961df1ebc,2025-03-06T15:04:31.553000 CVE-2024-54270,0,0,4ff2a32fb0b8766616f6de47e9eb91a9703be9f024b88fd7ec9559d6b3384e5b,2024-12-18T12:15:10.570000 CVE-2024-54271,0,0,c27662fb9968b9725bc778a9d9144b52ef438a3ce319f321fd17e81c32f1277a,2024-12-13T15:15:31.230000 CVE-2024-54272,0,0,f5a3261052d9bdef13af95bafcaf81a95248149d03f918ded2479469dd46cf4b,2024-12-13T15:15:31.367000 @@ -275153,7 +275153,7 @@ CVE-2024-54288,0,0,3c9c3c6eb7ea5d0e80b3dc6c380a970c41d1702fdccfcbf7a1eb9279bdb11 CVE-2024-54289,0,0,4924b8c9ee0119eb21584ceb261116e542e084f80864da6819de24f085376959,2024-12-13T15:15:32.840000 CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000 CVE-2024-54290,0,0,94f24c824c8ffe1a5d1b4e7456c8c53bdf7ab3ec7f2d25cded89b1a2e931e028,2024-12-13T15:15:32.997000 -CVE-2024-54291,0,0,5adb04b67206f08aa024cae087e009340777ff9d49470a2a3263f156c0bb6f61,2025-03-28T18:11:40.180000 +CVE-2024-54291,0,1,822a2d7e65d75d400a95fea2289113efc360c7b7aa70a7df381bc299f263089a,2025-03-28T18:11:40.180000 CVE-2024-54292,0,0,23ca83ef1b927ea8c753f6ff6aac4e8f46b4cc684f1a85a4d56d010b0b62eebe,2024-12-13T15:15:33.143000 CVE-2024-54293,0,0,42cf37db0ff709eca735462416937e47c8f3a74562d752738c510e807b90fce1,2024-12-13T15:15:33.293000 CVE-2024-54294,0,0,8a9334dff3a1a76409b7a41f4dc2a8fa7e8f1ac279aeea257fda6867355ac748,2024-12-13T15:15:33.420000 @@ -275225,13 +275225,13 @@ CVE-2024-54353,0,0,dd34844cbe46ba216dd652066cf81c78e597247fdfc1687bd349b0754db2c CVE-2024-54354,0,0,91a14d67b05a45986abf745187ade61d55bbfe0ef319eacda8f93e7ab1d79ada,2024-12-16T15:15:08.023000 CVE-2024-54355,0,0,1dd4f617f04a945911b443ce200b1bf8ecff1a5e5836731bb31fd179f9dbd431,2025-02-07T21:15:55.463000 CVE-2024-54356,0,0,93290ea2762a14aa5a937e3188f8faa9f26e220a25a3d68bf34b89e3aade9072,2024-12-16T15:15:08.327000 -CVE-2024-54357,0,0,990e06c8c6c81631694e7affa4b8e3988db6d1d33a24ac8cd6294cbb717b1480,2024-12-16T16:15:08.617000 +CVE-2024-54357,0,1,db5d9600dded7a8509375553d406c065ef0ac25ae2d9a92e00283afdedc45e89,2024-12-16T16:15:08.617000 CVE-2024-54358,0,0,a842eb8c4d982c3f6b6ba6fafcc1cc007bf9181467d6f3e1dd7670ce09fa5b97,2024-12-16T15:15:08.477000 CVE-2024-54359,0,0,fa0a9f20451ac7e0c36ba20018c12a0ec4833a93fa93fc8eddd26232eff57623,2024-12-16T15:15:08.630000 CVE-2024-5436,0,0,16a2d2f1a9a3d9d246e525c05e5f6ef4140f57c182ceaa616ff131de2cb2ad61,2024-11-21T09:47:40.917000 CVE-2024-54360,0,0,7cecc5c9b33bbc356f5772e4c43bd169f3e770f679ac31dc4fe24a944af9b3f9,2024-12-16T15:15:08.793000 CVE-2024-54361,0,0,1fbefec397ae08c1d4ab1ee239f4011081ba235e6463dd89ca2c24fccd07c3a3,2024-12-16T15:15:08.970000 -CVE-2024-54362,0,0,b0614b91596c66a5ecb346adbd3b281574883b55cda0f7b04d5c6b6129c370df,2025-03-28T18:11:40.180000 +CVE-2024-54362,0,1,a11effe55ab1cbe1a1bb3cff72e4e11bb8640b41b87bf116d82afc3565e7c7f6,2025-03-28T18:11:40.180000 CVE-2024-54363,0,0,a758b21d504842c72bce968c480430a0b58b48352a9cec3cae02554bd59f1189,2024-12-16T15:15:09.130000 CVE-2024-54364,0,0,302e6428c3975bfd1b81b5caf03464d744cd6a9b74a7e91f70bc8fe4275e821f,2024-12-16T15:15:09.283000 CVE-2024-54365,0,0,5e337e24502c845aef33f4c06f7c4e94b03b2019f78d434025bd26e36b24fbbc,2024-12-16T15:15:09.437000 @@ -275341,7 +275341,7 @@ CVE-2024-54463,0,0,7dcaa6701c5be296c448f7f2a1f3e839e626326b781459d1a611b1eb21d93 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-54467,0,0,3088c8327c74eab499dab80addd957c5e1231a9995b4c278b1eb041dcd0bd0a1,2025-03-14T11:59:19.543000 -CVE-2024-54468,0,0,fa935d8dd1e1817d5ab99551c01c3db33083160095897b43dced668287e64a3a,2025-03-14T16:15:37.223000 +CVE-2024-54468,0,1,6baeda83a1277b3fda3dd0f2d72569ad080f1f7348de3272adc41e2841f06654,2025-03-14T16:15:37.223000 CVE-2024-54469,0,0,4ee093483a2ffd68c6c487da924bbbe74049fc67b5f7b010a17783a060f60e2d,2025-03-14T11:56:31.210000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,a4cdbf5ab0c647b7e4a0c8883037efe16e8b4a75edd339c796e374bc4cab967e,2025-03-14T13:48:19.380000 @@ -275407,7 +275407,7 @@ CVE-2024-54533,0,0,e77b0442bab9e5467f39ffe9edf0ebbe612e0857f5a2de6ba5305e9445f5b CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 -CVE-2024-54537,0,0,c68a6744bda0bf69e01783e98c5c4c4076f531c7f9b134c973d8c4233177cb65,2025-03-18T15:15:56.877000 +CVE-2024-54537,0,1,5832b1cf352fbc59f004d595800fd7f9c5968c28434ee87f0daad53162a17fce,2025-03-18T15:15:56.877000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-54539,0,0,36e3e53910a537dc715b48aebe0ea1b1697e0649a55067c940d6bf3822ffc04b,2025-03-24T14:53:49.143000 CVE-2024-54540,0,0,2dc18fcd4fa77cbf043758526c6356267a91808bcc16edc82afa1d4bffaa4410,2025-03-24T18:15:20.780000 @@ -275498,7 +275498,7 @@ CVE-2024-54809,0,0,269890ae914c804192af1f03b4cf2c102933b4627839ef87908ec5cfb19f9 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,882d3fa1b080912bce7b34d4b8aa9b12c4912ad6adc38d0b87e5a54461198ef5,2025-04-03T16:31:58.100000 CVE-2024-54811,0,0,cf240480f3bdcc869e21e147dce6a3cfa9b1faf5d8289c88cd8952cd891f8a15,2025-04-03T16:31:51.620000 -CVE-2024-54818,0,0,c43119f169232e03fce78f76fd8c17d403249b4db9d275dadea7d70095cbc4c7,2025-01-08T20:15:28.303000 +CVE-2024-54818,0,1,91786608b3a56444111884d7e60746713c5c2b6ceeee3522313fb8b5f304a54b,2025-01-08T20:15:28.303000 CVE-2024-54819,0,0,8ec44a69779700b75dce08ce23b0b696a8e67a9684b58a33ba4824157f9f0485,2025-01-08T15:15:19.317000 CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000 CVE-2024-54820,0,0,16b64a080fd25d2c2590607500494de197cc49afc9c942982a6cee9b68eaf217,2025-02-24T18:15:17.523000 @@ -275527,15 +275527,15 @@ CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f4 CVE-2024-5491,0,0,f430fd5a631d3836b39db69c0e7e21d3595a43a4e0a9c7d9dee8bbd76daa2dff,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 CVE-2024-54916,0,0,c187c44e77f1284caa57fa2c5d09aa5819a1e6e1279a77edd94c2a7b2803ab06,2025-03-18T15:15:57.267000 -CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 +CVE-2024-54918,0,1,5817447237a214f9c20f0d1a3b96e161d2b61c5e7a00f7284ad0d087201efff1,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,69e032d7889ecfac9ba9e43b34f5fb521197e5e97d6fe94180bc88bb517b1262,2024-11-21T09:47:47.140000 CVE-2024-54920,0,0,f3d8327726d97fad7afedc7222e977f628a89643e455f1eb4bfd257bb9efc305,2025-03-20T21:15:22.143000 -CVE-2024-54921,0,0,5b8b01fa4c3828d6db5f064bd1e083ce9e7eef2c6b134f1459133be93acba607,2024-12-11T16:15:15.127000 +CVE-2024-54921,0,1,d74607d69eefc3cb9e78e0e4d7008bc64502bc10eccc45e90cc7289716e134a0,2024-12-11T16:15:15.127000 CVE-2024-54922,0,0,58c641310c8984cb82cea1a26551b61bd4b4bfeacfcb7ec670244e86b06ada09,2024-12-12T18:15:26.013000 -CVE-2024-54923,0,0,555ccdcb7ec11a022922a70c3fa52808767d6db0b3317c7d33e8a5308d3f1cd3,2024-12-11T16:15:15.347000 -CVE-2024-54924,0,0,0fa2817619194992f5b6a081d12b1e6e411981aa55ce01f75d3c3a470076c74c,2024-12-11T16:15:15.547000 -CVE-2024-54925,0,0,0427713396623991c3eadd7c380c12566f7b5c609830b6d9ab4f9a3524125c2e,2024-12-12T18:15:26.240000 +CVE-2024-54923,0,1,314259a95b2daff442b06b04dc319a4c8695c28ae9f6dae2e94f7f1930dd5d9d,2024-12-11T16:15:15.347000 +CVE-2024-54924,0,1,1477b70ccf713c1f3408e2801b68a0d25550bb2734c30a71dc3a11668a234c0d,2024-12-11T16:15:15.547000 +CVE-2024-54925,0,1,73e289c309afa9da10c35cff604f21a35fb8189d7d93c808ebbacfaefa442a60,2024-12-12T18:15:26.240000 CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8dbe0a,2024-12-11T17:24:11.403000 CVE-2024-54927,0,0,743cd5f75576f93b89277c4c4bd309f2a9d5d44818b55b3d4433a9a3e5ce11c7,2024-12-11T16:15:16.360000 CVE-2024-54928,0,0,c0b3aee5ee0c3359e1bdf75741044319f3b2ae90c5d6a8fa2f4c6b96dad60fe9,2024-12-11T16:15:16.590000 @@ -275593,7 +275593,7 @@ CVE-2024-55062,0,0,3123150d46b761ada11b83c374a54e9242d8e139ac058a4ffae965af3a17f CVE-2024-55064,0,0,d70e68d4be0dd347bbd63a462911314935d644c9781ea6458c9d9173090f4c9d,2025-03-05T18:50:13.373000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-55070,0,0,3568834de5e6c4cfd90fc3eca6b0a215c1a501125b216b6c8d4a62f5e05ee025,2025-04-11T17:04:33.603000 -CVE-2024-55072,0,0,4a741e8e9e2e523ab03e18bd3a77026af73e9b31638a69db0036512733ad6c7d,2025-03-28T18:11:40.180000 +CVE-2024-55072,0,1,e8316b6c359a7f2984f8edc74ff5ff7ae286ffd703fe3fd11198ac67acc88c2c,2025-03-28T18:11:40.180000 CVE-2024-55073,0,0,c850380412e37f5e0c3cfcfc5729e24be2fd1bcb418a9413ee45aefbba468b59,2025-04-11T17:59:53.620000 CVE-2024-55074,0,0,1bb56c00ce7b87cd6028403786c83c9593cbcc8954e072dc461304855924628a,2025-01-06T21:15:14.803000 CVE-2024-55075,0,0,4928182cae41a13ce4b894fa02b7ed8267f67e5fe7ff39725507907b9004a7ab,2025-01-06T21:15:14.970000 @@ -275602,12 +275602,12 @@ CVE-2024-55078,0,0,a384c8e758480780127b01c8311c6648b09607c6c69593e0652ea3f91c229 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 -CVE-2024-55085,0,0,faaa06e53cda1e2540d88c2d50b27f37259effe5d33f96991d0016c33297729f,2024-12-17T15:15:15.840000 +CVE-2024-55085,0,1,87a04e40a1161fff2e0fbd21bf581da2bde4b37c62efacdd3df7e26f73234f8c,2024-12-17T15:15:15.840000 CVE-2024-55086,0,0,10b4edaae4b8684cf038b872fbd71037a410456917dc842a4f22ace635122c5d,2024-12-18T19:15:11.613000 CVE-2024-55088,0,0,549322782860e827672de68984aac69441af19c0b367dff4381f3b99d312d264,2024-12-21T00:15:28.290000 CVE-2024-55089,0,0,fe8d9b2e0356506b20b9e891287266dbbb47fd17083ee062946773a1570b33bd,2025-03-17T22:15:13.927000 CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000 -CVE-2024-55093,0,0,46661caffaa7630cc39addb142146e1943ca7fb3ac3acf58a8e1a7a63481a489,2025-04-01T20:26:30.593000 +CVE-2024-55093,0,1,f38af1f1a4614ebb178ca32bf78447a2522dfa52f9327f81acd6574686865092,2025-04-01T20:26:30.593000 CVE-2024-55099,0,0,bb5d8038fff96f2ebdc264769fc895066bde62862ee7a940cb7e11a89bf7adf5,2025-04-03T16:32:04.010000 CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000 CVE-2024-55100,0,0,33d0b68b4a1b95b13d83b0a554f1c0b5e79107824be878c03bd773954b614651,2025-03-28T16:25:16.377000 @@ -275633,7 +275633,7 @@ CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-55198,0,0,d81482838c3eda383660502c3dd8d0719792f72678809058edc3d892f738753e,2025-04-03T18:31:39.317000 CVE-2024-55199,0,0,9dbaedf3926a39070909e5e303310645f833671fab2b674351cde48dbd521f5b,2025-03-10T18:15:29.757000 -CVE-2024-5520,0,0,8e37f80f49d8257d789ff243b3bd23d0755293ef19b3bf396e272b6f57dd6b48,2025-03-04T17:09:25.197000 +CVE-2024-5520,0,1,f5c5626f99bba002ef3fab755b2c1f973d15b341d75d7cfb5987a3c7916dd8b0,2025-03-04T17:09:25.197000 CVE-2024-5521,0,0,33359761d73ec5f95a8b1df0816de35dc3d9782783636f53e8adae5064f07611,2025-04-10T19:17:25.220000 CVE-2024-55210,0,0,d0564553415821f56369a94c83a30191fd1a84a3842e95ddf5d3e5d9a1705929,2025-04-11T15:40:10.277000 CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 @@ -275710,7 +275710,7 @@ CVE-2024-5550,0,0,7c59d799cc75229bc373ee72fd75d817a225bf373e99fca682a5e076e676d2 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55503,0,0,01a804c79c1137dc6f6a99f161e5ec4960fdb74ed53d202af527ca6f31c7464b,2025-01-31T21:15:10.640000 CVE-2024-55504,0,0,860b49bd638bc2d5a003845485e874e0bc9b85f4d9b1a1d6187969336e05d39e,2025-02-04T16:15:38.353000 -CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 +CVE-2024-55505,0,1,3f9b85601f2e382a5ff1f392d6f99103e46692dc5910f9e4c408ad232d8bace8,2025-04-04T21:15:43.240000 CVE-2024-55506,0,0,f9a68ad63b975d29e1760caddac79783f9574549386ab20ae9420a116292272c,2025-04-03T16:36:41.363000 CVE-2024-55507,0,0,930e26c70929e91b1984b19dfa87f2ddb08aa3eb954af3c2a7afec13edb13724,2025-04-03T14:04:17.540000 CVE-2024-55509,0,0,d509d3ca5bb22815e1ce9d88bb753af17faa80b562dc2247a6b3b8ec1b0748a7,2025-04-03T16:34:27.370000 @@ -275773,7 +275773,7 @@ CVE-2024-55594,0,0,652ca5f6fdc5cee2f95cb982d050eb42d5c2e6c532d86b32904ea69a07dd0 CVE-2024-55597,0,0,2f74eb8473fbbc1a45915a4593898ee2573223ce1862d3dcd91f3235728a48ad,2025-03-11T15:15:44.010000 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,9b35d862d187fd3c6770804bae011b28b724e76b6c1dd4a3a89f0f4207a3e507,2024-12-09T22:15:23.100000 -CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 +CVE-2024-55602,0,1,48e3891a5a020f1779efd4c713804cf6f3e79387d17a32706883589d097fa656,2024-12-10T18:15:43.500000 CVE-2024-55603,0,0,8cd8df6838ce256fa57d26832365d91f3053a34a749cfcf3ff6520df6ec92d89,2025-03-12T17:42:31.367000 CVE-2024-55604,0,0,53b9e867881f4b8023c1608c4d56c39d20f3d7cfc7965a1cd9838cdc136037d6,2025-03-27T16:45:46.410000 CVE-2024-55605,0,0,c4e426b73c2faf76380cb3f754b08e658f7c47e78f9257a1d317e03265578d33,2025-03-31T13:53:42.710000 @@ -275782,7 +275782,7 @@ CVE-2024-55626,0,0,2b5c0134c74ce4ccfcdfffe46b04d3c1e1b2d48cd30c76275ebc7c929e9bd CVE-2024-55627,0,0,f50556e9eb9ecf81fbcb05a093980c25aa53f91be7480b399559cc5437ab9c37,2025-03-31T13:40:33.967000 CVE-2024-55628,0,0,343476b597f4d355ff4e98ad7d1b5f43ec8e6401c45b7b03ef35275e14420215,2025-03-31T13:02:25.710000 CVE-2024-55629,0,0,19b3ad385dce4e72c694bdd0cb50739e6deb256dd6904178058970ff5d288fc4,2025-03-31T12:54:16.233000 -CVE-2024-55630,0,0,960413056761f5da44770e7213fe4176cf1ef657dc1834f9ac2e9f258b2f9ea6,2025-02-10T18:15:30.540000 +CVE-2024-55630,0,1,789ad87d662c3857d8215920c2a91e2411c969949da95bae8d440e52a0f084e3,2025-02-10T18:15:30.540000 CVE-2024-55631,0,0,c61e02e505f7e07e3ce0e8957584b0fef970130675c3fb922500870845563192,2024-12-31T17:15:08.870000 CVE-2024-55632,0,0,b094f90539addcb66cb3e41a3fa71e13de9a88f56b85fd9467860f7182935280,2024-12-31T17:15:09.007000 CVE-2024-55633,0,0,8f0ea6d8587f5528b88ede58fbd8b28660892a3d1b0735cee83d3bcf99a0fdce,2025-02-12T10:15:14.143000 @@ -275797,7 +275797,7 @@ CVE-2024-55641,0,0,5ceb1ce1fcdd8dbdaedf279a0cc0a70e3a5bc311e90933680c0312aa874fb CVE-2024-55642,0,0,bebbffc81c84734ded4e32ee6533cd16dfafb72d8736803a1e0946b43f8a229e,2025-01-16T15:18:22.557000 CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b7304a,2024-11-25T13:15:07.310000 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 -CVE-2024-55653,0,0,6adab931e15ac490e0ece82122d6e070bb38c705c58b8befc0c0aa90aa8fe483,2024-12-10T23:15:06.410000 +CVE-2024-55653,0,1,bb71a8ec3e6c21c667f249b8054e62601b849e7d73b20ff747e031d3848b8b75,2024-12-10T23:15:06.410000 CVE-2024-55655,0,0,35c82f1833a66c10594b6dfbc8a08353a480d6fa6ad41a8ff2f7fcb8d9697776,2024-12-10T23:15:06.570000 CVE-2024-55656,0,0,0228a74363435bc50a1a96dd11ad922cd078ff988a1758acd950ec35702e2708,2025-01-08T16:15:36.213000 CVE-2024-55657,0,0,c2e0cf6323247a03ebeb1d310cbec0bacf068d60c19c3ce97ddef6d3cb022e28,2024-12-12T02:15:32.507000 @@ -276194,7 +276194,7 @@ CVE-2024-56321,0,0,74f6aaba2312f358c8612f649e79b3518a2426ea72dd60ae831d7b708032a CVE-2024-56322,0,0,0e3135ff21764520d5633cd3f61e61097988472a18e3a364fe45daa5a3f3f8e3,2025-01-03T16:15:26.480000 CVE-2024-56323,0,0,4d7e760b1fcd669a470d40b9026794b15b60e0764a30b5d7449fce19b8900b0d,2025-01-13T22:15:14.447000 CVE-2024-56324,0,0,a08049cfd3a2aafc3d9d1e1d3bb8e00ce236badc8e05a5e1ec35b8e21dc91a5e,2025-01-03T16:15:26.643000 -CVE-2024-56325,0,0,63b302e8c67535ea8ca2356dcb713846877c97ff3255dc292b65d053c54eec56,2025-04-01T20:26:11.547000 +CVE-2024-56325,0,1,bb49356b97edd70da050eaf6b2d36e93fbfa5ae17439ac01dd7b76431cefa9a5,2025-04-01T20:26:11.547000 CVE-2024-56326,0,0,a8a6b261057c1f8537eceacbb1f4ed32049ab9589d4f4c5db55a4163b2928c32,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,928e223be8bc0630fd740137b1fbb300d0c36c5b8420c69dddd568c70eb8ddc4,2024-12-20T18:15:31.083000 CVE-2024-56328,0,0,15361150e4c4eddd938c28dee0249fee42e046eac1018161ed075ca63881925e,2025-02-04T21:15:27.400000 @@ -276232,8 +276232,8 @@ CVE-2024-56361,0,0,6914e3b4169217c01799ba259f55986b8128ac01969377212884716261b99 CVE-2024-56362,0,0,6c11627d17fd0c98131328b72e24d3fe9b01f90190167be28f8c83514e2d2986,2024-12-23T18:15:07.617000 CVE-2024-56363,0,0,7b130d481442d6564973e2a7227b43f5a030ae8a41341bb70189f5abec825a62,2024-12-23T18:15:07.767000 CVE-2024-56364,0,0,6115dedb84ebd874c4c0a6694d1fb784d8502b3a627aacf7ea4fc74186ea1ff2,2024-12-23T16:15:07.770000 -CVE-2024-56365,0,0,126d558c4bbc6c5ee63948998c0a3c6160b85161153d1671401250d881cf23c5,2025-01-03T19:15:12.340000 -CVE-2024-56366,0,0,dbee9ffdd288482f1f83bfde5c1fc74ab25ff3567b18ee35b0e71942927997fd,2025-01-03T19:15:12.443000 +CVE-2024-56365,0,1,b8f484cb8d90276d7e3b7b56f40c1b224527ee4164de0cfda2b0f63424e5fa92,2025-01-03T19:15:12.340000 +CVE-2024-56366,0,1,d5f4b2ea22f0419692e9270808dd32d846291e682aebecd1ad0cf8fe871799be,2025-01-03T19:15:12.443000 CVE-2024-56368,0,0,3fcf15405e5d098a7d36ecb9520617c7fca5345251aca6249179f3e1c86517d0,2025-01-11T13:15:28.530000 CVE-2024-56369,0,0,3c8472717567d8bf18ec0d8e83a626d55afe4bbcb99b2a53e44807eb7ad97aa3,2025-01-16T15:18:59.237000 CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000 @@ -276248,10 +276248,10 @@ CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 CVE-2024-56404,0,0,0922979315c1e629cdb1fe6a847df3905e5c41f9b68e7cd17dbd9ff65fcb7683,2025-01-24T18:15:31.883000 -CVE-2024-56408,0,0,937b0b6dcb8b7e22700c52d825204d5a29fd9d235db7298d220870025b8b91bd,2025-01-03T19:15:12.533000 -CVE-2024-56409,0,0,5308d88426ba47579b9e4814446ee52648c1ad6c1efaeac0ba2c7848d693aa32,2025-01-03T19:15:12.627000 +CVE-2024-56408,0,1,afea4ec88a0c4f08d13a60e8ad60ee434ed5e10f4d4e8338b1f856c6e34cc00b,2025-01-03T19:15:12.533000 +CVE-2024-56409,0,1,a43aa805ff701655a22fb4deb11b925e5e1108fad53ac1562d0e2d49e92fea52,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 -CVE-2024-56410,0,0,773584879180f8e91ff1c4d215aa7e545e4564d5fb6f40fae69849530878b183,2025-01-03T21:15:13.723000 +CVE-2024-56410,0,1,0a543a27c00fccb1e8031afbe84288e2ba30f36e685b4cebe366e9149d29669d,2025-01-03T21:15:13.723000 CVE-2024-56411,0,0,615b82fc0973ae15ac50b3d81cfa4e05d425a42b09a53f1e0fa19f11d9edb6af,2025-03-06T14:27:28.747000 CVE-2024-56412,0,0,9de65a8965a720aee61d5a73e14bdf5e61cc3466412a93eb6a99af9f750937be,2025-03-06T14:07:41.677000 CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000 @@ -276288,7 +276288,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000 CVE-2024-56467,0,0,4abd380d633d7d20b2a027f678c099ef3316a3d7b109e9e37281d916573a7b07,2025-02-06T21:15:21.600000 -CVE-2024-56469,0,0,b06710d235f3ce56f04c3098b3efbff38354dc49e5704a70cc5873b988de9454,2025-03-27T16:45:12.210000 +CVE-2024-56469,0,1,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000 CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000 CVE-2024-56471,0,0,c7151923658ce235067b1c50400ceb9bef48db680c4c27b5c059b231d4913621,2025-03-07T19:42:50.713000 CVE-2024-56472,0,0,6604fd856b39fa8f7143d34738ec0b1262f2adc9500d77a6d6deea5160414bfa,2025-03-07T19:43:04.223000 @@ -276333,7 +276333,7 @@ CVE-2024-56521,0,0,9fffd2d33d5e032f4dea69c35a0383d33eb10d016355c08e207b6cf004548 CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000 CVE-2024-56525,0,0,d6729633b717b4b202a836c9421934b16a82f4fe7ee35b2e24fe7351b6d5cc20,2025-02-25T15:15:22.190000 CVE-2024-56527,0,0,96fba30809b836cf267eca65f8263ec3d49c4c998fb626aebb92216fb24016fc,2025-03-13T14:15:33.533000 -CVE-2024-56528,0,0,c89d5db6b8169ce48802eb9a85eae8a29a0517c53255aa2d5b811e1ae6ff927a,2025-04-07T19:15:54.320000 +CVE-2024-56528,0,1,6fdbe1e60533120882eccdbb8b3be786f4ccecb99d9355b1489299d0f2810f13,2025-04-07T19:15:54.320000 CVE-2024-56529,0,0,94ecc5e7888c31e5ca74e56cbfc874e3d0b30a8176cba1c69f30edb32e91d375,2025-03-14T17:15:48.860000 CVE-2024-5653,0,0,c6a9df87d03b4f19acef7e9a86e0e953cc0289ec3d2d41a0a6478834d57899a7,2024-11-21T09:48:05.873000 CVE-2024-56531,0,0,9232cb3a908777655dbde1aa267550e5ea5aa16a08b8557030526152c4ddd82e,2024-12-27T14:15:32.503000 @@ -276354,7 +276354,7 @@ CVE-2024-56544,0,0,8a7f14bcfbf3a6d0d0b05eb7bf9e4f8c9bffe91101daa0f73648af61ea7c5 CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b1f2,2024-12-27T14:15:34.270000 CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000 CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000 -CVE-2024-56548,0,0,c8e4a49bbcbdb2242694600292708bfe8652066a1122231314e71fbb4b83139f,2025-03-06T12:50:37.660000 +CVE-2024-56548,0,1,14a3d86f8b0bdb8ac4d7f7f3f3c5048ec2f0658b6d14ef7cce73745ba8762152,2025-03-06T12:50:37.660000 CVE-2024-56549,0,0,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000 CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000 CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000 @@ -276362,7 +276362,7 @@ CVE-2024-56551,0,0,d1f20def6278634dae6e074c624470264118e96aaf74555b9b48cbbe69055 CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000 CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030fb6,2025-01-15T18:35:51.337000 CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000 -CVE-2024-56555,0,0,771299eeff40573e4296b0ad2e0fb338f7b467832b593de27ef0254bfcb2fb2e,2025-03-06T12:48:11.650000 +CVE-2024-56555,0,1,31a983e6f6eeee30dc9610ff0dcf2351497242ffb545ce1496c82b46ae44f237,2025-03-06T12:48:11.650000 CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000 CVE-2024-56557,0,0,b6f2077a24bc7aece861742107839eb3d93539f3aa547a8807f930b55ff613f9,2025-03-24T17:33:22.887000 CVE-2024-56558,0,0,a2c508f2dea0d7a2739bebc725e33c1e9d1966aa1699cd8c5f2db37d86ca2018,2025-03-24T17:33:03.250000 @@ -276400,7 +276400,7 @@ CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979 CVE-2024-56587,0,0,ebd24414141a6331d79514f7e45c789a676abdc5374959e8a3f404efa31874e0,2025-01-31T15:27:30.777000 CVE-2024-56588,0,0,c5e78c53e10590ee4aa67de98f1e9d7f44e9a534f4ba3ac877ccdc434bc6e47b,2025-01-09T16:16:22.040000 CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000 -CVE-2024-5659,0,0,9186c2ed844a66905604a6a511782b1006f766a129245095fcd4e25384d300c8,2025-03-03T19:37:09.243000 +CVE-2024-5659,0,1,5033bae2260e2633fa711fd0f87dccd1398de3bdd28e9baf90deb6c7109536e8,2025-03-03T19:37:09.243000 CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000 CVE-2024-56591,0,0,4ba918238e3f95ae969f7fc6eb9deb7c2f61d316c31ff9b582499d3d15ae9fc6,2024-12-27T15:15:18.383000 CVE-2024-56592,0,0,da483575f709d66f59d5bd6be0ac7fdbfa2fd5f2d9c42677ad036c85af63cd52,2024-12-27T15:15:18.500000 @@ -276434,7 +276434,7 @@ CVE-2024-56617,0,0,0ede6037c7244ffbbde7fb0b0be55151b664fc773feafb1e828ef46f7f02d CVE-2024-56618,0,0,24dc69f5038acb81c0d43fb548859cb5ae4a1aa14085271e2faac58cde3bf439,2025-01-16T16:13:52.180000 CVE-2024-56619,0,0,7d6624961c32d3563b9e50e9b7e9d21de534549fd0b975be6cfee581e0aad2f8,2025-03-24T17:32:36.987000 CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000 -CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000 +CVE-2024-56620,0,1,279d1c9eb23a6ed24d784ce26aa7be5f1439a32e1165476f581528123529129d,2025-04-07T09:15:16.353000 CVE-2024-56621,0,0,9dc8625d157ca3689465a4d24b9a394084ecd0faa4a0ba0158776cdacf5ffdc8,2025-03-07T18:15:45.237000 CVE-2024-56622,0,0,90dd041f66ad97c8c7e4424d08636d2738bbe8a14292241e2b0155ecb704e99a,2025-01-14T15:45:40.167000 CVE-2024-56623,0,0,ea73f9992508782e28e0b2a30af559c0db5714a60552117a01fc21226146582d,2025-03-04T18:15:24.360000 @@ -276499,7 +276499,7 @@ CVE-2024-56676,0,0,03ca2593ba1f6c187c58ffa394f61794a04afedbef78f1711e91091bad939 CVE-2024-56677,0,0,d031c64576aa51d9103334bd3b6d44296f922751ad496ef1b5c9abc035ca6c46,2024-12-28T10:15:08.277000 CVE-2024-56678,0,0,554bb4c5ee3ac3cab6cd723298aa721cc5d2d86cdf2411ba9e227855b8499f79,2025-03-24T17:32:09.777000 CVE-2024-56679,0,0,a8b50f29ec9ebb10dce68f4e73577c16bd0e0f766ad0f27c401a70a0a92887e8,2024-12-28T10:15:09.193000 -CVE-2024-5668,0,0,1672c93f9a054f4f317918353e1959fe5839546d2aa84529c130afee6745fe17,2025-03-01T02:30:46.500000 +CVE-2024-5668,0,1,7fc7ee94ddb275f0c7b2528a34d821e6a9f9f3db35de95f2b533dffc73a65214,2025-03-01T02:30:46.500000 CVE-2024-56680,0,0,43641bba0ba3ae67da52052c6bc9e9ab4c2d1675d79a05a933f2c63476a60674,2024-12-28T10:15:09.610000 CVE-2024-56681,0,0,4e9275a0eb8b11dd88e6a20e57630cad97dede6ca4d5064183bd92c278c693d0,2024-12-28T10:15:09.967000 CVE-2024-56682,0,0,357bbd79eeedd30e99dc810b9d4e5cb5c5f2f9ef4f1b3f169ed1b71125afefc9,2025-01-14T15:44:12.120000 @@ -276516,7 +276516,7 @@ CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a069 CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000 CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000 CVE-2024-56694,0,0,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000 -CVE-2024-56695,0,0,f44d17e1740f4fde794bf10ee841f4e8df9dfa522d43b4b6599844ac3cbb794e,2025-03-05T18:53:08.307000 +CVE-2024-56695,0,1,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000 CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 CVE-2024-56698,0,0,b0822b2dbf0bb8e0372888c50d8faa8376455bb3613d6c81c96710bf547eb6ec,2025-01-31T15:57:29.440000 @@ -276525,7 +276525,7 @@ CVE-2024-5670,0,0,833b3289d1bb921143306eb422f5f9db6cfd66717dc638bdad9a2ca39097d4 CVE-2024-56700,0,0,5f62e13bfa0eea45d94c6d5c9bec178b45e7ae92140fc843457a7394c816c696,2024-12-28T10:15:17.290000 CVE-2024-56701,0,0,d79b5e847459e856711b89867e1c2d3c31f0fd02ba1f2893d458ee4445830b89,2024-12-28T10:15:17.620000 CVE-2024-56702,0,0,64e32363260e59d2f36753395134666ff86c40bd924eac34dc5d750d90200f58,2025-02-03T15:14:18.797000 -CVE-2024-56703,0,0,507cc7114b1b966e31d362552caf02561034ccb5cb7b148444c47bdbc1ef09bd,2025-02-28T18:46:08.670000 +CVE-2024-56703,0,1,d336155b67bbb5b69500dc7d515b42a1b1a248f29f92c63fbcab7a1799723636,2025-02-28T18:46:08.670000 CVE-2024-56704,0,0,fda84b9585d7fe2d80812e683f9a8bd3675dd599cdc9907d9a45b0ad4a180589,2025-01-13T19:55:28.720000 CVE-2024-56705,0,0,d44dcf1285cd38e1d062c7fb5bdaee01c818db7d4cf87dc2b219ad9bde922d33,2024-12-28T10:15:19.043000 CVE-2024-56706,0,0,a4ba04f2ce7d48f15b7673aaedbcd9366ea8d3ba1e2c788436c2ecc7452df2fb,2024-12-28T10:15:19.400000 @@ -276636,13 +276636,13 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3 CVE-2024-56830,0,0,259c990fbcde712792da8c4d4dc09122d403bc6e23fa50f9406a98bd39483261,2025-04-08T09:15:23.627000 CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000 CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000 -CVE-2024-5685,0,0,2d6b631f654a98eb4d420c5da149286286a9d638c829ff7827b94e7c52131735,2025-03-07T16:07:06.043000 +CVE-2024-5685,0,1,bf0c428bf10b4adef7db22bd61aa634a57517dc0b8d548297748e52de7f431f5,2025-03-07T16:07:06.043000 CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,ceba3175c3bfd14790e93d6d60cf2282164bca8098cfa2f452b5343d2a9e086b,2025-03-27T20:13:57.260000 CVE-2024-5688,0,0,d5859f0e06cb4ebc97487fae3042b7b415f604e561186dfe8f72fb7cc29fccbc,2025-04-04T23:46:14.507000 CVE-2024-56882,0,0,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000 CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000 -CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000 +CVE-2024-56889,0,1,5d764a1f6c54d7729b67caf5a6322885e5ae7553ca225013b0e986ff459d2d83,2025-03-18T15:15:58.090000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000 CVE-2024-56898,0,0,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000 @@ -276689,7 +276689,7 @@ CVE-2024-5697,0,0,3f6f305190b00f418c296d7a71b9e9a68afa7dc5c4f3062a64a5e9b3e1dc9b CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 CVE-2024-56973,0,0,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a4718db,2025-02-28T17:15:15.730000 -CVE-2024-56975,0,0,0071cee7474680c346b3b2fad2bfb64294423413b194d68dd676ce33bd94892e,2025-04-01T20:26:30.593000 +CVE-2024-56975,0,1,b24be0b466b1b644b1d4d117f039dfd9856d3208eb6fe4656dfe735dad8d9ea9,2025-04-01T20:26:30.593000 CVE-2024-5698,0,0,44127f605325468d176f78917e01b48d4267668ec2c2568286216f422611e552,2025-03-14T02:15:15.520000 CVE-2024-5699,0,0,1730c9027af76599da8d9065a8791c28c158ddf15d1c6df442aeda60bd4e144e,2025-04-04T16:30:29.173000 CVE-2024-56990,0,0,90cecded0a71bf0c80923b223f7ed0199d6838bdd7d486a962bdef62d3b96ecf,2025-04-09T18:33:54.980000 @@ -276753,11 +276753,11 @@ CVE-2024-57076,0,0,3d600dca907d15d832d9f78ccf39c857b649f12580816a06c04cd2170dd54 CVE-2024-57077,0,0,5eca65a99603ca3c8feea266475689ef5d303700c65f757ddf1e35cc7fd7018b,2025-03-24T16:15:20.663000 CVE-2024-57078,0,0,8a97c0044f9389b0d62cf913697a59c2df3cf0e5be07cc788ae566056503f0a1,2025-02-06T16:15:40.497000 CVE-2024-57079,0,0,950d58a6bff7b558f423fbf38d4e4d4f7ac928a0c2a69dc9c158ca5f36660e9a,2025-03-18T21:15:31.540000 -CVE-2024-5708,0,0,277198536a944775deb4cab7421e27d09aeec44244d8a7c393c8c0d82d0875be,2025-03-11T17:28:36.350000 +CVE-2024-5708,0,1,25e2c30193dfb4957684cadce32071c580f38d44486d23009495a71d10efa7a1,2025-03-11T17:28:36.350000 CVE-2024-57080,0,0,ed4464ba7930048d62a3426c26c5515301e6750f4a9c17de192f847c86cb0b80,2025-02-06T17:15:19.933000 CVE-2024-57081,0,0,c5739c97e1b2c277d19e10adea0e9ee3108f879aff403a774fc0612111bd1d0f,2025-03-19T19:15:43.663000 CVE-2024-57082,0,0,e4f71ce57a79c34c72f0ce234fbf504f73bfa623a35d6784e5d6f316dc7db45f,2025-02-18T20:15:22.483000 -CVE-2024-57083,0,0,cf44e3f2ab214d3aa2f95f055ea69e9deae6cf207e2efb298e6fafef915db5d2,2025-04-01T20:26:30.593000 +CVE-2024-57083,0,1,8984d10fd6d1a5873340c103d9aa9f132594f4ff5e52f7a13dcb342b2aac21fd,2025-04-01T20:26:30.593000 CVE-2024-57084,0,0,184ce2bdca2221f2a823d18b34616bf9939630c2fe93ea49ee84bec6316efcf3,2025-02-07T16:15:37.847000 CVE-2024-57085,0,0,634cffae63828436ad94c08214f44949e421dc94322a29aafeb5b2dc9ced2d4d,2025-03-13T20:15:24.300000 CVE-2024-57086,0,0,135d1edb19b1262b9b20dbcd6b814388e529b0c3b7b36d652139ce6df6ff31a0,2025-02-06T17:15:20.073000 @@ -276920,7 +276920,7 @@ CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000 CVE-2024-57544,0,0,0d7692301f68e1a54af26539095dbcdd0b4efd46060b39551d96338252e7c0b8,2025-01-22T22:15:09.613000 CVE-2024-57545,0,0,920e5d8c212074216a1e84000536dbfa8a4a938f249df8348a02d6e14021f484,2025-01-22T22:15:09.790000 -CVE-2024-57546,0,0,ab132a817b627c329a57476e6f8a899b1211fb5342b65c187f65c86e89e83ebc,2025-01-28T20:15:55.203000 +CVE-2024-57546,0,1,8782c30f2b14934c772f03b82792bf9e3911e6eea53cad0ee68f0eb809a696a6,2025-01-28T20:15:55.203000 CVE-2024-57547,0,0,8a6f220f5442d36379fa6287484d8c28cdbb6d2df21338d63915739665ff92d1,2025-04-11T19:09:56.007000 CVE-2024-57548,0,0,e198541f9320f3d78dbba5d35fcf2bf6e52664e87bbc197937815705861cd0e7,2025-04-11T19:06:19.687000 CVE-2024-57549,0,0,b0c2774d9899627cc5a5b885533212553b2b93df74f074f2ee03cc6ecde4b8d9,2025-04-11T19:04:01.007000 @@ -277051,9 +277051,9 @@ CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042 CVE-2024-5773,0,0,48a7b89c22eea357c17d55a9c448884ba410356aa0d0f8db39ef44b51213a084,2025-01-29T17:38:34.290000 CVE-2024-5774,0,0,486fd90e135c6757b4aafe207d8db6c3d7877d00116c11e1cc252707663db7ad,2024-11-21T09:48:19.287000 CVE-2024-5775,0,0,69e04dc94cd5ee92cee8b04ad6d14e34d62bd23cde812c53b91850c0b7fffce5,2024-11-21T09:48:19.440000 -CVE-2024-57757,0,0,7cd34fdb41fc95a5fd04736013218f33d3c5f5f1a529acb8f07dc485b4575ae5,2025-02-03T16:15:33.357000 +CVE-2024-57757,0,1,6e9c114894cc8fa5727329653e27974b26ca6e0e09b549701972a8ce5519a139,2025-02-03T16:15:33.357000 CVE-2024-5776,0,0,86888fe7b4b003fb18d3d2ba32b739edbd6c9d68a474b51eae89ea9740b7db86,2024-06-12T08:15:50.920000 -CVE-2024-57760,0,0,6ac1b73ea18b1c63fbcf42d9b48d25980b14490c2601fc676873eff8d6602a56,2025-02-03T16:15:33.490000 +CVE-2024-57760,0,1,9c55b63a6a3b236f4eb2fbf17ed632eb1c83bd6fc4a9163d7bea8cb24ee213ea,2025-02-03T16:15:33.490000 CVE-2024-57761,0,0,10459031bffb41647ed06feff1363c39eb2bd4875115f886828d6316399be76c,2025-02-03T17:15:22.157000 CVE-2024-57762,0,0,c128dbb0d20acabbee812a567f099f1c7cec00cfca1a8468fb6200367f81b037,2025-04-10T15:38:17.627000 CVE-2024-57763,0,0,fc533e718e3ae5ba74a9d4ccc15699b3aaaba889772de06edc9d771c277ba57f,2025-04-10T15:38:02.383000 @@ -277100,7 +277100,7 @@ CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698 CVE-2024-57822,0,0,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74d81,2025-01-10T15:15:16.337000 CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 -CVE-2024-57834,0,0,5a87b39773bde7ec95e0cc89e1090b2151e71493eb99b3d3e2c7fa1942b6bb7b,2025-03-13T13:15:42.243000 +CVE-2024-57834,0,1,6f2220bfe2460dd7e490163f349fe13b2856cf6264343769ba21a9102a5b9182,2025-03-13T13:15:42.243000 CVE-2024-57835,0,0,8fef5a61b0668ebf94e5daa6fadb90839e31d09aacd032554c43f144b8a5f3f4,2025-04-08T16:48:07.570000 CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000 CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000 @@ -277110,7 +277110,7 @@ CVE-2024-57843,0,0,a291eea3f115dccf31a54bfbd28c6238356a52daec4febc3cf5227594411c CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20ba5,2025-01-15T13:15:12.277000 CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 -CVE-2024-57850,0,0,5165b1b067bdd241748c5aa93fa04dde8ee44e559a2cfe9e466e04f6d642a5a4,2025-03-03T18:47:36.890000 +CVE-2024-57850,0,1,da1a06adfbd65c1c920244dd1b9e8805748fd40f24d49a9fa2f93e892908b859,2025-03-03T18:47:36.890000 CVE-2024-57852,0,0,f19b9256fed1d0413199f2e2d33e34b963c2188b7176ee982e4664000d9cf117,2025-02-27T03:15:10.977000 CVE-2024-57857,0,0,cf138cc0e0261ec5dcc7660d88841b6035dc2c547d16329422febda9654f9c14,2025-03-24T17:30:34.487000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 @@ -277147,8 +277147,8 @@ CVE-2024-57898,0,0,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52 CVE-2024-57899,0,0,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000 CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000 CVE-2024-57900,0,0,47c59939a517ef6e55e93927c3b37d9d833e39af74439b35b5240b02f60aed6c,2025-02-13T14:16:18.027000 -CVE-2024-57901,0,0,bafc5dc6b176a8ce6f7cd613e9c5b430c6da11a437c4c43ebbe8cbda91ff47cd,2025-02-28T18:48:15.100000 -CVE-2024-57902,0,0,1e8b762bdfef190a92cb9451c2913f0fdd7f0d7abffd6279f53502bf4917827b,2025-02-28T18:50:45.847000 +CVE-2024-57901,0,1,6a8af591915bb663bc874230a9dbd7a7bb8bdfcdd10acf755214b9ed5885bd08,2025-02-28T18:48:15.100000 +CVE-2024-57902,0,1,498c0d387ae1a0e63c30fc2b70726ca81c8f3ebf66c89b52811ea3c3ae4c5d7a,2025-02-28T18:50:45.847000 CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000 CVE-2024-57905,0,0,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000 @@ -277160,7 +277160,7 @@ CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491f CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000 -CVE-2024-57913,0,0,93be5a8adb340b56943053df45fbb86105ddbfe5c9ca1e9ede5d13dc90b662bd,2025-02-27T21:59:56.660000 +CVE-2024-57913,0,1,4c6dbb955d02c81f35f5e732e349ef04029ac595a8066834ac3e7cfdb0c114f4,2025-02-27T21:59:56.660000 CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000 CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000 CVE-2024-57916,0,0,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000 @@ -277170,10 +277170,10 @@ CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000 CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000 CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000 -CVE-2024-57922,0,0,91890488cd9bba577518b0d113afe24fb208bee092037330cbb2ad337fd17fc8,2025-02-27T21:59:28.277000 +CVE-2024-57922,0,1,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000 CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000 CVE-2024-57924,0,0,c92a50e178b5d221bdeae6b80dfc50cafc870e22fd3eee5233088f1c4de7f103,2025-01-23T17:15:21.070000 -CVE-2024-57925,0,0,95e2051d9a2114c84a86203def74e51a8161fe2f7c12a0f6114195d45b580637,2025-02-27T21:59:45.447000 +CVE-2024-57925,0,1,09b597c3324950a2da762599750ac4c132e6d687011d020c085b3d3e92f66557,2025-02-27T21:59:45.447000 CVE-2024-57926,0,0,acde42d99502e9437f1eb72cc2ed9d32a6e107e7ebb4c18782507cb6244b42cb,2025-02-11T16:15:49.340000 CVE-2024-57927,0,0,e981258a896af5b5f2115dd0b6b8324ff06b2655c23229e6cd3e29f8fb5fb076,2025-01-31T15:29:09.497000 CVE-2024-57928,0,0,c958344925b23189b5084226c6eebf997feb724091f51913b4610fc8bba5819f,2025-01-19T12:15:26.903000 @@ -277188,14 +277188,14 @@ CVE-2024-57935,0,0,8b3eb97b6b95c3fe9d0c269036f5d7d9ad4b4664482a4f748b3e7a6a9e25f CVE-2024-57936,0,0,76bb9a17847208e201d8a03062287095715af2de891728ec102a50fec66b64aa,2025-01-21T12:15:27.257000 CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000 CVE-2024-57938,0,0,022de8c3b6d7b500c1435550930859d5402a56a98c16bccf8052dcc8ee4769e5,2025-01-22T23:01:40.253000 -CVE-2024-57939,0,0,bfe017f59e157b8901362ee92c57f9792b61ce4918f33a1fe576762909d19689,2025-02-28T18:58:55.690000 +CVE-2024-57939,0,1,2cbd01037787f1924a7556d06d61d4e25eb993431ea292fb8078f3372fd3db94,2025-02-28T18:58:55.690000 CVE-2024-57940,0,0,4347ecfcdbbcbfcdebf2261360777fcd6563cc5454a9bfae845b31eec45db101,2025-02-02T11:15:14.547000 CVE-2024-57941,0,0,190517d4aefb28eedc9bf0b3a946b8bab0775c3c00af67d3032e3eb13313e131,2025-01-21T13:15:08.640000 CVE-2024-57942,0,0,674dcdb666d8ffd6793b2df8b7ea512b83519af3dc884bfce784c82a02be56e2,2025-01-21T13:15:08.743000 -CVE-2024-57943,0,0,6061a9cebb4ab9ad302ea400299fb70afc02aff4d7d16499e251e8e902f11dc3,2025-02-28T19:07:31.883000 +CVE-2024-57943,0,1,756a954d8f61a35f4ab2246854db085e0f7d40cf0d5dbf13b0afe5334a2ebe7f,2025-02-28T19:07:31.883000 CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000 CVE-2024-57945,0,0,ba7b321eb8cd0d1e792a1582e6a8309da43ab8d76c6981c78527fc0b4c2a565b,2025-01-21T13:15:09.033000 -CVE-2024-57946,0,0,38618e1343d81b3ecd27d742e11e58883c5e8c1f250fac4a8dda17199410d598,2025-02-28T19:03:34.977000 +CVE-2024-57946,0,1,8dee62ac54d3fd2dab4b1fef2a419a953ce178863f68dc55227a67980f2b166a,2025-02-28T19:03:34.977000 CVE-2024-57947,0,0,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc2fc,2025-01-23T14:15:25.293000 CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be331,2025-02-02T11:15:14.713000 CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000 @@ -277234,21 +277234,21 @@ CVE-2024-57979,0,0,96cddde6533cbcd6c524a6278e785ce3597ad87e8999afe7d63030e2df266 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-57980,0,0,180c3069006d1537b235e2bab3db62c5a65a2ef9d0e96d9a450a2d6d16e7964d,2025-03-13T13:15:43.023000 CVE-2024-57981,0,0,fd8fd2c54a6934bf3c4a0472f7243014ef1a76d7fff6ef8983f14fd66555273b,2025-03-13T13:15:43.150000 -CVE-2024-57982,0,0,bb7853d2b0d2098b2497947df0c132a1ccdbf08824e410c41a99faa1337b3d1d,2025-03-07T15:09:56.020000 -CVE-2024-57983,0,0,a34ab02e35f97fbca2c76e1af5917d2df5c48bbfed6a7f5bfbf98e1c382fc6d1,2025-03-07T15:16:36.573000 +CVE-2024-57982,0,1,9785b701db405c3d3b3d01a53e1fd9738fcd620044f7cd960c155bcfc76e116f,2025-03-07T15:09:56.020000 +CVE-2024-57983,0,1,0ddc3d4898e484dc31c8ba30dda53bb1f62e0510a548f22c3c748168df9dba6b,2025-03-07T15:16:36.573000 CVE-2024-57984,0,0,8f33db43d98aa2f14f3041aa2e4b40c30264345b08505bccdf59bca1609db59a,2025-03-24T17:48:09.487000 CVE-2024-57985,0,0,3c79f686f7fdd31985f81f631dd51fc60d2624e89a169ece6cd5d12af0a226b9,2025-02-27T02:15:11.703000 CVE-2024-57986,0,0,0aa9a683ec90ace4a03d558a48e13b872c23c7177d32549e3486b740d2d39479,2025-03-13T13:15:43.287000 -CVE-2024-57987,0,0,612945716c6ce9bf638dcd5f6c71035ec9baecb3faa3787163f94b880aa0f5a9,2025-03-07T15:06:43.463000 +CVE-2024-57987,0,1,7de25ef3aaebfa08cbe36280e2ee2bf370a1b4bab5e47d7e98bf29aed873aef0,2025-03-07T15:06:43.463000 CVE-2024-57988,0,0,905434311c999ef0c7d17eccc8ea944347c961db53a9bac6a836478ae500d087,2025-03-07T15:05:27.500000 -CVE-2024-57989,0,0,0cac32b57d3773dc1f48a09958d7a8255242e3c77b34ba5d2437e425e7ca370b,2025-03-07T15:04:54.687000 +CVE-2024-57989,0,1,4068abebcac7e18e8aa703346986166cf2fdfe0a91c12fe2f02d05dd3ba39abd,2025-03-07T15:04:54.687000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 -CVE-2024-57990,0,0,0fef1f9109d141f4358fc0a219e819217975ef40a402555ed4292e7c11c018bf,2025-03-07T15:04:17.843000 -CVE-2024-57991,0,0,534f781c19a4bb8330a13e15329c1a72d531567b16e92fa62231e04bd69279ec,2025-03-07T15:02:08.073000 +CVE-2024-57990,0,1,e2e0482239f221a79cc51ee87b9a352faef6e2cc60a5afaeb67dec18620eb2fa,2025-03-07T15:04:17.843000 +CVE-2024-57991,0,1,140c2747113fd14b14b5902dba0e0f76eeb4db7b316f4d88df2bdf3300c76d3a,2025-03-07T15:02:08.073000 CVE-2024-57992,0,0,b486ed157c0e9dc1e0f617cc27cb37e59627cf18b6c3ed0a677a0e520dbc7ba6,2025-02-27T02:15:13.210000 CVE-2024-57993,0,0,d0bc8e0fb12400c3be039905539846f2055137bf1d0507e51299039c83fcf26f,2025-02-27T02:15:13.310000 CVE-2024-57994,0,0,b57cefe8103f1cdb7487aafdaf48c9648c8339c2c86607ad68f59782e856f288,2025-02-27T02:15:13.417000 -CVE-2024-57995,0,0,cc35741a4bd61d68eb305f92b00507031d72c7afb1fe8e7f8dfa6462223e63e1,2025-03-07T15:00:33.117000 +CVE-2024-57995,0,1,72946462b0f0e55068bd901f8872da04f6b674f7ac61c3114cf9361c7de9d893,2025-03-07T15:00:33.117000 CVE-2024-57996,0,0,05dfcf52a77d5f14e13819e03fdd55d8ebeeec16de3d22480af6e475445b7df3,2025-03-07T14:58:37.277000 CVE-2024-57997,0,0,8bb46a3bd71deb9503c7117821a798f0f30100646d4b5e36a8f9d1e65ec0397c,2025-03-07T14:52:55.130000 CVE-2024-57998,0,0,9a2f5b234a45c1aa14534a8e802d2d77984aa61066a605cc84fb19e78f6004c2,2025-02-27T02:15:13.820000 @@ -277256,43 +277256,43 @@ CVE-2024-57999,0,0,e7fa5ddca4736c27db0ad8d50f08fcd68766a710317c48d5881566d7ef301 CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000 CVE-2024-58000,0,0,5f105536bb56277a7d83d81335424f733d140e023891ee7eec23c4f28837b558,2025-02-27T02:15:14.033000 CVE-2024-58001,0,0,45ec576af22f9ec78bffc6338d5785b2571cedf5a7ebe71bb3b6ca208b701584,2025-03-13T13:15:43.413000 -CVE-2024-58002,0,0,9c563c7f2cf700c7491b018483a3903112a52118e0877dd041d5dcc3cb35b1c9,2025-03-13T13:15:43.530000 +CVE-2024-58002,0,1,978ec0ef64ae9974f5464f68edf132089d15cd334fb86b728bb8a6855786754b,2025-03-13T13:15:43.530000 CVE-2024-58003,0,0,a8ce4012883eb872902e7fcc6963e50daf950b3a6e45b1c9ea8a76973861a763,2025-02-27T03:15:11.277000 CVE-2024-58004,0,0,0682d94a03d803f846c4d3ac83d38ab28866c7c5726895093f3c5a114f1ff8ae,2025-02-27T03:15:11.380000 -CVE-2024-58005,0,0,8251aeaaa8b79cb08808f9464287ea4b3fcd8be08c0c0fcb244e992df57d02cc,2025-03-13T13:15:43.680000 +CVE-2024-58005,0,1,7746edbda53be278fc94c90e5fed8c09c74a6cf663e654d8016640767ec13b15,2025-03-13T13:15:43.680000 CVE-2024-58006,0,0,202ad1289d3db423313e951a6d9d93c246934b3ab03b269061ae8d4fd97d183e,2025-02-27T03:15:11.583000 CVE-2024-58007,0,0,efd19316a37d967ff567720efa4137a4e3eb1b4286f8dd4ee7ec9e22c3b78266,2025-03-13T13:15:43.833000 CVE-2024-58008,0,0,8201974c431159fce436624288a63096ce7993ce6d0a5e508b6ef70f5211a3b0,2025-02-27T03:15:11.780000 CVE-2024-58009,0,0,192c28821126416902287a5facea8187bd39b867cb892e06e65f91aa75db8cce,2025-03-13T13:15:43.997000 CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add0a,2024-08-12T13:41:36.517000 -CVE-2024-58010,0,0,c68063425e292ede7d75b773cf5c14d709e93e6fb27a73da98fa23deb48fd1c0,2025-03-13T13:15:44.120000 -CVE-2024-58011,0,0,09fe40c26c133ec9625944a8a173c726bd57b97004b31f11435fc42be8c1be8a,2025-03-06T12:49:19.510000 -CVE-2024-58012,0,0,3810be71330958db9148c5c979a8e718d1fb44e319cf8e6f338ec41af24b5c06,2025-03-06T12:22:18.390000 +CVE-2024-58010,0,1,0ca83ab3cb5c4fa6837f1aed8e5b983844273805c768bda9ebf55aae25cff809,2025-03-13T13:15:44.120000 +CVE-2024-58011,0,1,080bf4a67fddacdc8033cb98008852f629a173cd6999e58d232ae17e2caf9de9,2025-03-06T12:49:19.510000 +CVE-2024-58012,0,1,0945d2f4046b0087a6940aa0901676fb52bd6585220e8f1defde80843ec5630b,2025-03-06T12:22:18.390000 CVE-2024-58013,0,0,e729f52b90e7582d6cb1ea3c08013b1ef1e1df01ca579c93e660ba4acc0e99cd,2025-03-24T18:18:44.913000 CVE-2024-58014,0,0,6e84de3bbc7acd0fe2c8b61b770fe8281dd4fed0f72343e37bfd875d3771c366,2025-03-13T13:15:44.270000 CVE-2024-58015,0,0,0f9f78f9c8fec78fae5dc506d060d95aec2ab2a22ea0b6cfcb54b63dd8a9da89,2025-02-27T03:15:12.493000 CVE-2024-58016,0,0,b26cc46b0ad25d9deea55697399148d14b34b4835f2722367ae401fc250a66ef,2025-03-13T13:15:44.400000 -CVE-2024-58017,0,0,789614142887f2d36c534c194201fe867b117eb88b4ac39781d11018cd8750a2,2025-03-13T13:15:44.530000 +CVE-2024-58017,0,1,f3a6408eaecf0e922e89349effb24af4d6891137e57dbdaa158248784a468a6c,2025-03-13T13:15:44.530000 CVE-2024-58018,0,0,026824f649989c4abbe72aaa60ad858b1681ff1e34df3b7d0389187c7a5f9de0,2025-02-27T03:15:12.797000 CVE-2024-58019,0,0,c7b0fc813a47c1985df395fc8df5ec81c10326f5c473ed9ebb6fc3923a6c3ae3,2025-02-27T03:15:12.897000 CVE-2024-5802,0,0,ed1e006d30c7c5946493a81ab698e68d667bd8286338fd33acfdb16c65749887,2025-03-13T14:15:34.597000 -CVE-2024-58020,0,0,640cc4e2b2b09554d641016f674d54bf8213c4893a5aefc50e159973d55086eb,2025-03-13T13:15:44.663000 -CVE-2024-58021,0,0,9fcd37a62e048a7adc025ac2478c5d8995734badf43657fe854aa6334c38ee58,2025-03-06T12:23:04.043000 -CVE-2024-58022,0,0,9167abbdc89cc3d0f3a754a66b9a4302417364f4431ff1ac59b116865608bbad,2025-03-05T14:57:29.473000 +CVE-2024-58020,0,1,9a71f8060bd996d185a7a775801f8707d56f8c6ffec3bbf733d8d03c735d749a,2025-03-13T13:15:44.663000 +CVE-2024-58021,0,1,18d157a8296b237d5d3c5c4acce47484a71480eb4ed3e22289e01d7c06fcc642,2025-03-06T12:23:04.043000 +CVE-2024-58022,0,1,e52a80f1050e6781b17659c7bde6dc106a436ea7bfdb2846910e09ec25c9d812,2025-03-05T14:57:29.473000 CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974d3,2024-10-04T13:50:43.727000 CVE-2024-58034,0,0,caa07d6689090a7aad2d3a35b0a554d38a0271801636901e4b47dcf07f26f2c2,2025-03-21T18:31:13.540000 CVE-2024-58036,0,0,3e8d6c0d4f05c6a147247d4b4879b6b44882b72428c8ebdd7bc120aed4a36628,2025-04-10T16:27:31.893000 CVE-2024-5804,0,0,2f00fd3e9947e9e26596c3d44370745abf63c8732a08c44c5ab0acfd9a8ea957,2024-11-21T09:48:21.677000 -CVE-2024-58042,0,0,6046ecd911da87251e1a69d7019bf86f8d3890f32138388a40753ddbad8db745,2025-03-05T14:57:22.013000 -CVE-2024-58043,0,0,2a2b5c147e8b5dbe0aae45b137efcf98e8486df096d1323cad14ac53eb7e554b,2025-03-04T18:38:11.320000 -CVE-2024-58044,0,0,11c05bc4c5f0210d998dc6fe4fff811b32610dfdc50bf725352cfd0c6104b023,2025-03-05T13:56:06.420000 -CVE-2024-58045,0,0,cd3091d6135a1a1e54d952d0aedf48c0cf30ea3e102026a6e19fb108d46667d6,2025-03-05T13:58:21.363000 -CVE-2024-58046,0,0,e7d8cd322a8b106428c4fe29ea71aab639637e03b80e96ff217df0dbd9997fc3,2025-03-05T13:59:32.013000 -CVE-2024-58047,0,0,b56d281398cbfa48acb33dca33703b7b8784368ce9ae84bd7f6b1103e1a28132,2025-03-05T13:59:44.860000 -CVE-2024-58048,0,0,e0a710c2d85209fc2d018d0496baf44480cb3c4fa840bde8226edc6d937ff39f,2025-03-05T14:03:00.320000 -CVE-2024-58049,0,0,d01ae50a0ab45f1ddb2e9016295e5f2c80b6525a6af933043277c932cc353f14,2025-03-05T14:00:11.257000 +CVE-2024-58042,0,1,094d3f29a2a15f7d2be5ce324c21912883b182e5d65def5874577dfbfd485550,2025-03-05T14:57:22.013000 +CVE-2024-58043,0,1,b0bc20524e409f9afd890b3c07f9b4253c1e6e8b07678e6e2857e88cb76ec738,2025-03-04T18:38:11.320000 +CVE-2024-58044,0,1,2832fb8d0226e382208057b649b5b7ed74463a24083fd43db30c44129254abef,2025-03-05T13:56:06.420000 +CVE-2024-58045,0,1,e96e83781574a81d7cc317b1371835053b0fca9ec703d18bc618a2c50a1d6b39,2025-03-05T13:58:21.363000 +CVE-2024-58046,0,1,00fc4d8dcd56c7208c670f6f93beb7ad170f9e6294e32aaeed2fe9d694ea7121,2025-03-05T13:59:32.013000 +CVE-2024-58047,0,1,bdabaaa888af35a20695ce9861c4ea3cce854f144e3b851af7abec0717826dc8,2025-03-05T13:59:44.860000 +CVE-2024-58048,0,1,be00f202bbe4d806e001d977f29c1d3d74fe5e5e510c71716f97d203ad509f8b,2025-03-05T14:03:00.320000 +CVE-2024-58049,0,1,bc1fec54ecd7c06bc0d63d2c67cbc101a0d2e268d06c28c0faff3ada3c2707f0,2025-03-05T14:00:11.257000 CVE-2024-5805,0,0,fce2cd9169116102e5375089f5975fe2795253d6c4b763ab35cc7d32ac26b7a6,2024-11-21T09:48:21.803000 -CVE-2024-58050,0,0,5996b402b76e81cfc465e5ad5efdefdab176e2e63d8b9c20cb032ff52ec323c7,2025-03-05T14:00:40.613000 +CVE-2024-58050,0,1,92ac4c49599f1cb9d3ef8807eb9d909d67c7cc6c7e87bcbb5fce2aa84e18957b,2025-03-05T14:00:40.613000 CVE-2024-58051,0,0,fed77c633cecd438e98abb901c0bd8ac6d5bfb351c004d26c09359ffb04cc888,2025-03-13T13:15:45.027000 CVE-2024-58052,0,0,830a9eba514c010ccb3dd417ae08df3effd2496d067a9bc63a9053b1e9a409c3,2025-03-25T15:00:52.263000 CVE-2024-58053,0,0,f62d1d2922dcfae3136707d5fa229b629e6521f92cfa56d0948ecd1a29d1217b,2025-03-06T16:15:51.490000 @@ -277303,7 +277303,7 @@ CVE-2024-58057,0,0,f3cd9440cd7e995036afcb2d792ed48a0003743d6354deefab7c06328af69 CVE-2024-58058,0,0,b6d6ff97819fcea0fa0bcdd43d2be949ca47b6d3c4753b6ae986eebc367daf40,2025-03-25T14:35:24.150000 CVE-2024-58059,0,0,eebbf3e161285bb667a58ebbe9a52d4b206d81c8de267ca458e3aef403165a18,2025-03-25T14:35:53.557000 CVE-2024-5806,0,0,5ac9637d8c764ba881b38672e3b3265f75ae0c44c191480b6554928fc9eb1283,2025-01-16T16:57:19.660000 -CVE-2024-58060,0,0,fba995a2e10d3cb17ff23aaf4c17b6553141574640e54c8a2803f2b7105d8a4f,2025-03-21T15:41:13.050000 +CVE-2024-58060,0,1,4ad6a4e569f3d564bc503a9193d4a80bbabdff5ac681bb24553050840040aa83,2025-03-21T15:41:13.050000 CVE-2024-58061,0,0,face010c4f0c4030256d117a47b6f596b05331c64742eb8250d630ba5a731fbe,2025-03-06T16:15:52.390000 CVE-2024-58062,0,0,2c8d0d68b2ebd1ee71a9d49f7226198c3fed9e4d55fb0e3801e5d028b390a53f,2025-03-25T14:36:55.653000 CVE-2024-58063,0,0,0ac58a3ffc9f8bf5c559a3e869d1e43e862ee25c36b9e03b6e622463db014a56,2025-03-25T14:37:12.963000 @@ -277336,8 +277336,8 @@ CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5 CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000 CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000 CVE-2024-5809,0,0,d3a3cb96d02b3d9c2efd17f0531d777c80fde692d386c7f6a56c47f2ca5601d8,2024-11-21T09:48:22.387000 -CVE-2024-58090,0,0,183d22568307a48e8c5caa9873c3295b991f4475fb55b519f064914282a269b6,2025-03-27T16:45:12.210000 -CVE-2024-58091,0,0,6af7b01c894e8a2922ab2a3e60c7f6d427f44368d0d26f7e723a9fb559b02a15,2025-03-27T16:45:12.210000 +CVE-2024-58090,0,1,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000 +CVE-2024-58091,0,1,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000 CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000 CVE-2024-58102,0,0,dd42630c366d4fe40426e956fe445b75d82fa202b00380f941f341e0dcc8270f,2025-03-11T08:15:10.917000 CVE-2024-58103,0,0,10a7b3d9d518bc786063856000a89f8cacb058ea7d9597066e2f5581bacc0a09,2025-03-16T04:15:12.313000 @@ -277780,7 +277780,7 @@ CVE-2024-6250,0,0,64e38818bc74de43d31b5d42abc6e035bdbee3a486a9da056babc0b37acf9b CVE-2024-6251,0,0,9498c32681e9a34bd32cb343819aa9d9080d48129ad2fb707bcb97cfc515d94f,2024-11-21T09:49:16.657000 CVE-2024-6252,0,0,d6aade04b76abc08072f1b979adea8a8da50e2b56fe59c5fbc009a561bd28558,2024-11-21T09:49:16.820000 CVE-2024-6253,0,0,b2d134d4103ffe6238aa672eced742a772b201e719555dcf154f2eafce9b2a12,2024-11-21T09:49:16.977000 -CVE-2024-6254,0,0,4054a7bc4a965764d0ac8d5a5539bbffaa1af5c3946a634fb0e57beba13a187d,2025-03-01T01:24:27.750000 +CVE-2024-6254,0,1,d7fe7a99e438ca8c40e9cfb75adafb9e3affacd61fe3cf3c5666495ee755a956,2025-03-01T01:24:27.750000 CVE-2024-6255,0,0,7934585541d92113fe6420b5084e6601c8b8c89107c549f987460fa5571a4183,2024-11-21T09:49:17.200000 CVE-2024-6256,0,0,e4ee0452f80dd4d49924af3e97cbab109733b0fdb5a0af3bc85d72f1d918758e,2024-11-21T09:49:17.330000 CVE-2024-6257,0,0,3c450049ad1a84e0b297a8d37be25b1d0e2549032909d0064d332ba84cab2615,2024-11-21T09:49:17.460000 @@ -277842,8 +277842,8 @@ CVE-2024-6312,0,0,0c54128647e80712d90400a801d9880628c2b1741704a31bdedfcfd80d65d9 CVE-2024-6313,0,0,753b75f17a3f3ec57fe609d32a2c3aa9af71672c8858deefb2e7f96177c2545e,2024-11-21T09:49:24.717000 CVE-2024-6314,0,0,bd7e8659eda4fe06384f4f5f59a460bbcd88d9b591229c72a52e844ac7b92683,2024-11-21T09:49:24.830000 CVE-2024-6315,0,0,ef1ce4f4ba0131e5f3eff0f1603994118387c059d09ece1613d98d76d07a486a,2024-08-06T16:30:24.547000 -CVE-2024-6316,0,0,03090969e7b98a1cf291ca379af2f4e6245a0e7b367c0bf8ce4e8d057e64be76,2025-03-07T17:44:36.277000 -CVE-2024-6317,0,0,e78b96cd622dd4b398fd6efac71b1c65137cd2bac5b862d0b4db15431378c962,2025-03-07T17:48:48.590000 +CVE-2024-6316,0,1,3147d11f1cc9656d2c74e4ad261756be6550bbccbd1a46c4f6e41a3f87e0c68a,2025-03-07T17:44:36.277000 +CVE-2024-6317,0,1,7dc773a366a0327eeeb19e8fdb002fa2f1d6a6e298f5964606097af856530f9e,2025-03-07T17:48:48.590000 CVE-2024-6318,0,0,5f106f35b92dd631584d337f663b474255ddd50a7f1f8610056f45ebe6db8c5a,2024-11-21T09:49:25.283000 CVE-2024-6319,0,0,8b351291dae58ab1dd68bad56bbe84e03e46abfdf9784d16d4a3cf75ceba1734,2024-11-21T09:49:25.423000 CVE-2024-6320,0,0,b473609913519a737186d8d4224686486fd33ffcfab73ef05e3c3cf037998af4,2024-11-21T09:49:25.550000 @@ -277871,7 +277871,7 @@ CVE-2024-6342,0,0,5b36cb86a48e9ece11d2d7ac640a3499e17785561bf64f597b63d3dde4a151 CVE-2024-6343,0,0,c44f988264d59a559d293fe3987ba513a727518faf7848c3fce630569f2f5f3d,2024-12-13T16:14:42.787000 CVE-2024-6344,0,0,3b8706c5623c11b2b84c20d28cac71b6a22c60d3cc5994e917c618ac150c0d93,2024-11-21T09:49:28.020000 CVE-2024-6345,0,0,883e766c4a79591f1642b35a3e300d939bb720f28c7ab089eb792922769042ba,2024-11-21T09:49:28.170000 -CVE-2024-6346,0,0,e82806d5d723346ea5ad446e4b75cdf6fb2a89b07a7f1e8376fed281e8647e5d,2025-03-01T02:17:52.283000 +CVE-2024-6346,0,1,9af6ee367d0fcb712123c83677818fc728b470690045cd4bd57674cb0f6789c8,2025-03-01T02:17:52.283000 CVE-2024-6347,0,0,4ef8bbcb4c1fc68bc748b19bda3328af690cf8f2db990c62d661ae1047ab7ece,2024-08-16T14:33:42.730000 CVE-2024-6348,0,0,cb14a2a370adb46f804c5b505743f44684b9652db00c112d658afad7de0275fa,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 @@ -277938,7 +277938,7 @@ CVE-2024-6412,0,0,17fb16d5f528a280f2b0c9c641e625a33a0d132133fdc0f6fa6567342a855a CVE-2024-6413,0,0,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000 CVE-2024-6414,0,0,680b93173475ddcaa6adbc0944f1e5c3530a7e69a2cc6fb17e05baeb0ac3d8c6,2024-11-21T09:49:36.473000 CVE-2024-6415,0,0,da9029682828856895395262c0b9c43d7a83489985ac7e8e0dc7bf925e3b7526,2024-11-21T09:49:36.620000 -CVE-2024-6416,0,0,275ea4d34d03fdcace2a01bfcd9a8bb7823fa67375ed3a0a665246471e5919d2,2024-11-21T09:49:36.757000 +CVE-2024-6416,0,1,95da5dc4602444f8a6adc7e93abbbb4bc7ae05b073074ff39efb3793138b7173,2025-04-05T00:02:56.323000 CVE-2024-6417,0,0,db3367c895277092cdfa2c7cd980a8ec1c3c050b805c9b054da09045993f2711,2024-11-21T09:49:36.900000 CVE-2024-6418,0,0,a28ae95aab5d3d50125638889987fa1bfe6249799ebd24f1b183a66d577bccf3,2024-11-21T09:49:37.057000 CVE-2024-6419,0,0,dc7438b52317552f7082e2ad683311c56f135ba4072364671a24f51fff8d4847,2024-11-21T09:49:37.227000 @@ -277987,7 +277987,7 @@ CVE-2024-6466,0,0,99c40e8b7e6b5842d2d8cee45ed38675d3f81e54ab8f191429983e278d1447 CVE-2024-6467,0,0,9106e28416ddacf000ab37b1593381e2fec3faec61ecd6e9335c0f9dfca2fd14,2024-11-21T09:49:42.217000 CVE-2024-6468,0,0,bf6dfce1135e8cc0869c78add4d8cc7410dc08a391c67b63c78ccc7aa0f1b72a,2024-11-21T09:49:42.340000 CVE-2024-6469,0,0,27aec94801e6458de7897784e45b6fba900dcf8a6c19e5fb32c00c0fc413680b,2024-11-21T09:49:42.447000 -CVE-2024-6470,0,0,506df02270e7cf88abbdc480d4488fec4d4fa442138e417d2860120816f23b68,2024-11-21T09:49:42.603000 +CVE-2024-6470,0,1,4f957dbc6c0566b1a0564b14c5f98308834ca39c687e8ec1f272394974ec751f,2025-04-05T00:09:09.730000 CVE-2024-6471,0,0,44599ea735cf4c0f59a4c46eec9f2dcd408bc3c08f93c8063ba5adf763f68b2c,2024-11-21T09:49:42.740000 CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136d1,2024-08-06T16:31:05.780000 CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000 @@ -278010,7 +278010,7 @@ CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff162 CVE-2024-6494,0,0,3bc4f0180a69aa3f64abaa1ead88385ae41dec325245f344090d2b4c7372db33,2025-04-11T15:13:36.673000 CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000 CVE-2024-6496,0,0,8ee0438cf6f5aca09ea72030714574ba710a867e64257498ed88d82c0fbc800e,2024-08-07T14:35:07.403000 -CVE-2024-6497,0,0,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000 +CVE-2024-6497,0,1,4fae28ebc37bcc10f5e387db8c04e6677ed2706ee16fd816c2602ebcac0a6d0a,2025-04-05T00:23:47.693000 CVE-2024-6498,0,0,d6615d703509a8a6bb0fec23352394e0db77972d8a99657bf636fa92bfdaa089,2024-09-06T17:35:19.293000 CVE-2024-6499,0,0,35c38f947633fe6fdfe909156ebfa6cfdc8e69372314f896d5eab4274f10b227,2024-09-26T22:07:50.040000 CVE-2024-6500,0,0,fd0ae55a5b49a6356709e92760fc530e49b2c4c056147200f16a6a1f57743bcc,2024-08-19T13:00:23.117000 @@ -278033,7 +278033,7 @@ CVE-2024-6518,0,0,4e84a8df3524cc51f2eb188e4f7ff0a486daf850e4e0aba73af40502ad8a2a CVE-2024-6519,0,0,580a9fcb782c1b01a78347d9166f9a9241f42c64f3a3a81650b9c371f609f89c,2024-10-21T17:09:45.417000 CVE-2024-6520,0,0,260c95196f18d1f28d57c268cd3df4b10832d977cbf30bf5f7123f53f0e76f8f,2024-11-21T09:49:47.620000 CVE-2024-6521,0,0,22ef8d0748bb5ab3666135dd7dbdf679ff5d4c4314901dc266913e0899d97fc9,2024-11-21T09:49:47.753000 -CVE-2024-6522,0,0,3108695b8f32c75174084ac6d981bcc5e5f1db0e770624a713ccfa5a37ff4f32,2025-03-01T01:30:10.390000 +CVE-2024-6522,0,1,563d094d8643216baefde95a7eefe50999581c53210c7d16f9c0c13bfa6b1f1d,2025-03-01T01:30:10.390000 CVE-2024-6523,0,0,5f47d75e68270c13224bc1cb0dc18750216fc2682b849ba24fd176c4f27d02b9,2024-11-21T09:49:47.960000 CVE-2024-6524,0,0,064d68261b761d52fbffe0401ba09d1965fa54c1226288c57b48920b13cd41fe,2024-11-21T09:49:48.110000 CVE-2024-6525,0,0,f6480cd2a9a73dba65922bafbc051b6ad4232f151162c6be51b4b1969f84f3a8,2024-11-21T09:49:48.273000 @@ -278140,7 +278140,7 @@ CVE-2024-6634,0,0,f03f7665ce29f89692475d4e7ad26f71c67c7220472b79a61d39cb4d5d4e01 CVE-2024-6635,0,0,e3e6a83352df325310bca2cf1f0aa810f4becb732ae576086becea9b0f074c36,2025-02-11T15:39:13.527000 CVE-2024-6636,0,0,119fec91aec708ba450bc164b7d265343c048fd6420a6e92527fcd7535ffd644,2025-02-11T15:41:28.280000 CVE-2024-6637,0,0,8cc2b62e3688860186b71fd0580e2f73983cac68a5cfb5caafa8fa3b703f0149,2025-02-11T15:43:25.850000 -CVE-2024-6638,0,0,92c0b617a8feb472e8dd02b7fd24b0bc5ddcd75b1488d94f45e1fc1fdaaf075d,2025-03-06T19:32:31.013000 +CVE-2024-6638,0,1,6706b2c01411c631e4e793b06fca98c24a21a5fe2a849778d8371de4f9dd71b8,2025-03-06T19:32:31.013000 CVE-2024-6639,0,0,b6af8e6c4b9702263f02409397a7833b6c6b23578255eef1153cdb5aefb44942,2024-08-12T14:46:23.463000 CVE-2024-6640,0,0,74b4515f6b06329765182031b4f6c4b2c94e8f2b65e7f1f9795a0017fcaf65ca,2024-11-26T15:15:35.053000 CVE-2024-6641,0,0,3f8fff3477097b21aef67b0f7d7d46ad90eace6d6a1177cfedf4b60ca081218f,2024-09-25T19:07:40.013000 @@ -278200,7 +278200,7 @@ CVE-2024-6704,0,0,c5350d7be84f9807d7884c405ab268f3e323b6c5d9f3e7d8eec75b27351703 CVE-2024-6705,0,0,44dc9cc67853da80020e3159d89e61e2953b5a07fd227ceb6f6c695d3a3737f7,2024-11-21T09:50:09.370000 CVE-2024-6706,0,0,84671454775dde79ed78cf9a88d03e049da529ab8f19c88357984fca4748e308,2024-11-21T09:50:09.480000 CVE-2024-6707,0,0,329427c8ea01aca18626eb8ed91b615765294ff8fef9da0930ca4b77f71a396a,2024-11-21T09:50:09.680000 -CVE-2024-6709,0,0,a01b1b2a7b7274e6fb91fe41a035f7ef41858d692daa942c356aa96abef9c1be,2025-03-01T01:34:10.243000 +CVE-2024-6709,0,1,013803ff049c00876a12f0c8cde7329e2feb48ab884116e84a674ab608c84b81,2025-03-01T01:34:10.243000 CVE-2024-6710,0,0,47d1a5fef457c4525065a89769981bcd70563a4e348c666663dabca081c5f1b3,2024-09-05T15:30:07.570000 CVE-2024-6714,0,0,4d143eb2206049fef2ee1d5627e204208e47aef252c1ff3a509884757088fd75,2024-11-21T09:50:10.127000 CVE-2024-6715,0,0,13e40e2da82adb106cce965c5784e77fb81745ca6e1bd8f5850d4f411fff2412,2024-08-26T15:35:18.010000 @@ -278347,10 +278347,10 @@ CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952 CVE-2024-6866,0,0,d02f2a9f24a872851eea383d831198ebf570e66ca7f4b92028df3e0e8a076d10,2025-03-20T10:15:34.620000 CVE-2024-6867,0,0,6c55d0fa259dae5a76079d5fdb230daa8cf52e1743e731da2d6fce68a8d1de39,2024-09-19T18:28:05.477000 CVE-2024-6868,0,0,f210259d3543fcb593fccecbc0e6eb045a386b1a398b95f0ab9a8cd25681e2e5,2024-11-13T14:43:33.037000 -CVE-2024-6869,0,0,595f011543da20ec0d3313230583fd97018121597301455f7348c9d6673378bf,2025-03-01T02:27:55.683000 +CVE-2024-6869,0,1,cc382fd827bbaedfe164f14a9fb267356986d4e3074c9c30b2fba66f27618e92,2025-03-01T02:27:55.683000 CVE-2024-6870,0,0,512ada6d68695bc85c4b69e712bcee3cd9620adf7839b3b0f80ef395f84fa386,2024-09-27T00:52:03.737000 CVE-2024-6871,0,0,d32559904673835a3f669129bf6e92cee062d7e374742520be18d5380bf81773,2024-12-10T16:49:59.447000 -CVE-2024-6872,0,0,242eb24b75a381bd87cc4880a2a7e69712b8d46ee26d945338fd863899418613,2025-03-01T01:32:22.950000 +CVE-2024-6872,0,1,020c738c297874be52bbaa2930a17a23f6ddf509ffad97ab3bc94490fdd4ce93,2025-03-01T01:32:22.950000 CVE-2024-6873,0,0,66032352187ac3102456222340c0088c415031356cb09efb45febbda4049aae7,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,5916f64034c8308163a7dbd0c1ed58ecc18b2d29d1441e93e279e717e00b22b6,2024-11-21T09:50:26.493000 CVE-2024-6875,0,0,1da619f1e025a7fc7d32bd16b3319ba3630414e77b889f57cd0da8968b4cb49a,2025-04-01T20:26:30.593000 @@ -278462,7 +278462,7 @@ CVE-2024-6983,0,0,587b62c803cbc10ae0c23135289c49daf36532602f2ead158bc0c89a5e961f CVE-2024-6984,0,0,5c6acce30d9b749e7e760dc98cec99d533ada0037f7a413b79276c44f099bda0,2024-11-21T09:50:41.767000 CVE-2024-6985,0,0,35a788cd8d8b8f85ed704c3d08e328cd854ec7c996c53c3f6ea1eab2a3326c34,2024-11-15T17:10:59.157000 CVE-2024-6986,0,0,ea0bf4d1a35ae67cea13d85eeec03ade1c95a4337425d24f7dfedd7be00e2b39,2025-03-20T10:15:34.860000 -CVE-2024-6987,0,0,efc320d79c7f9a6a48b8a160a9960a0e5152e9847af3c67a804311f0c920a95c,2025-03-01T02:26:18.970000 +CVE-2024-6987,0,1,223166f1b803f84b8f4a3c19d43d731f9bc060873bfb059607e3a6aac87afc69,2025-03-01T02:26:18.970000 CVE-2024-6988,0,0,3cb5403a693ce8680fc2ff57712faef2da780ca9986d4d5f6badaa92f2857fd8,2024-08-07T20:51:56.167000 CVE-2024-6989,0,0,3d31fb4898a4718ef52155740c79259679d457a75cd915d4fe4cfe98b60d0f29,2024-08-07T22:10:20.423000 CVE-2024-6990,0,0,9d9f99a9c4c27de27686324f2bce9a9aacc5eab2d5bd7ea00986c1dbecf55e85,2024-08-16T15:21:14.383000 @@ -278749,7 +278749,7 @@ CVE-2024-7298,0,0,3746acc37f05883cdfed3595c600c481b06df9c1a0ddfc8964c5e86c801722 CVE-2024-7299,0,0,0f3379af768c700eae83366720003dcb0a9672f0b09941a1c3c0643ce344a72c,2025-02-13T17:52:48.730000 CVE-2024-7300,0,0,a55d732b2b3b39ee223bdfe24c0c5b32281b2f41cf7e7b1d22e853ccb5940bd8,2025-02-13T17:52:43.220000 CVE-2024-7301,0,0,cacbcfda5ae3f9e2a2d539d4ffcd7f6ac69ba7221e6038175096d0f939740de8,2025-03-12T18:08:31.543000 -CVE-2024-7302,0,0,0c03b6b4922ba069381e8b1adf06ebf573a281ef8b0ed9d95614922d4caff576,2025-03-01T02:16:04.230000 +CVE-2024-7302,0,1,345597f2076660253da1fee1860e30313f02b42e0ea06c581a9d54bc655df3be,2025-03-01T02:16:04.230000 CVE-2024-7303,0,0,957b9fcb87294d49449ca2fe55f416e958d4c45a67e573366678423d8079f5f9,2024-08-12T16:47:04.740000 CVE-2024-7304,0,0,828549ce4cdac76eeb8c573b4de427387de34c9d0523e05e338d3100e374839b,2024-09-12T21:32:36.023000 CVE-2024-7305,0,0,3566ffddea29ce7449995d1445d6da5ebc667fc64d80bf9d9478b88ffb9d055c,2025-02-10T21:15:20.730000 @@ -278802,7 +278802,7 @@ CVE-2024-7351,0,0,c82039d3b8744b4f8f21b754bdc1987cae9647690313f7271544cb15800a24 CVE-2024-7352,0,0,93dbab1eecd4953285aa40210b1f50c821a08d58e22ccb1db605303ed334c884,2024-11-26T20:58:09.063000 CVE-2024-7353,0,0,ffbb4e21bbd638ea6f574d22a594f23896af4ecee05c05f422038edf1f2be318,2024-08-07T15:17:46.717000 CVE-2024-7354,0,0,1a6b093c253b1f83ee3681a8e88a19cbe573fd6e41a40a8b454e5c5bf7e19df8,2024-10-04T17:16:20.943000 -CVE-2024-7355,0,0,127c6778373573900dc2e9623ff63284401ab4a5ecdff43414adb4bb07c88892,2025-03-01T01:28:42.170000 +CVE-2024-7355,0,1,b12fdd2a50d311e7b8a55b6f730eeb72ea7440141b6bf609c6877f9097294773,2025-03-01T01:28:42.170000 CVE-2024-7356,0,0,ea08c20a3be0a06387f74e10ca79ad2a3a68da1c3d257f1f8107b94fd76c2c84,2025-02-11T20:12:23.717000 CVE-2024-7357,0,0,6c3e884e91c97212b5608750aea6f80d6b4d0f73ae3cd3600b21c46b44d8004e,2024-08-07T14:15:33.230000 CVE-2024-7358,0,0,dcf05b71e2484793f3882b1f2337bc834d5c791235d756ea70df7a0736eacdf2,2024-08-01T16:45:25.400000 @@ -278849,12 +278849,12 @@ CVE-2024-7399,0,0,c63a2f56ac97180c8eeaff7425fc4e1891afb5117e5e5ee0a06426ef5c6cec CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000 CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000 -CVE-2024-7407,0,0,8e2739b5a5901251de33490d420b2437dcb8cf7a3b319d7ad3015b81a122eb72,2025-03-28T18:11:40.180000 +CVE-2024-7407,0,1,31394ee9c3c671c5cc040acd93f9e26e8b3027593c406d8644dd09e66556a4c1,2025-03-28T18:11:40.180000 CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000 CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,0871e9686ea550699d0247d33284175e82daee9f3b8839d1168133851ed89497,2024-08-15T13:01:10.150000 -CVE-2024-7412,0,0,a1e30ee741f7a84a7b2903e5c72ccde340bb612d60bee0b402bb2e4ecea81726,2025-03-01T02:24:28.913000 +CVE-2024-7412,0,1,72afd80abbf81289c4bce45714a63c8dc8332391e2b63bfd68bdd540a05a773d,2025-03-01T02:24:28.913000 CVE-2024-7413,0,0,9ccf2fb78cc8a1098b920e13af44a75c99637778b99e94b2b910d51502c8b720,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,c5c4cb0c65e3e55baabccfbeda4173515b29b584f93eba40d8e5c699af91ce62,2024-08-12T13:41:36.517000 CVE-2024-7415,0,0,c3d340cb43f0894d646dacd50945832f9ca899172c2740ea86ecad0d435383d0,2024-09-30T17:46:46.473000 @@ -278926,7 +278926,7 @@ CVE-2024-7488,0,0,719a60a8572e224f7b257d2e4a4320c1c0c34f3675642f73203161eda33945 CVE-2024-7489,0,0,a024ef08a949af48cd010bb9f60f483560cd0d969f75fb5588ad38becad096e2,2024-10-16T07:15:16.160000 CVE-2024-7490,0,0,1af52d55502f39c5aaac1d6d7956a7202988f005c7ee6f2a1e0f94b732b07ed2,2024-11-21T09:51:35.350000 CVE-2024-7491,0,0,ded4fbbc2e2e0a2eb6ee7de3b8bd8b61ec8e8f9abdf39ac78670b65cb60633c1,2025-03-12T18:05:43.987000 -CVE-2024-7492,0,0,a9b3cdcb8f5e4d11046c5c7b6b71fcab12abc84c3b4d37e782a995d045aca2a6,2025-03-01T01:26:03.193000 +CVE-2024-7492,0,1,b95fd62ee3459b890466cd4bde0fc1075b716981e988c886f7e6767039cb34d6,2025-03-01T01:26:03.193000 CVE-2024-7493,0,0,0fedce892f62cbaee435ba21e5f2729eee9c1ed9cec96307685d33fb183f63df,2024-09-26T17:41:16.390000 CVE-2024-7494,0,0,ceec0f0bca34be68025529d2aa6577041f74d9c223c08ceec4bfb27c65b63213,2024-08-19T17:34:50.933000 CVE-2024-7495,0,0,392a3cf510fdf4e5eae9ef8dcde28fa974663b88ba235e1869f42ea0cef87892,2024-08-19T17:10:27.693000 @@ -279388,7 +279388,7 @@ CVE-2024-7981,0,0,d69d8a362badd61c145e1651abaf26465e912ea9bb972b41f19b2d51d80343 CVE-2024-7982,0,0,462c506ba764519643e33c61c10fcdfbe069d0c78c9882d0732f619d73215e62,2024-11-08T19:01:03.880000 CVE-2024-7983,0,0,770275bbca3ab2fb1954f447d8f4001186b5ad0e9085c817dcafc78532680ad7,2025-03-20T10:15:38.387000 CVE-2024-7985,0,0,ec1bd93d5f9861900169c49521b54a80432ffce2591a30e5deaf45d454faf56c,2024-11-08T15:22:33.123000 -CVE-2024-7986,0,0,ef541c7e4c90f10ae976af97f641ce068dce7783be91c546593c6112da94a7dc,2025-03-03T19:11:33.343000 +CVE-2024-7986,0,1,7aa2749a7f39e6ff6d65b29682fc3751b884600325ccbd2df79626d2bca17185,2025-03-03T19:11:33.343000 CVE-2024-7987,0,0,408ab95ecf75e2d07c3e9445941bad830e3599aae4004b6b3198df0552516904,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,09d3f7d89a87370bd48978c69be2120f08467490773370f6645beb798db695e0,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 @@ -279842,7 +279842,7 @@ CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4df5,2024-10-02T16:19:15.993000 CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000 CVE-2024-8487,0,0,16192e9547b52e00d8d5517b407cdade3120da60de84e30d2b578b46c6f1e965,2025-04-01T20:32:06.197000 -CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000 +CVE-2024-8488,0,1,3f81a044b97345ac1456069d5919717ed0fd181aa765077af11c8c4bf69ad3bb,2024-10-10T12:56:30.817000 CVE-2024-8489,0,0,d456b46784bd7611201966af4e3279430b03bc9fadde1a4d8030e0b9b0f1f7d6,2025-03-20T10:15:42.490000 CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000 CVE-2024-8494,0,0,997d139a91b2f8cf565f52f12b7310cb976fdf0ccbd9ef562b298ccf52fdb226,2025-01-30T17:12:52.817000 @@ -280472,7 +280472,7 @@ CVE-2024-9170,0,0,fc0d2b28edb421bbb6825db66bb513b8e437f18c08e7c85641db282a049e16 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,b35aa31884976a5f72a9f64a6c4fb2bdf693241a033267ead8bf3a804c216cb3,2024-10-08T18:05:10.863000 CVE-2024-9173,0,0,61d7772356f925b0168ffe8ba49707e943ee610149453e61508264540d13a2cd,2024-10-01T14:12:41.293000 -CVE-2024-9174,0,0,14a4f27ca44d76d0934b1c540705f9e47bde4d2c79bcdc49f32c1133670362dc,2025-03-04T17:46:38.237000 +CVE-2024-9174,0,1,83e58a5e0a053080f0475acae0504cf5e0bbb50d1e58b506a78551ef290f2651,2025-03-04T17:46:38.237000 CVE-2024-9177,0,0,ce77b4d0bcbf9966a0cb91de2ef7b9e3d62b88654cf0f42f98e921fd75d4d09b,2024-10-03T14:32:46.150000 CVE-2024-9178,0,0,642845b431730b2b39f42cfe9bba564382251d774cc731cf45211d75cfc26a14,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,ddfbbc6ef10dedd28a9cb332a26718a84f91bc3934f39d4fe574235b72d9f3d9,2024-10-18T20:15:03.393000 @@ -281241,14 +281241,14 @@ CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e CVE-2025-0105,0,0,06eb71f16599e7ae8629718f901478ad68364254538fe5e092751226e1b94cb6,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,4fa5b1fae50cdaa5f369aea2ce1d6cb2fad0ef7bc07026463190abcdfafae928,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,fd8c25451851f9164910ade952a5bc7b463ed8cb8343e87e23b14c61db13477c,2025-01-15T23:15:10.273000 -CVE-2025-0108,0,0,64884df177cf3144877ea2163c5e8d793b035f2d968ef1abd8996aea95a6e341,2025-02-20T03:15:12.317000 +CVE-2025-0108,0,1,8e6a124f48063299ddc649f2ed2e5b56bbb12f5986b2444f81464f40b15461bc,2025-02-20T03:15:12.317000 CVE-2025-0109,0,0,2e853bcf58425a25e5b4158bfb9a2d075f81368d739b6fac481373e32bd783f9,2025-02-12T21:15:16.470000 CVE-2025-0110,0,0,c3ac9b0b128c9831e4e798f5fdfacaa8fa1c3a2720d10fc1e81c539868dea8c2,2025-02-12T21:15:16.630000 CVE-2025-0111,0,0,fa87128f8743ee0b93c8a212e891effe55c90e93acf7499903b7f1e0affbf4bd,2025-02-21T14:50:23.877000 CVE-2025-0112,0,0,04c326a65901e848a0acd5315db7dcfc248a4f24965afbc26cf0bf19f7da94c7,2025-02-20T00:15:20.640000 CVE-2025-0113,0,0,91f34fcac58c54d1583e6a3e7e8ac3f7da555071b5f6450ff51824f162deb331,2025-04-09T17:15:30.810000 CVE-2025-0114,0,0,aaf9815abc316bfc82e18e8bfc870f3ec11d2275990f2182975b2854e5844ecb,2025-03-12T19:15:37.363000 -CVE-2025-0115,0,0,70d5d259a2d7e41a2d6bceeb38c6da10d06c8db3e3416ecd9846a5e23a387c05,2025-03-15T00:15:11.800000 +CVE-2025-0115,0,1,afde9450c6a9a3c952e2cc5bf26fc5be7906a5e6783c860dcea8a013cdf1d3d8,2025-03-15T00:15:11.800000 CVE-2025-0116,0,0,755d3babec7a4fcd8fc3f5dd9f72be7aec497d243dc731232b3ce6e1fc0a553f,2025-03-18T00:15:12.860000 CVE-2025-0117,0,0,c368ae59fb321c63f810db1cb0ec2feda0287727ba4def77cb7fd0f7f9859486,2025-03-12T19:15:37.883000 CVE-2025-0118,0,0,2549278d26918d76bbeca0606d91920cad877d84c662cacbfb360849c8582ba7,2025-03-12T19:15:38.040000 @@ -281376,7 +281376,7 @@ CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb5 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 CVE-2025-0295,0,0,8ef86c549eec2b5ffd9e1320d65baf37ec53485f9073e7f04af13fa0f3c739c3,2025-04-03T13:59:53.160000 CVE-2025-0296,0,0,c782693853a11898b58d76d23ac8965ff3188ac4567aa39925ee5fcc9d9eb651,2025-04-03T13:52:49.223000 -CVE-2025-0297,0,0,9ee4047b5f8004a8f4973594a78ceb0a8f3d79680da16a92421b1d1d06b91da1,2025-01-07T16:15:39.887000 +CVE-2025-0297,0,1,d86cb9205eb445d1c6c3ee261c65da962698f4f22c7189b60ffa7db52aa0d9d8,2025-01-07T16:15:39.887000 CVE-2025-0298,0,0,8a150829e217aaa677cabca56d3eadde4649c28c4e5993ffc95e052629dab433,2025-04-07T18:52:47.043000 CVE-2025-0299,0,0,287b7c84e730380d913fe0279b4581bcdf4663b204f95804ae9f8c8a669e2d82,2025-04-07T18:42:58.620000 CVE-2025-0300,0,0,eeacac0e5b3484c8da63929503a886bb9e259f28b9912f9c0cbf0307687c333c,2025-01-07T17:15:32.090000 @@ -281416,7 +281416,7 @@ CVE-2025-0345,0,0,fdab4ab061ba34e7ae56477c0a30fa81f9f16f64f88fe386d4634a52d9c45c CVE-2025-0346,0,0,9faea85a80ad3242dfbf46080565c4d74a7c5ef005e74703ad17b5fadf8f5324,2025-02-27T02:38:41.310000 CVE-2025-0347,0,0,1538f5a52c276c2505bdc41680d48232362ef42691dec6a488d12fa9c340d7ff,2025-02-27T02:35:24.437000 CVE-2025-0348,0,0,e571492bb8da0d49f53156cf92abd508dd738cda3756ae8e9a52c4288cbf6dee,2025-01-09T10:15:07.700000 -CVE-2025-0349,0,0,36bfc31c5b4d0c01c45c47863cf8ca3d9fd5f7860567b6e956c7e83dc4440588,2025-03-22T09:15:14.137000 +CVE-2025-0349,0,1,b9f5c927339f353bc6a5ec1d33073ad8730ed8664e7a6746bc4e9dfaeb371069,2025-03-22T09:15:14.137000 CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000 CVE-2025-0352,0,0,3a526a5a58f779d9c18dd79a4421979dfef5808334aa001e60b548298e16dc22,2025-02-20T20:15:46.383000 CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000 @@ -281464,10 +281464,10 @@ CVE-2025-0410,0,0,9471625b28d1e78356470ed53ceca555dabf052df596d3d676369c7f41e010 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000 -CVE-2025-0415,0,0,cd42442f498f7a00d62da33de2543f9920eacb722d7ae621ecfd1caee3c6fd1b,2025-04-02T14:58:07.527000 -CVE-2025-0416,0,0,04c8856e78a97d9bdadebc7ca1f67f2a769741e4da940b28673b337baaa18bfb,2025-04-01T20:26:11.547000 -CVE-2025-0417,0,0,dfba6880e60aedadb7ff6c738d4d803add65c7b7f44f94316b8e00e198c7ac66,2025-04-01T20:26:11.547000 -CVE-2025-0418,0,0,92312978a08c9ed15d4b803843ae7c6f34e2f861cac48e62777126dac3ef12ad,2025-04-01T20:26:11.547000 +CVE-2025-0415,0,1,200a5e1ecd1d2855a7bff375ba22220b764adc252cc791341f3bd532adff6c1f,2025-04-02T14:58:07.527000 +CVE-2025-0416,0,1,436b3c6f0d7f27cd67a4d244ffb54ac2f3b2106e450cd13530358b3613745cb5,2025-04-01T20:26:11.547000 +CVE-2025-0417,0,1,21a463b89a3fac4d44fed1017e9c4bf5a88d6329a48e756f567011b51a4d3a8f,2025-04-01T20:26:11.547000 +CVE-2025-0418,0,1,86bf409fd5ce93a451618f4669db5046035bd6860c82f0211ed463b172ca77a7,2025-04-01T20:26:11.547000 CVE-2025-0422,0,0,d27856a38c2f7a0e1c4f6eb7a6bdc2d13aa44856906a77c9e3dc9b17e681a65a,2025-02-18T08:15:10.147000 CVE-2025-0423,0,0,92bee509e03f1e8df0cc73d636fb6a438416cbcf396cd0338cefa0a9feb944d8,2025-02-18T08:15:10.360000 CVE-2025-0424,0,0,3c83f05f2256a90c89f642c7d978825d33e5edeb00348728c37cba17fa5d080a,2025-02-18T08:15:10.490000 @@ -281514,9 +281514,9 @@ CVE-2025-0466,0,0,9a46a54bec667a669976057bcdf901ab11b6f396748538013cd1a3fe095e1f CVE-2025-0468,0,0,3d8f48e82e5fa80f1157da5abb2c5151ef78236bac556245f96f35106608be09,2025-04-07T15:15:42.223000 CVE-2025-0469,0,0,23e943a358626e0bb51cd71de4b5b382fd5d6568d543329e182c19764211b2fc,2025-03-11T19:57:42.733000 CVE-2025-0470,0,0,f40a32fdbc5ae7b8c32b69b52a058e31320914a0fd6f97992ce5e422a9a061b6,2025-01-31T04:15:09.053000 -CVE-2025-0471,0,0,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa7679,2025-01-16T13:15:06.973000 -CVE-2025-0472,0,0,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a96,2025-01-16T13:15:07.353000 -CVE-2025-0473,0,0,1dd10a9273539100ae454eabb570ef30f5a1ca54c056c49681717a1070ea05e3,2025-01-16T13:15:07.540000 +CVE-2025-0471,0,1,9da829f3814589285adf6bb0aacd64dbb702fd4986103e37d82b544f7940fbd4,2025-01-16T13:15:06.973000 +CVE-2025-0472,0,1,d49a39f2679bbca386d2cff21a875e6bd636433d5e1081dc4de704805314ce1e,2025-01-16T13:15:07.353000 +CVE-2025-0473,0,1,9c8109cf12ae65eb116c4ee6a3403d3db15b0f1f23c293b96f3408c98eb09754,2025-01-16T13:15:07.540000 CVE-2025-0474,0,0,82177afd4a03f9b6718aa062961dc28425e1582c17c2ed083ad764687f417f46,2025-01-14T19:15:32.930000 CVE-2025-0475,0,0,01db7095a6c7830189d7083ba5dadbe174587f0c8cb8ad9a02bc26d9e4bd7967,2025-03-07T12:32:57.013000 CVE-2025-0476,0,0,fac19eeb41e69ef9b9ba32b4e73c5aedd599dc2dafbcc6b1f4512a698dd08737,2025-01-16T00:15:25.217000 @@ -281568,10 +281568,10 @@ CVE-2025-0528,0,0,9a5ff48ddd9d71956228edb95dc0cb0945dc75209025b5720233df418ad510 CVE-2025-0529,0,0,2491e50ad07ed539d39ff7934a263957f131237fe31e5c871567cbe6fea67816,2025-03-03T17:42:45.550000 CVE-2025-0530,0,0,5bef9ce6a5663aea285b0b122ce9c1e1f3cd9b64083308edb0f43e4b03826c17,2025-03-03T16:21:37.213000 CVE-2025-0531,0,0,b458669d14808bdec31efc3f382985af1394398c2e10978a923491e4ad576f4e,2025-03-03T17:41:04.760000 -CVE-2025-0532,0,0,d17dee1e94bbfa23583627b7c128219b27a06c183331b86bd4b9b669b7c4dfd9,2025-01-21T16:15:14.560000 +CVE-2025-0532,0,1,998e2ca27040d95346d405ac35acaabd4ec23307aa6107d51db081e45f27a51a,2025-01-21T16:15:14.560000 CVE-2025-0533,0,0,c9eaf681312616e888aae3d822e61ac239c2de7e47dac37c75fef4b4ac89300c,2025-01-17T21:15:10.487000 CVE-2025-0534,0,0,e90b47d84165ca4ff9843bf6b8251a15a8974eef4a581c03b4d0d4e43640d1a4,2025-01-17T21:15:10.650000 -CVE-2025-0535,0,0,a4a429801e674b81f799745159d72683769c43f6c36cfbf29ded67f6004130b1,2025-01-21T17:15:16.677000 +CVE-2025-0535,0,1,05ca9299a72ec8427b3cfb190dd5e4f1a4ace07a5a3821216637564157729b4b,2025-01-21T17:15:16.677000 CVE-2025-0536,0,0,412cd2683e58a1de99579b236649cb4bd6b2182db9918e53a30fe5cc8242b56b,2025-02-25T22:25:04.860000 CVE-2025-0537,0,0,ac18629f3505fc8d01ed75e493b563a9195f7e930c5c5595394a818b3f1d8d86,2025-02-21T21:32:41.437000 CVE-2025-0538,0,0,23a74353ce4d38faae66783e1cf58936a188bf24527270171417447ac3a1997e,2025-02-21T21:22:54.457000 @@ -281659,7 +281659,7 @@ CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd74 CVE-2025-0665,0,0,cb0bd9cf98484accede609d5aacb307ca092db3e8f950b5383edcf9901c2a4ad,2025-03-18T18:15:28.427000 CVE-2025-0674,0,0,6c39db7af62f37c0b44063680ba18af7d951adbde12586340e38d9aeb6048261,2025-02-07T00:15:27.017000 CVE-2025-0675,0,0,08dac668b15b1b323f36ad42590ad19042939b423a1bc201978135ab31be85b8,2025-02-07T00:15:28.030000 -CVE-2025-0676,0,0,384cf7ae0a508dd4ed0cca7f8459669840ed18e8b40cfd6f9bb4f950143d7e5b,2025-04-02T14:58:07.527000 +CVE-2025-0676,0,1,1202540403bca349271c5afd41cfcb1fadffa363755b48084dfce9f7ad82b5e2,2025-04-02T14:58:07.527000 CVE-2025-0677,0,0,fc7fff60af52aedb8853b612fe5c7b8dfbe345cea75377cd46c5dc68fb745fa8,2025-02-19T19:15:15.280000 CVE-2025-0678,0,0,bf24de2653609f97c25e900d704f4f6fc240e62f7a841c0a8d483c5fe8f76138,2025-03-25T05:15:40.667000 CVE-2025-0680,0,0,304211fa316d5ad912272d7e1c6d2fe276e0a8944295f89aa501df2029db6e97,2025-01-30T19:15:14.147000 @@ -281758,7 +281758,7 @@ CVE-2025-0803,0,0,5311b2d33830c023a1dc5f2b7be0ab7412630dc054ac16cd734b6b3ebdc3c9 CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000 CVE-2025-0805,0,0,0a80fc7fbb29af386989077a6ae0b2952958eaaed9c0ad64bd4348d006405869,2025-02-21T15:46:08.020000 CVE-2025-0806,0,0,63789275155e2cb6d61f78901228ddd7e3f84f850b2c23e9990e2498d315067b,2025-02-11T19:46:22.923000 -CVE-2025-0807,0,0,b2b4a656f12e3489fcf4f75fde2be79c69ec60017aed129cff51589f1fe4b103,2025-03-22T07:15:24.260000 +CVE-2025-0807,0,1,78a52bc46879379b924fff4f78a83bfec2afa1a9f5d91d35e55cebf39ebb70f0,2025-03-22T07:15:24.260000 CVE-2025-0808,0,0,34819144543e17250a94a4955db1783a3aae066b6eee10149bf1493d78d1e0ba,2025-02-25T03:55:57.003000 CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000 CVE-2025-0810,0,0,5a8a2e1ef13d4fb4916cf7f91c0424d16a9e55a0beed78cfb22217b8385e0ecd,2025-04-07T14:17:50.220000 @@ -281783,7 +281783,7 @@ CVE-2025-0833,0,0,de268e8dd407a9161c80ed220626dd50e5de552fd702f4d269ab27d3c6ec8c CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0835,0,0,86c0cb2e488afc89fa52f180613ab97692422d807ab06537e40f2f9f52bbe16f,2025-03-27T16:44:44.143000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 -CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000 +CVE-2025-0838,0,1,a7c2e3cebe90652a13ab9c0fce8ddfe63f9e04122f1c18d2bd950ac62ad7c237,2025-04-05T16:15:33.450000 CVE-2025-0839,0,0,05c42cb51d90d810716af0c20c09dc5fb958546136de3b79dbd122603307a978,2025-04-07T14:17:50.220000 CVE-2025-0840,0,0,ad52784c9689f7e5a12133bf5b8e57840dc23d31e5e9f25f1808977a060838b2,2025-03-04T15:08:47.770000 CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000 @@ -281815,7 +281815,7 @@ CVE-2025-0873,0,0,5aa4d6fb1c3a8eb595c4da8c3d69b8728e6fd89d36901ed8245170c7f8b81c CVE-2025-0874,0,0,125dbc60ce30bbccf3019f6512261a2e3942682e065309657be2653037ecf35f,2025-02-21T21:36:58.723000 CVE-2025-0877,0,0,754415595cf805ed622482777877df76c60b5b900a1fd358b90f91b2e0502e6e,2025-03-06T14:15:36.107000 CVE-2025-0880,0,0,77e515b74976a5dc3eae29ea5053c11b5ba4746b76e1c02c2445f07f8eff78da,2025-02-25T19:20:49.193000 -CVE-2025-0881,0,0,db910fe9bbcd2f0479a83598ac8b27c8e73be02c1af8fa69430d4bd0072a10a7,2025-01-30T22:15:09.950000 +CVE-2025-0881,0,1,80906a387fd4de7f6cbc3188cfb96160ed40755cdd76f78c00fbd018a033f2b7,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000 CVE-2025-0883,0,0,133677fdc2ba83aba4f58f830341ca4fb6d60b1a813064a6ce07d337274a8dbf,2025-03-12T16:15:20.353000 CVE-2025-0884,0,0,81ba81b7c4f8494c1e6f5527e12a46e63af8aaf982c1f77f871a3be509f2c531,2025-03-12T16:15:20.523000 @@ -281884,7 +281884,7 @@ CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b5 CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000 CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000 -CVE-2025-0986,0,0,cf56af05caf6e1980300a02afd123c843ba27f74f88042c36ff0a4e635370b6f,2025-03-28T18:11:40.180000 +CVE-2025-0986,0,1,21aa9c6cd55c5681c9096cf27398017ddbfce2ee321dbaacf5904c40ff00f1ae,2025-03-28T18:11:40.180000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000 CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000 @@ -281957,7 +281957,7 @@ CVE-2025-1085,0,0,240f000b2a2196559d3c93131a0f7508a4e94aebf865be36c2ffd695012f0f CVE-2025-1086,0,0,a69d2558168bf2a8aaa109750d1ed5860f8baf2bb5bad3b2b8e78234f1d8c631,2025-02-07T02:15:30.523000 CVE-2025-1091,0,0,41f3aeac640c3e0e17c6b04948a8dcf1ae635325d94a919fd15d739e41c450e8,2025-02-26T00:15:11.250000 CVE-2025-1094,0,0,dca1378d2e11e054a0baff76bda52bd172b0e41af32ad66e0ce66e679989e2ec,2025-02-21T18:15:20.033000 -CVE-2025-1095,0,0,aca10ae4ebae50fbf2e739d2b065393a51d296e3dfc1c2ca3a9308b167281ea9,2025-04-08T18:13:53.347000 +CVE-2025-1095,0,1,86218a94ec31923d8f8f669b711a74821953c7ae0a27e468e2b46f30d1231a47,2025-04-08T18:13:53.347000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1097,0,0,2202b89d343208abc4d734355b4c7ffd6f25bdeae0a3549fe1a1a5c18a5619b5,2025-03-27T16:45:46.410000 CVE-2025-1098,0,0,5e273d1d4e3b115282c7c75a71d4085bca65fed73fce8f6abccd6dd2ec5272b4,2025-03-27T16:45:46.410000 @@ -282058,8 +282058,8 @@ CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa5 CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000 CVE-2025-1215,0,0,28588a9b24de663f5bef0961d5dfe96e8a71be7eda3beced3b32d3f6d90dfb60,2025-03-21T18:15:34.290000 CVE-2025-1216,0,0,c2395b4be7af9479c54e2cb380a24f136f34a8574d4e9d63fb5aa8873ac74d92,2025-02-12T20:15:39.907000 -CVE-2025-1217,0,0,542240fdfa1ab173d386776528bcdb5cf698ed7bfae5420dd00614023a719feb,2025-04-01T20:26:30.593000 -CVE-2025-1219,0,0,4d6b0c39fb8cc5f2dc534790e24ecc2582cfb308112ba0ab90d8a26de8a63206,2025-04-01T20:26:30.593000 +CVE-2025-1217,0,1,f74552a142dcd5e85706f08bc76411c96bc658c62a6f6e261d78a36e1748ce94,2025-04-01T20:26:30.593000 +CVE-2025-1219,0,1,39ca4ca6a1d92a11fdc0f18ca60dd8a3c6d2c5f337399ec649543a31608bb7b8,2025-04-01T20:26:30.593000 CVE-2025-1222,0,0,37e1c4bd7e5e0aef71d4eaf69d903e1860c5e20ac2c3d888fafec2d8540da40a,2025-02-20T01:15:09.707000 CVE-2025-1223,0,0,79c0b4e1b63833c27fb384ab59edaf7afe279373880088cf1aa2309d13ed89d4,2025-02-20T01:15:09.837000 CVE-2025-1224,0,0,58216170a09b4d8b7ea38fc4d10b486062bc143b21003c5f5c48c0a6339e51a5,2025-02-13T15:15:20.500000 @@ -282087,7 +282087,7 @@ CVE-2025-1262,0,0,17163c0048b85420a06d4f3fbe8ad6b4a348138bf38df6751414d0a9ed886f CVE-2025-1264,0,0,28c40552206eb9f5a0b03a9cca8beeb7d7df89ca0a5becb5749e460941f9fd5f,2025-04-07T14:17:50.220000 CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9e8,2025-02-20T20:15:46.537000 CVE-2025-1266,0,0,4994c9c1e87b7dedc2dce4e0a436027ae116cf2eed8bcb3d9cc4ca13f9be4407,2025-03-13T22:15:14.907000 -CVE-2025-1267,0,0,ba86c608607f26bac981689d79d06ae5aee8441c0c5fa7f7159ff7a10a088f7f,2025-04-01T20:26:11.547000 +CVE-2025-1267,0,1,8185c9604ff0d1aa86b9cea920d82bd8037570ce9b9b7776f5513234b5775eda,2025-04-01T20:26:11.547000 CVE-2025-1268,0,0,f3575a32c76699685cbba5c7bf003a9bc75e184925f6768d4d4c92dd8992c2df,2025-04-01T20:26:30.593000 CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 @@ -282098,7 +282098,7 @@ CVE-2025-1285,0,0,3182990c1bc942ab8f686c8030ea96842badd7c599b496272a03f16c99f15c CVE-2025-1287,0,0,c1d2e5c86643fd051f72a870384be2d364cc20de377757abb01837028348772f,2025-03-24T18:19:22.993000 CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 -CVE-2025-1295,0,0,6277712e239fa1b71f917228aece5de3dbe117dca80c54d46b8b92853710cc48,2025-02-27T06:15:21.990000 +CVE-2025-1295,0,1,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000 CVE-2025-1296,0,0,d95bfd9a7f0753e22aec4081e35e5f3d5b17ed2789c524a1845821d0907a79ad,2025-03-10T18:15:30.237000 CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000 CVE-2025-1300,0,0,77db9cd7a18e3de4a8b6c836390a2247e6295125845190568cfff46e60843c32,2025-02-28T13:15:27.043000 @@ -282107,7 +282107,7 @@ CVE-2025-1306,0,0,de526cacf8bf273c9432977eceb9f985b41588e9255fe87d024d0d99218909 CVE-2025-1307,0,0,f5a65a0d70e64918e5c1a7d1d02a502ae3db9a76fffe081c38f2a5d059c1eb26,2025-03-05T13:55:29.927000 CVE-2025-1309,0,0,5d2b17215fed7de1b66f6e9e5fd86a1c64bff76093266d0c2270f4eeb2161dcf,2025-03-07T08:15:42.017000 CVE-2025-1310,0,0,25bcf2647b21785e81aee9bf1e14cf3dadc9c18faaee6d001f2b001f0d89e104,2025-03-27T16:45:46.410000 -CVE-2025-1311,0,0,f6c7853d29144d30e1440fe649502c47ee37834c55b5d3f4a34600897bc61e58,2025-03-22T07:15:24.433000 +CVE-2025-1311,0,1,7710d787ca70c6c546450cc6c7a6c27a4be0c39d3b39dd1aa2c960d1ee02ebdf,2025-03-22T07:15:24.433000 CVE-2025-1312,0,0,722f6492fca6972e3871e5d5750f81958bc068d23fe675f5f9ed3d0327ccb7dd,2025-03-27T16:45:27.850000 CVE-2025-1314,0,0,bafad489ff1eadbb41395d6cf3743ce464b25bb7da82ca4e71ee61d8353e849a,2025-03-20T06:15:22.437000 CVE-2025-1315,0,0,b2e5cb43d68af8915879a41f899eac8effc6f5ff149f94a7a5bed3683712a9b7,2025-03-13T15:00:51.697000 @@ -282130,7 +282130,7 @@ CVE-2025-1340,0,0,b9875780a16a13744dbcd5d844e8ca36a7e2aa268ada35546ad50497001d4e CVE-2025-1341,0,0,81c73205f91da4e4a53e62a4a3612a03f01d8a5a3578739a3ddcdc59f89bd9d8,2025-02-16T14:15:21.893000 CVE-2025-1352,0,0,49ac14e9196cb2742d9d61507be651bb74f909d13564705f3ec967ee19bb4a5a,2025-02-16T15:15:09.133000 CVE-2025-1353,0,0,592b3b5fa0e656024e4607b02db6b1922da161f4886bf146bf25aacc925677e1,2025-02-26T08:13:23.443000 -CVE-2025-1354,0,0,3c0fb3ba8e22aa5a65dfed92e4d3c6da103918dbde8625acf08353fd6b59f147,2025-03-13T07:15:36.740000 +CVE-2025-1354,0,1,e55c21cbd1f75bac3c8a803805ffb3f723d0da78df46917ed4345de571306e58,2025-03-13T07:15:36.740000 CVE-2025-1355,0,0,6caee86eb6a8e3923b40b372ffbf6b511adee57dcd89d4b3fa6b8d5df24b9151,2025-02-25T03:41:32.873000 CVE-2025-1356,0,0,1208ea8c9feffd512c177155b86b87da904ba758ea88d8448c18154aade44db4,2025-02-25T03:40:30.107000 CVE-2025-1357,0,0,ed748fcc9d023acbae682d7a1236530483f53d6ca6eeb189959266b42b71cab3,2025-02-16T19:15:09.500000 @@ -282164,7 +282164,7 @@ CVE-2025-1386,0,0,02725c35a99d50c962eb18e5e1b8725d75359956517a1ccd918a16ba1bc929 CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 -CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000 +CVE-2025-1390,0,1,d6f078e733c9fc0d4a095dec24cc32eec849eba6d34f7dd2ac292f7ddda5fa94,2025-02-18T03:15:10.447000 CVE-2025-1391,0,0,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000 CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000 CVE-2025-1393,0,0,1a18b9780d45efd3906fabb9eb91bce6e4d37c3f3f1f9128e55d743057ba1663,2025-03-05T08:15:35.107000 @@ -282202,7 +282202,7 @@ CVE-2025-1445,0,0,940964079412f921ad8508e621bd3205368ae971bcabd8435df66e45431670 CVE-2025-1446,0,0,7cb3c60312bd7d3cde44d28ab50669e2a8279d0316ac1b0d2099292a9463d555,2025-04-02T14:09:12.570000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000 -CVE-2025-1449,0,0,f0e6218526167e689cd8ac50c2ba9ee8bc2cd9e9aee512507ed12c93e0c9fc89,2025-04-01T20:26:22.890000 +CVE-2025-1449,0,1,96e80016899d7efd6b5903e0bd5984545e6534e36d574b5746b82bf274168465,2025-04-01T20:26:22.890000 CVE-2025-1450,0,0,f0a28cf37155f4c16fff9326b0ffe6a415c6c5c1475546052ba68718728afcec,2025-03-11T15:46:05.180000 CVE-2025-1451,0,0,12a938aee967d5ea2c9b43d523c78df71d3aa4fc1d58b85bd5cbd9ad34dbd3d2,2025-03-27T15:40:03.640000 CVE-2025-1452,0,0,3e2a2b961d493642668dd5d757e3135aee03e85d6914645ab6a62b9e89b5cf1e,2025-03-27T16:45:46.410000 @@ -282215,8 +282215,8 @@ CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d7 CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000 CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000 CVE-2025-1468,0,0,e0503b5974719c9420d6a69af384cbf38dd9b991f4c94afa9e772171239c1fa7,2025-03-18T11:15:39.553000 -CVE-2025-1470,0,0,e01b0f1bb79b7b859b47b359ce0cf41f9e90ba4e1803b43806d897949049f289,2025-03-05T19:18:19.887000 -CVE-2025-1471,0,0,e9367bf2e65ca51cc57b591138b8194302d48e60fcb8c0503d4b9dd9d0af3110,2025-03-05T19:06:42.290000 +CVE-2025-1470,0,1,7fd56a5de7586304b1a3283f5f3651c56f792e36783deaea199c1b67ae28fa37,2025-03-05T19:18:19.887000 +CVE-2025-1471,0,1,70acaa43e22086f896390509eeec7ca98f922666de6f9d61a86973bc79f02e7e,2025-03-05T19:06:42.290000 CVE-2025-1472,0,0,96686ef65b43137a15e8858cc63cdb01a03dbff174e3e84775b4964b41ffaf06,2025-03-19T15:15:53.433000 CVE-2025-1473,0,0,ee5f01f60fc344c714a9817bf6f91aa874bab2bd9f7be81c05c3735afa72fb9c,2025-03-20T10:15:53.903000 CVE-2025-1474,0,0,16ca85451a6c572acfb94ec027bf63fd66ee45faa5ceb1d08c8cd3a16e15e44e,2025-03-27T15:36:42.540000 @@ -282243,7 +282243,7 @@ CVE-2025-1508,0,0,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9e CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000 CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000 CVE-2025-1511,0,0,1c181a66cf1ac99d67fff65c89ad0c75490b829a67e03df0160cb907d2bc8f45,2025-03-06T17:55:34.303000 -CVE-2025-1512,0,0,50d10c04dcbb79a16b0f7c4a14f4538d3fed3488c89402d692a35b93a0b982c6,2025-04-01T20:26:11.547000 +CVE-2025-1512,0,1,bb9e8dea523ec79d9f02cc29582c223599b5ccf3dadf5c0e5b81b46a332f1842,2025-04-01T20:26:11.547000 CVE-2025-1513,0,0,ce3139c624bf0aef8e367fe572f1b2e77a39780d5752c990d66c97a9a157ed49,2025-03-06T17:55:57.117000 CVE-2025-1514,0,0,c380acc87f967f8bd432c9c7527813044f99f9dd9766e01548adcd3d3b59da8a,2025-03-27T16:45:46.410000 CVE-2025-1515,0,0,96efd86c5199277c649db9d3a44020b0cf7829d395d3a3db8805b6323baa5417,2025-03-05T10:15:19.850000 @@ -282343,9 +282343,9 @@ CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf1 CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000 CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 -CVE-2025-1658,0,0,b57dc0226eef777891dfde7cc3525d0cc45e176ed6dc214f6519088b62f54dac,2025-04-01T20:26:11.547000 -CVE-2025-1659,0,0,356a60621bcf45465ca7431ec029d3f371738271a4efe24ffac5a421d34cc9a1,2025-04-01T20:26:11.547000 -CVE-2025-1660,0,0,454d39acfb50c3c6351d1e3ac2c780c05ff1a5af29fa142c4d8ae5f9e3bd2143,2025-04-01T20:26:11.547000 +CVE-2025-1658,0,1,a9a4970b4e8c9be89051e7ea1fd9ce1ab750dde675e3d54e4993b32c8643df73,2025-04-01T20:26:11.547000 +CVE-2025-1659,0,1,c9722d059164770d3875a51a7e0c94b2e0ed8137da6dc91dea4eade92194196b,2025-04-01T20:26:11.547000 +CVE-2025-1660,0,1,d277ba4b41892bf2457ad0a587ba3935fe3d29ed84ec522977e343ec405c3eaf,2025-04-01T20:26:11.547000 CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000 CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000 CVE-2025-1663,0,0,462dc23e32e49984463774da56be0340fc6f3e61c911b7836bbaa495aeeb2963,2025-04-10T14:02:22.313000 @@ -282358,9 +282358,9 @@ CVE-2025-1669,0,0,74b9f1c35c1edec639de376af71d9b10e1a6ec62757c87ae8e975b99e43d51 CVE-2025-1670,0,0,993cd383236ec8936685a4620c86c0553536e6273f00b25aae7e04bd6b3e371a,2025-03-28T19:58:39.297000 CVE-2025-1671,0,0,3e864abf2317ed0da2e5ce5c715f77427678e759b1b0b7661615571210565dd9,2025-03-01T08:15:34.320000 CVE-2025-1672,0,0,17009f612d9350e18d5e374e87786ad1a6000b2cfd441a3dbcef71d15a71e31c,2025-03-06T10:15:11.897000 -CVE-2025-1673,0,0,a769050644a46e7653413d9ced41c32af5a25e5678354b84138b22bca35ce1d4,2025-02-28T01:51:41.237000 -CVE-2025-1674,0,0,34cc117a61014ee7cc1857d2d4bba3c83148703711d2214f109e23548c0b079d,2025-02-28T01:42:14.500000 -CVE-2025-1675,0,0,617f4918bd81cc8aa7e8e3b746af2c056a2e621972157d45d3d4942aca8956aa,2025-03-03T16:51:56.620000 +CVE-2025-1673,0,1,363e8ad7355d1da328fad9357d8ec0208050b12e196a4c565294416e268c0cf9,2025-02-28T01:51:41.237000 +CVE-2025-1674,0,1,4ee66b2cdd270721d717c37e4815628162c52a564dccecf8faf8fc8bd26bdb24,2025-02-28T01:42:14.500000 +CVE-2025-1675,0,1,293f1ab91e2c7fe034d44893e4d6f1c19b50eb4a369f4b3bde38ee303e96a9a1,2025-03-03T16:51:56.620000 CVE-2025-1676,0,0,ffcca994630f7ace6a571d92659403689ac413c9afb10a75dc0095ea449331e9,2025-02-25T14:15:31.447000 CVE-2025-1677,0,0,b1bf1cb6f4a85fc844cdbb7b6ef03b563d8550d276d873e9220c934313fd0477,2025-04-11T15:39:52.920000 CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e1071,2025-02-28T00:15:35.950000 @@ -282377,7 +282377,7 @@ CVE-2025-1695,0,0,ebd84bb280e3b0fb2974535e719ca217464c50c1c49a0c471a25d6dd4b8516 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 CVE-2025-1703,0,0,50c927778c00387d209f1db495acb3fcdf772388903cfdf917baab839124a719,2025-03-27T16:45:27.850000 -CVE-2025-1705,0,0,bb9b83684d62e0d9806652d09e7bd2badf7e1bc2b4e256ac2ec7c9295bbd1acd,2025-03-28T18:11:40.180000 +CVE-2025-1705,0,1,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000 CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 @@ -282405,7 +282405,7 @@ CVE-2025-1755,0,0,b8116dcd9eafe8c21e606cf4d169f84c9b48a368fd9a8a9ed4d47dfc517183 CVE-2025-1756,0,0,469a2e36bf9b0a53fa5f2a58ce7fdccfdf577f34edea6c0bcffa665f76adda9e,2025-04-09T14:07:26.960000 CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000 CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000 -CVE-2025-1762,0,0,ce8cf52bf9353db820aa11f81bcb02a3d741cedc087ff1dfa90f7c9798f2e026,2025-03-28T18:11:40.180000 +CVE-2025-1762,0,1,646b7857459189b78613cd0a814492cddbfacf3c68a509b0b8f9320e9e5dcc81,2025-03-28T18:11:40.180000 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 @@ -282417,7 +282417,7 @@ CVE-2025-1773,0,0,e53acc6a4d10abe2acaf7ea6efebc18b3608dede84de9a0653563728a0b5f4 CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000 CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000 CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000 -CVE-2025-1781,0,0,7846365488e74737c4534158f6d445318ea99d66c3deaf1131a28680d25a13f3,2025-03-28T18:11:40.180000 +CVE-2025-1781,0,1,822d9dd7d94e5b498257a849d2a77ab936366d257a4d3fe0593c5d9951a3a28b,2025-03-28T18:11:40.180000 CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000 CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000 CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000 @@ -282504,7 +282504,7 @@ CVE-2025-1882,0,0,775520acab9f4f6d6b04e782470e86873cd7470ddaa1607a687283b01b16d4 CVE-2025-1886,0,0,eaf754cdcbd76e594498445e8a183b18d76e578c86df9a4473db58eab68b36a2,2025-03-07T11:15:15.843000 CVE-2025-1887,0,0,bddc21bc05d4cae4f660040038124541d0467cb3a445afa630affaed468d397e,2025-03-07T11:15:16.040000 CVE-2025-1888,0,0,3e8d1790cc44ab743ef758fc86281d2612ee29c3437c97526832c9d31e18e0b0,2025-03-14T17:15:50.807000 -CVE-2025-1889,0,0,b84a9273c9cb25cb446cb94b1676e3e8f11f1c2bd93dc76e737811b3b09b8e77,2025-03-05T20:49:16.457000 +CVE-2025-1889,0,1,a964a942339284835780b86da1af3f8b2e4f31cd1340d30387dc9d367f392f87,2025-03-05T20:49:16.457000 CVE-2025-1890,0,0,db3675bb8794834ef955d53658b16e04c24fe9b65d0d5a76d95cabfb9017c85a,2025-03-05T14:10:54.123000 CVE-2025-1891,0,0,9f2273fc0f8d252651942d8d3815a36abf9790ddf128e5df54f65fd86a14114f,2025-03-05T20:22:23.083000 CVE-2025-1892,0,0,89f6a86fa134fc99c78c999574dfbb827df710f45489ccabf17103900b2b600e,2025-03-05T20:21:32.883000 @@ -282572,18 +282572,18 @@ CVE-2025-1964,0,0,f3200eed952b3d7931f5b0fd0f11005bcbc09bae5c7fe934cfb0e9c7d91d2e CVE-2025-1965,0,0,0bd3ee25b34ff10ec0343650056b235e91923f04d47a256a8d005445273d6545,2025-04-02T18:32:15.230000 CVE-2025-1966,0,0,60351edbd712a588bb5881e51b130671c2f34922067bedba86f618a830ee71d2,2025-04-02T18:22:05.807000 CVE-2025-1967,0,0,3387296b9cefdd13f619d7dc051be15c030caaf40c015f755b6d694f53e6ce80,2025-04-03T13:32:47.553000 -CVE-2025-1968,0,0,a18f0f8fc8a37fc6ac439e9302793b291d85fb6fa13dde35ab029fd4119d625a,2025-04-09T20:02:41.860000 +CVE-2025-1968,0,1,52b643dcc98f0c113cafcd77d1484cfcf431357f25aee598811691e09ffd7b8d,2025-04-09T20:02:41.860000 CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000 -CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 -CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 -CVE-2025-1972,0,0,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000 -CVE-2025-1973,0,0,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000 +CVE-2025-1970,0,1,c02169bfd879154bcbf52c6d54459b0c9d99f32dd98e828b6c450f5bb3ac240d,2025-03-22T12:15:25.797000 +CVE-2025-1971,0,1,cad78c38fa0f409118ca3c582b345e2ef699420d4477728568a797f9ee434173,2025-03-22T12:15:26.250000 +CVE-2025-1972,0,1,a01efd1287cb717f29347c6da0fd2b595ac4ebff31753720bc750584857d6bd7,2025-03-22T12:15:26.453000 +CVE-2025-1973,0,1,4fd9223b4c9ec022f5e61bbb2021d12ec059eacb6f9b6adbf31ff8f09b0271d1,2025-03-22T12:15:26.653000 CVE-2025-1974,0,0,4ae7818bf0e5063c4b0765b8cf6efa42d57f35daf1614dde7eb8ae4adb29d290,2025-03-27T16:45:46.410000 CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000 CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000 -CVE-2025-1986,0,0,aa1d6ad953492d2c053c68891cdfae611850f713fca43ca38bdad3b443ba6861,2025-04-01T20:26:11.547000 -CVE-2025-1997,0,0,e31bd93b9f43da3a6b974a53308dab7471c77e3d02d6c4887e08fbda0c265070,2025-03-27T16:45:12.210000 -CVE-2025-1998,0,0,1ddff52c2d4d90eacefa7763e3c96fc18a80ca663de06160274e07932a421feb,2025-03-27T16:45:12.210000 +CVE-2025-1986,0,1,5f28ac8dabb696f579f028bc6c921df319afb14f50bb950b8197d2628a16f698,2025-04-01T20:26:11.547000 +CVE-2025-1997,0,1,2320e8fae7a90840d951f0ca1bf029eb0495106dea7a57ba1224c981543ab87d,2025-03-27T16:45:12.210000 +CVE-2025-1998,0,1,3538634182b2dcc45e8bb62709ffff36cc782093b83dd33c724b80bb29d5b1ec,2025-03-27T16:45:12.210000 CVE-2025-2000,0,0,c744a04801dcef754276dff40a4c1297d0ba396540500fda4355fbfeeb2bc0f3,2025-03-14T13:15:40.907000 CVE-2025-20002,0,0,06f8b7b78b05d57d8766d2266c0a87b89836980b0a1b3eef34006bf4ebbae468,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,4f5ea43d1bf14e05d11686c3e47ec7acf652c2cc5f6c0bcaa593679c7da07477,2025-03-04T19:08:08.873000 @@ -282600,7 +282600,7 @@ CVE-2025-2004,0,0,97162036b7ce4e66deb2a736e669c684e86fa27398d0399c6b91076715d4d8 CVE-2025-20042,0,0,7331f9a32fa8f7edda7e90ecfb8214172e30817ece2cf7e097fe968d19847586,2025-03-04T19:11:26.743000 CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000 CVE-2025-20049,0,0,5147cf342586e050754516438965bcd2818b726f9780fae2382ab9e034df3bfc,2025-02-28T17:15:16.277000 -CVE-2025-2005,0,0,ce79f7883d25927f52ecf06952394ddddec31b29a0ff2f789926a50d25a32954,2025-04-02T14:58:07.527000 +CVE-2025-2005,0,1,39053300e5a3ee7d5fc4b5073d7d776237944895f283ddfbaeed7f0962760b09,2025-04-02T14:58:07.527000 CVE-2025-20051,0,0,f5960a6a14861956075cfae09439ba801517edcedfe4aa263146ae0b9ad313be,2025-02-24T08:15:10.087000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,a2ea91888888075f752b50af5aee3c115e146a56d4937cf3383a107d5b150fd6,2025-02-05T18:15:29.943000 @@ -282608,10 +282608,10 @@ CVE-2025-20059,0,0,c1084330f3b962fb98956ad8984d49c0102f6bb9f804c9bde4130df15f4fe CVE-2025-2006,0,0,d5d74f41fa3ae9bbd4fe95b11d94c32b823c104859d3441c59ab51ca4eb67b73,2025-04-07T19:15:56.100000 CVE-2025-20060,0,0,ef26af373b8c1500801575569870314eee69d6fc265fd3cd0ef2de4362a965d5,2025-02-28T17:15:16.440000 CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000 -CVE-2025-2007,0,0,ca5d61883c1535bb51dca817f523c3016caade418f12de05a44f52ac175c082e,2025-04-01T20:26:11.547000 +CVE-2025-2007,0,1,da59d82323527ec1abfe9f480cc8fe1fd6651069aa66cdf2f4f8acbf4750a509,2025-04-01T20:26:11.547000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68bfc3,2025-02-18T00:15:21.107000 -CVE-2025-2008,0,0,66cc7905f281bc19af0ec6b92b415c67e9330e4d75c6aac48a15c6ea15e97da2,2025-04-01T20:26:11.547000 +CVE-2025-2008,0,1,68e460bde6165885e0124b6740794631ebd9ef1238dd1d92b5785e67c9cdc397,2025-04-01T20:26:11.547000 CVE-2025-20081,0,0,abcfce6f9eaab6cfa483ac5a94822b346d626721da33852cd21d93971e9a065d,2025-03-04T19:10:41.293000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 @@ -282683,7 +282683,7 @@ CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482 CVE-2025-20212,0,0,b603bb567e19d2b21570e2ddefbe27a6bd329a2b25b1b4734ee239982c057937,2025-04-07T14:18:49.830000 CVE-2025-2022,0,0,b5798f392ddf137a9414b3e140802067429544fe663d8bfb49b4908c2dcb4dcf,2025-03-11T21:15:53.750000 CVE-2025-20226,0,0,a7d7b78f2b5a462f8f8fbab923acda4e88e803bdf6f9ea923d4c1585374bb992,2025-03-27T16:45:27.850000 -CVE-2025-20227,0,0,2542eca15a12055661e82d79e5b638ef5b35959f87c50c7bd0bf868cf3f7fe1b,2025-03-27T16:45:27.850000 +CVE-2025-20227,0,1,ebcb82651c5013fa465b51a80c2e78cd1d33a6427c1af7533371d5290d22f2da,2025-03-27T16:45:27.850000 CVE-2025-20228,0,0,534b9553dd8322185403c8e6b4a57a19af6d06b32406fd059f4312378482ac08,2025-03-27T16:45:27.850000 CVE-2025-20229,0,0,f53867065dbf14b112afb2bb6015da49bf27d7c6fda8ad90a9c3e5362ed1b4f3,2025-03-27T16:45:27.850000 CVE-2025-2023,0,0,9d8a0c8afba74bf520f5f7eb676dec70441b9e51aafb2c8702891c86f922f3db,2025-03-11T21:15:53.890000 @@ -282693,7 +282693,7 @@ CVE-2025-20232,0,0,0d5d053026f8c32cba542b805870a42fc42882344ea0c79ae85ae165075eb CVE-2025-20233,0,0,827e4cb515e7d3bbb9223a377b0054261580f1cd7e2f972f151a15685ae6593c,2025-03-27T16:45:27.850000 CVE-2025-2024,0,0,1ebba8845ef88303f0909fcf3cb590cfef8154204f03ba1b4e83e42241658ece,2025-03-07T20:15:39.023000 CVE-2025-2025,0,0,8bf05e4c9932aa58da11a2b15541e516431650b70642c5a505f451f40d61fe35,2025-03-25T19:48:15.730000 -CVE-2025-2027,0,0,8c6bd09c41c314fae15e62b718ce4df99aefdf0f6f33bbc19e1e7d6015d4e6fc,2025-03-28T18:11:40.180000 +CVE-2025-2027,0,1,f4e787944fa975229e7ea27488af4d7a233e07940cd5bde5046deccbe6a0e23d,2025-03-28T18:11:40.180000 CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000 CVE-2025-2030,0,0,0e82bd47c24dfd47a0763661b2667fde4902819acb4b011b12553acdfd131e3f,2025-03-10T07:15:36.400000 CVE-2025-2031,0,0,5b762fc7e74e43ed51009a6fc81cd4ad661cf88635712ad2ea503f672c7ad652,2025-03-06T17:15:24.153000 @@ -282713,7 +282713,7 @@ CVE-2025-2044,0,0,b5399414596c43702ddc2a8c52eba998eda416119500a6d6557fd296c2a6a3 CVE-2025-2045,0,0,e7dfa297dca7fb018c24f5920e9d43f3c4da5bff799bbae66fef4cf3564b466b,2025-03-06T13:15:12.553000 CVE-2025-2046,0,0,fc783c2849819e55fbcb9d95feee8e8553a57d70a2b0c5494f1655edee0d3bf6,2025-03-07T20:15:39.177000 CVE-2025-2047,0,0,d203237e5a2d58d2c407b7e2eaaa355f19802daf9e329a1835cfada430c7f425,2025-04-03T13:32:55.893000 -CVE-2025-2048,0,0,5e87e2ef7731f3ba8024f15fb76f8c4b1d1ee6d1e895cc363fcf5b4763fd50ed,2025-04-01T20:26:11.547000 +CVE-2025-2048,0,1,6592a0acecd0b844675c09cb5a655e73b43f6a1a16755a7d9dba301256690222,2025-04-01T20:26:11.547000 CVE-2025-2049,0,0,de0829182efaacc7a69451bc000f70ebd55d6f3178f3a36f265e011ba9221274,2025-04-03T13:33:00.487000 CVE-2025-2050,0,0,1dabc68feb4fc6975568c6b480483336ce5f3f6e18fec80b6a834440c9160070,2025-03-07T00:15:35.243000 CVE-2025-2051,0,0,39762f6a6ab838c9c7c8c7045b5c898cc8c8adf302ea2b672648686c9da9546e,2025-03-07T01:15:12.963000 @@ -282768,14 +282768,14 @@ CVE-2025-20658,0,0,48cc61399a1137f56a7e13c5419a4820632c258391c4f1a0be279a15efa0a CVE-2025-20659,0,0,cd918ab99aaf5ef9627fc17f3740592b1c5df51d9de08fa8c020c6cc06a0e2c4,2025-04-11T13:06:13.850000 CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000 CVE-2025-20660,0,0,9420ec05452fe26a997974ddd4112cf9ab6222cae6a669e6290ce0de00f9b5d4,2025-04-09T19:15:47.560000 -CVE-2025-20661,0,0,fe9cfdbc6ae98f10fa5bdd8a6f5e8f4ca14320fe2a8273d9a8ddc13a56b5b500,2025-04-07T14:17:50.220000 -CVE-2025-20662,0,0,c0b15438270c5965797b9a499bc7055c1d559f4935fa3e0fe36a67cd6f622ebb,2025-04-07T14:17:50.220000 +CVE-2025-20661,0,1,ee401977a3e8ca6ea96585e9a91dbd5bac08e349fc35a4949f7c3c51bae755fb,2025-04-07T14:17:50.220000 +CVE-2025-20662,0,1,c394426761908166dc2d5dc8a1a798c44cb5bc9c2faac8c484829f71111658de,2025-04-07T14:17:50.220000 CVE-2025-20663,0,0,596335f6a6120390f38a326693e2ad25807954564d3cf32daf45c2adaccfa901,2025-04-11T15:57:27.597000 CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3577,2025-04-11T15:52:40.517000 CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000 -CVE-2025-2071,0,0,7bfe8b685b8245c9943c6d89aac222493a621b72ec29c3cf9622feee00de6032,2025-04-01T20:26:30.593000 -CVE-2025-2072,0,0,7452b78e49b40682ae575d6750e2bb1f2de3946160c5bee4487d35d4121dbb19,2025-04-01T20:26:30.593000 -CVE-2025-2074,0,0,ebfc92b5bd49f5ccf1c23f472584acdf57def146ebcae3c4ff93af452a5b7959,2025-03-28T18:11:40.180000 +CVE-2025-2071,0,1,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000 +CVE-2025-2072,0,1,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000 +CVE-2025-2074,0,1,ca58bf592b5066d06227c815801f5f95341e4e9e4e43bd9476138e9763d951e8,2025-03-28T18:11:40.180000 CVE-2025-2075,0,0,ab55a51247ee2850d4e2152336537ca54db9312a277429beb604e88703e48472,2025-04-07T14:18:15.560000 CVE-2025-2076,0,0,97b36f1e6f07a313a2c81becc36dc64919123b61205ecb45483897067337e6f1,2025-04-07T20:51:08.497000 CVE-2025-2077,0,0,1c0edbdaffae49fa47155cca050ec7e654aca70fade8fda3498bb18e55151b35,2025-04-02T12:44:08.040000 @@ -282925,14 +282925,14 @@ CVE-2025-21160,0,0,6b334a84c69a9855c12112c928af4a4c4a440b166815806ff2e80c46e58c3 CVE-2025-21161,0,0,5000c6664e8559b4ee841730ccf5dbfb1e778e583a5b1ce1d480b9e4862bea7b,2025-03-03T15:23:28.213000 CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 CVE-2025-21163,0,0,20b2c3143306a8345eb967634be1acfbad088c1be68181ebcf0b2c9944d91eda,2025-03-03T15:27:42.417000 -CVE-2025-21169,0,0,dd060ce50daa3eaf7b6813e3244acf83a28675f55752b4cd8a996fb29eeadddd,2025-03-11T17:16:18.423000 +CVE-2025-21169,0,1,5a3bca32120073e5a1c495e3f019da8a1d88efc75cb769bc6bdae91428f74b23,2025-03-11T17:16:18.423000 CVE-2025-2117,0,0,1059047bb2180240c8be76ee1d3c7badf3b4027738ccdb1fd77f3462c3418c6a,2025-03-09T08:15:10.533000 -CVE-2025-21170,0,0,1450c7d6212057c0888c0725a2861d746344e735a3d98db59a493744ea82bc05,2025-03-11T21:15:42.150000 +CVE-2025-21170,0,1,77b2fb4eac487c5dc8c9982e41ab9b1a3dfa2e41d5b08ee56739cea48b79001e,2025-03-11T21:15:42.150000 CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,bacfb5c7449e528ff37d0b0dc34b744db150f394b1322d255e5475d0135374a7,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,777122bc11f0afe7d725be5fe0ce160609dbf692b0cdcf18e5e5b49ebf30a0f2,2025-02-05T18:56:08.103000 -CVE-2025-21174,0,0,32eb182fe9e109c6be2cb1b3185e11c698a6a94bc129fdf26e8805a27d58b714,2025-04-09T20:03:01.577000 -CVE-2025-21176,0,0,3a95640b372fc9da2c8c06537fe18e2ab9d55d13653d370c40ea3cce98ff789d,2025-02-05T19:12:24.030000 +CVE-2025-21174,0,1,779669c4fb2d0a39e20dc1dc87d0a9f68733cc551d17a183ddd3ff20f75a8e80,2025-04-09T20:03:01.577000 +CVE-2025-21176,0,1,567be03459e05e03fb4c14bda36ad998f697c6467349f447ead69cd2162c328d,2025-02-05T19:12:24.030000 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 CVE-2025-21178,0,0,2e136374627162253d0167ff97a286c63e9372c61326ec5a052e546f8d476b27,2025-01-27T18:42:39.560000 CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000 @@ -282949,10 +282949,10 @@ CVE-2025-21188,0,0,61d904ce8e6c95796300defeff9d9b6f0efbb3f96f38de375b3e31d2b7fd8 CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000 CVE-2025-2119,0,0,ab29849c56f7541fdf0c3005b1d9da81bd8ddf06649c2a19b32dc3b60d91d4db,2025-03-09T09:15:12.560000 CVE-2025-21190,0,0,819752cd3115f7af5207de865076f72a020a9a152494989bb3b0abf4b1c0761e,2025-02-28T16:48:20.103000 -CVE-2025-21191,0,0,722567dfd404f9806ef24b382b5876d573b1dfb481d8f95be2ea2fcdceb93cdf,2025-04-09T20:03:01.577000 +CVE-2025-21191,0,1,404c8f49c9401fd776e4e0b37caf7a795cb4e3c404ea3d690b8bd55492919c31,2025-04-09T20:03:01.577000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 -CVE-2025-21197,0,0,5adfbc1258b4d2cd917d1ec8d4a78d0801153d145efbf281e914533e131c195d,2025-04-09T20:03:01.577000 +CVE-2025-21197,0,1,b27b624e27141480fa307877ce4f37b4b9679d2404152704337d2ac6746ccd44,2025-04-09T20:03:01.577000 CVE-2025-21198,0,0,53f4f6f369d20143c35bfb3b5b8897af38e7b533edcc49e38792fe973cc138bb,2025-02-28T16:55:17.600000 CVE-2025-21199,0,0,176b72582a1c759b2a221af004f3d1533ed53f519d379a96b3f3fa529467e5ed,2025-03-11T17:16:19.670000 CVE-2025-2120,0,0,0933aa4b9936e187fd4f948e78df06306502f3ac542ebc510852ac5f6bc0c99c,2025-03-10T16:15:14.347000 @@ -282960,8 +282960,8 @@ CVE-2025-21200,0,0,bed665fd252cfd79c02f5d4dae91a80a34e04b772a3708341c7356808fa5b CVE-2025-21201,0,0,8d16d2905177160db2b6032ff92e8d3931d8e334462a39af27f84ad6f44e497a,2025-02-28T16:55:31.473000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 CVE-2025-21203,0,0,0d3cf8cca7e85ed57f523ac801074d27d046b9f030fe4f8f3af916ec242632b2,2025-04-09T20:03:01.577000 -CVE-2025-21204,0,0,9390cf6749876fd807d56b0fd93b62f2b7678c6fbe5cb5f0bc3a027885ff9f7d,2025-04-09T20:03:01.577000 -CVE-2025-21205,0,0,2130ec9509ae6cc9de5b6f96f81d9a4fee9199cfb989f93c50d33521e71f50c4,2025-04-09T20:03:01.577000 +CVE-2025-21204,0,1,c7a33477c788e5f46aa2f39ad7f0d5d4737995adadacad66b3ddbed92a7996c0,2025-04-09T20:03:01.577000 +CVE-2025-21205,0,1,f971d8388c6fe6940aa7b0bab8375f58f51209be7bac27d7db6c02043b757e7d,2025-04-09T20:03:01.577000 CVE-2025-21206,0,0,4b8246a0a9588c7114ed86965215dc66cea701cb1bb268d6282c30b2185a5b2c,2025-02-28T16:12:14.997000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 CVE-2025-21208,0,0,6552aa4e080fa53d6aaa27d47aaaad081722abcef788f46ace27e1a9e0c90894,2025-02-28T16:11:22.287000 @@ -282978,8 +282978,8 @@ CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4f CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 CVE-2025-2122,0,0,c9ed4527a584d547462b8cd4e21e8f1b4222be6744dc90b957d2fea15b6843b8,2025-03-10T16:15:14.617000 CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000 -CVE-2025-21221,0,0,8debc86dd4a4957d9d72741318a8e830d734c2a860e18313a90f938fef5421b7,2025-04-09T20:03:01.577000 -CVE-2025-21222,0,0,e7b251543bae485554a1e77028f2d8c40a397bf4974c06e88e149f2ccf84a2a8,2025-04-09T20:03:01.577000 +CVE-2025-21221,0,1,ef3b42920d51375a26237b4a54347bbab4cdda69b7e241c6d7980b2500eb3621,2025-04-09T20:03:01.577000 +CVE-2025-21222,0,1,8864035f0bc92bf7b565257a31ae709f9aa885fa2fd3917160585807f574b0b7,2025-04-09T20:03:01.577000 CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000 CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000 CVE-2025-21225,0,0,43d8a26b699bf26bb564adf13e70126920fe623472670908dddd2c504a6cb0ee,2025-01-27T18:46:45.813000 @@ -282998,7 +282998,7 @@ CVE-2025-21236,0,0,dca2e8b53c129d574dbac8ccc02a830290e2d01e064a4d0709e813650ad78 CVE-2025-21237,0,0,b506da9329a9d4995f8f36c74496bc979a022c50f2ee3daece85fce4c81aff91,2025-01-29T23:15:25.410000 CVE-2025-21238,0,0,ed164642995b0290a2351fc6a7d58207d08112ad22db84484bb6e767035836a9,2025-01-24T21:53:02.610000 CVE-2025-21239,0,0,9c433f5e11131caf059a0860ba4c7d770134beadb640baa1fee0187df1c3cca9,2025-01-24T21:53:18.177000 -CVE-2025-2124,0,0,a812e71f33df29dcdbcb4ecd5578b3bfa0307cbe694d82dbd370de874756d059,2025-03-09T16:15:11.533000 +CVE-2025-2124,0,1,3846b04efc4aef6fbfde2a7b10a7dfe18a2c36951ae96d1e0fe2d3211941a63e,2025-03-09T16:15:11.533000 CVE-2025-21240,0,0,4e590d3a8323baf8300345fb6a8ba38cde55c5c539dc581c1cd14a5acd47a173,2025-01-24T21:53:10.267000 CVE-2025-21241,0,0,ba5630f727baaa7b0cfb87aabbaa39f667322b2e958c54247ee336f6ea577069,2025-01-24T21:53:32.040000 CVE-2025-21242,0,0,c6ad86d582b94ed7a50bfc44a12a331f9937482569fe42f361fa93258452bd30,2025-01-24T21:53:39.887000 @@ -283153,7 +283153,7 @@ CVE-2025-21380,0,0,e643fd8c94c7b45625a0b2a2c6180cbad608f386b8797cac9a8273096b1f6 CVE-2025-21381,0,0,474a53d8dfde6c6b7f57adf4f784e5f64df1a01037b909718a2fa8b99ed6eabb,2025-02-19T17:28:10.013000 CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 CVE-2025-21383,0,0,22a445ba53ea367837efa19a0b9db83943b4dfbd7ec9f501e8b2d7a54552e6d0,2025-02-19T17:21:19.357000 -CVE-2025-21384,0,0,7bd4a616af35c55b3480ebdd4c6ff66e25e1e3ab7ea2b87bc4ce55c28e9789d0,2025-04-01T20:26:11.547000 +CVE-2025-21384,0,1,d71172220f98b95b6a84b1b6504aee4595753a41fa0d89c1b7f848452770e9c9,2025-04-01T20:26:11.547000 CVE-2025-21385,0,0,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000 CVE-2025-21386,0,0,bdbf685138a2bfa1abeaa8d7ce9be67b47b59bc6de0565d58925b4537c098f5c,2025-02-19T17:28:36.103000 CVE-2025-21387,0,0,e4ebea81a4d9f55910301b145e28f9ebdee34c280220b7e180e97f999591acd4,2025-02-19T16:55:39.487000 @@ -283186,26 +283186,26 @@ CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a0554555 CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000 CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 -CVE-2025-21421,0,0,92b6a7bd5cd59e697fdb8b6672dd408b7b0ce331940306e7de297c2db29fc7e8,2025-04-07T14:17:50.220000 -CVE-2025-21423,0,0,c3566eeeb17b2aee1ed219d98d8ec0a9754bfeb6a38078f4e3a91b6ba5bd0f03,2025-04-07T14:17:50.220000 +CVE-2025-21421,0,1,f15bf249b08721bdbad98ddd0135517b6ad56087f845d4d9619503a691f86d18,2025-04-07T14:17:50.220000 +CVE-2025-21423,0,1,0e328d405ecfbb8fe86632fa5a763291326842f944399e5e60b0b14a8178f014,2025-04-07T14:17:50.220000 CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000 -CVE-2025-21425,0,0,8335fb99f7a0bdc1cf443d6e4c0c7eb75a021edb751ebba036849ff7c9fddbfb,2025-04-07T14:17:50.220000 -CVE-2025-21428,0,0,fe4e2cf3c062c588cc1c5c28665c34215400e7f77bb4417befdde1789cd0962e,2025-04-07T14:17:50.220000 -CVE-2025-21429,0,0,706719195da556a8234a9d7845d7ee92b1066c952b06df80ea236d69c804c159,2025-04-07T14:17:50.220000 -CVE-2025-21430,0,0,8f342b9cf9a2572f8835725c16c081ecfe91fadecb1775ff76a1a84906d99737,2025-04-07T14:17:50.220000 -CVE-2025-21431,0,0,c9ed2c6cac47baeb632e3c9910ce124ccea11b58bf8b866f1b47fbdfb39da9eb,2025-04-07T14:17:50.220000 -CVE-2025-21434,0,0,0955452e0cec74318a077a4b7820bfc7be2e97e7f50f1492b8913e70107405f0,2025-04-07T14:17:50.220000 -CVE-2025-21435,0,0,b4ca8cab8273a84c9b2820f2e35be231b658a976c589c08946572f0ce99414ae,2025-04-07T14:17:50.220000 -CVE-2025-21436,0,0,d2ef57c281dbc15a3dd8283e9ffc88f944f888b8a56057b90abbef8a04945af4,2025-04-07T14:17:50.220000 -CVE-2025-21437,0,0,e9c93e865f44d891c337346e2ffa5f19e45bafc4a92d3430c40a18fdaaade1be,2025-04-07T14:17:50.220000 -CVE-2025-21438,0,0,4a92487499fcad3f3b7ae65f9ec8cc225cc6cc1d54139687854552d234a58981,2025-04-07T14:17:50.220000 -CVE-2025-21439,0,0,d3e0cb417ebfd354d1ac0f1fc62f95e50c307ec1fe841c646723f1b34877be8c,2025-04-07T14:17:50.220000 -CVE-2025-21440,0,0,6d3c05c6de2f3bccbf4e65170c090c47cc602dbb6d64260798ddac700a805c0a,2025-04-07T14:17:50.220000 -CVE-2025-21441,0,0,fabeec6f584fc9422496b005aa53669b8c5bc1134cb1cd27a7bc5d4bc3ff25af,2025-04-07T14:17:50.220000 -CVE-2025-21442,0,0,2443647d1f0c8c52b44db01f27dab0fc9174804517c5983a811898b5c7ce372d,2025-04-07T14:17:50.220000 -CVE-2025-21443,0,0,e399c82b7bafc98c76139ed41145f43124a073d8275edc3563b3b9ee59e0293a,2025-04-07T14:17:50.220000 -CVE-2025-21447,0,0,c91fa03d73aa229234dbff0a7a0830f3fcb7a97d7bad61fd154dfb11e229dbf3,2025-04-07T14:17:50.220000 -CVE-2025-21448,0,0,cd86a69ef0309337e61655c49f86729a66c6544165791f45933e4064aaa7f90b,2025-04-07T14:17:50.220000 +CVE-2025-21425,0,1,2973138d7d9b6e35e7d945a94baa50b4f2fca4c64a4564e5551f5d2248e34508,2025-04-07T14:17:50.220000 +CVE-2025-21428,0,1,69b7442476ea6fd4758477152b60b52350e6c0f429301f169d66bd9991f80aef,2025-04-07T14:17:50.220000 +CVE-2025-21429,0,1,870d21a2653678c9bcc5dba6b9c6c70a3d313f6766692e0010768363d71bb739,2025-04-07T14:17:50.220000 +CVE-2025-21430,0,1,b58800afdeb82d2fa1166c7a812e6cb300a5e0ba757e90c33913521b0810a404,2025-04-07T14:17:50.220000 +CVE-2025-21431,0,1,0747d8dea6587a9b7f15f86751be6678f61e3a1c0761e2401a2264a2bfc8a59a,2025-04-07T14:17:50.220000 +CVE-2025-21434,0,1,e97b8c7db7b59840aab9791601fe67bf15763c97aa47c7325190ba36366f1b64,2025-04-07T14:17:50.220000 +CVE-2025-21435,0,1,5ee5afa3d171e3c1b3b86828f8cca5087faa3199de081dd271b08927f77c403f,2025-04-07T14:17:50.220000 +CVE-2025-21436,0,1,521a5912af5bbce349dcd7dfc43a4fbaa2b25357df3d302375c63b4105e5794b,2025-04-07T14:17:50.220000 +CVE-2025-21437,0,1,474069ac3575fd5e860fe99ba7f192259ab1262e767e8daf3d9abfe68a5ce23d,2025-04-07T14:17:50.220000 +CVE-2025-21438,0,1,4e3911ca69d0f683c89f04f70812d3d5e993da2bbd14c073e25ffe872b4b4094,2025-04-07T14:17:50.220000 +CVE-2025-21439,0,1,483d21bfb71d213c732202de16adc068189aa95013a1c506380bc7ec458019f3,2025-04-07T14:17:50.220000 +CVE-2025-21440,0,1,beead78335a07e923a7e0e2f3c4cea3393d64f4794a92e98798fb031a740c3f6,2025-04-07T14:17:50.220000 +CVE-2025-21441,0,1,6767c9feebb7b2b01446d669a9d5908e7e079326445739929c36a44179f4e96a,2025-04-07T14:17:50.220000 +CVE-2025-21442,0,1,e3b357683ad4065cccd1ed602ad51647e904baebd6f01fc1649f64566424937a,2025-04-07T14:17:50.220000 +CVE-2025-21443,0,1,62996cb6f060941b6ecddbc544a73b97b0f46a7a491c3db31b968a3a02fa92ab,2025-04-07T14:17:50.220000 +CVE-2025-21447,0,1,426315f42c42f42a5481406e4be3e161d98a87e5838d319262f923ee65bfacbf,2025-04-07T14:17:50.220000 +CVE-2025-21448,0,1,7ebc4e443c7ecb4c31b427e79060d2d52e541e1fd347aab91892496c29efee53,2025-04-07T14:17:50.220000 CVE-2025-2147,0,0,8d64955bcd54c9e90fd3d983c30c955ed78fbb149aa1e8a8da2ca80431331131,2025-03-24T14:30:40.943000 CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 @@ -283227,18 +283227,18 @@ CVE-2025-21503,0,0,ff118b7872c1c4f80ae0b8e7050bcc149ef81443e70a648f2749ebab47fce CVE-2025-21504,0,0,e6d3766b54c5c11dfe451fc90637401c587729f963287033dfd5db9fd788d0bc,2025-04-09T16:02:55.010000 CVE-2025-21505,0,0,a145fae9f80c796e0d3036c3cbf2e9df73c2fd2489ea4682d15cd77dcafb5386,2025-04-09T16:03:07.740000 CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530281,2025-01-22T19:15:10.643000 -CVE-2025-21507,0,0,914a21dfed8e541290f8c2464adde2c6eeb06cbd9e997deb96f2a47902c3104f,2025-03-17T19:46:46.897000 -CVE-2025-21508,0,0,dd14f0ae9fa48dbe8ec16483bf799569c5384277c7dc7f5c851a238b7cc6b741,2025-03-17T19:47:09.393000 -CVE-2025-21509,0,0,2b7c650a7197cdc7a1d5635b3d9c7e75847a7dd8f3ec6ee8912bde4fba1c8f3d,2025-03-17T19:47:23.373000 +CVE-2025-21507,0,1,007166eda0d37ec06452a45526793243e0fea8d62f479e18176e81c46b4337a3,2025-03-17T19:46:46.897000 +CVE-2025-21508,0,1,38aa46d6a476bca3579602fdfbd94ba2a9ddd3791de5357a8b647e31a8958f44,2025-03-17T19:47:09.393000 +CVE-2025-21509,0,1,78d11a80a54a729b734634d90323f7ce96e2b4cd9da9222a33edddf0250cb60d,2025-03-17T19:47:23.373000 CVE-2025-2151,0,0,cf77b440dc7237adc671600d6e84c2421bc20b8bb042dc1a5811ff70b3bc1049,2025-03-10T14:15:26.407000 -CVE-2025-21510,0,0,828c89d27fa1cc631925740c13a9ba4eef8f4c47978f3e3024cb6922c1455b71,2025-03-17T19:47:32.493000 -CVE-2025-21511,0,0,a1a9dd42f57110f4b022dff256fd182865b658f6a2f9199a26ab8aaa5ac16dab,2025-03-17T19:47:45.453000 -CVE-2025-21512,0,0,e247740a828f477871f973b483a6620d4df5299adebf3df98ea793aa029d69cb,2025-03-17T19:48:04.653000 -CVE-2025-21513,0,0,560c96359569e902c8ed96d7efd3037edfc0d9795773fb3f5972575640030e4b,2025-03-17T19:48:23.063000 -CVE-2025-21514,0,0,111a49040f66ce6f4601845e5a7332a67e5d2781959e6db08d867ec626d986ea,2025-03-17T19:48:36.210000 -CVE-2025-21515,0,0,61b50b437f40db729ca7ea7cb964fdabff45f3bcfb99fc2b3783bfa8213897d3,2025-03-17T19:48:55.423000 +CVE-2025-21510,0,1,24d9121b7aefb49035cdb5d69810a4b48ae3295104f9dd86fcfce9a210e78854,2025-03-17T19:47:32.493000 +CVE-2025-21511,0,1,2cabf16d008183b3b619b78d28f8d0c12ed7292151cdac8849fb204752e55cee,2025-03-17T19:47:45.453000 +CVE-2025-21512,0,1,b41dd68018c5ee645b589d1dc835b8f1b44209721493f0312f1786c09fc84c07,2025-03-17T19:48:04.653000 +CVE-2025-21513,0,1,3c86989aabb2a1abf9d935de5a183eb43828fa543d6b90f0a3a11729ad9dd767,2025-03-17T19:48:23.063000 +CVE-2025-21514,0,1,8f6143affc9f22c6886521c601abb0dc1d9ae0e636d6e6c6cd0ae89c6968aca6,2025-03-17T19:48:36.210000 +CVE-2025-21515,0,1,0828af27bcb9a16663a74195e55950d31ee556d7231c37d2d3137b27845ad264,2025-03-17T19:48:55.423000 CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3c0f,2025-01-22T19:15:10.880000 -CVE-2025-21517,0,0,ac0c28044a2f725dc852068105376ee406d947e1065d89baa96ef8623c5542ff,2025-03-17T19:49:06.110000 +CVE-2025-21517,0,1,1086512bfae7e253f269aad4651607ad2b61c185f2d23e04b49b9b890b2708ec,2025-03-17T19:49:06.110000 CVE-2025-21518,0,0,5b06820b53992166ae6c148da23709d31ba9317746b2a7cb4da9ab736370c6dd,2025-04-09T16:03:17.900000 CVE-2025-21519,0,0,f8fb499306d225c6e1c6f135343812213ac3ea87ca1b6f2a92e19501240fe684,2025-04-09T16:03:28.280000 CVE-2025-2152,0,0,3a91733c95b9b836a8e17915bcfcb59c54b652203e20555d880f6babe0af3fff,2025-03-13T18:15:14.183000 @@ -283246,10 +283246,10 @@ CVE-2025-21520,0,0,10f12aae0006a017ab9b9805edf8662d85d86c744004741628d77af18476b CVE-2025-21521,0,0,7177fd3fdb29af335a66e269e46cc0f04dad7ad6313c4f7cedfe7d0e3e35d2e1,2025-04-09T15:14:33.207000 CVE-2025-21522,0,0,f421c187eada4cacf02fb87bae208b34dcf1787fab82fd0f6114592279db904b,2025-04-08T20:44:06.500000 CVE-2025-21523,0,0,d61434c57dd79c7b34ae918e4f7475b615dbdd64c1a20d06da79b7cad84f8031,2025-04-08T20:44:12.260000 -CVE-2025-21524,0,0,b50eaf3784d59689829b6fab85a6f15626a3943929cf2b6b7d3d316f50335590,2025-03-17T19:49:17.870000 +CVE-2025-21524,0,1,0da31d3c72422cbb2e17f367e268deada3dde86b4283d49c52a80029cf552df6,2025-03-17T19:49:17.870000 CVE-2025-21525,0,0,cc9486a245e904134f58e09a3c54d94ca7bbd4f564f04ce8b2efe2f0b54dc120,2025-04-08T20:44:16.620000 CVE-2025-21526,0,0,fdac7cf5aa22219ce3d30e2931ce86c3afca18afa9001cd9d592ceb99fd9883a,2025-02-04T16:15:41.390000 -CVE-2025-21527,0,0,4a259e7b17f13b3c87f1c8ab7a24fa1904627e69f5d484beaf2b958d8d2aa16e,2025-03-17T19:49:29.057000 +CVE-2025-21527,0,1,6a0c8d405f0c0e5ef3dd2642969eaadac7070d9cd6d3f4f298391629826ae20e,2025-03-17T19:49:29.057000 CVE-2025-21528,0,0,e4a89dd052a14e910c273cde2b54814a4717a3a651bc8b5657a5be581524c187,2025-02-04T16:15:41.670000 CVE-2025-21529,0,0,4f5171afb6ca95dd13c23036cd6d7999309b076c134ed9f49494855b4dd9c0f9,2025-04-08T20:44:21.260000 CVE-2025-2153,0,0,d1001c611eef70eb71a49d9fe459204d662bb89375cad643af202eb312828d45,2025-03-13T18:17:10.693000 @@ -283261,7 +283261,7 @@ CVE-2025-21534,0,0,710e2db7719b0323e814e5cb359f520e884ac45ac190e124c8b7e4baa3e9b CVE-2025-21535,0,0,a7f3f871fed6e33a9aaf79b197bf078d043485f7c9d493ffc9a8cebfcd7f4af7,2025-01-22T19:15:12.150000 CVE-2025-21536,0,0,78bd5702d98a7786b137ee4b43e8309b066fca19fe6cbdbe7be9e4881b74d4c7,2025-04-08T20:53:58.330000 CVE-2025-21537,0,0,b4e80cb6cbd7986b00a4cca5ceed55f36513360a0a9667d302cc02c2930c6ed3,2025-01-22T19:15:12.373000 -CVE-2025-21538,0,0,91f8c38daff42869bf75ffa8b7d07a575e4b2202826b6da9d8f56dae062249a5,2025-03-17T19:49:44.330000 +CVE-2025-21538,0,1,58939685b83171a2f0dbdefd4b15f8bbe50eb2d247ec0557417661152fcf2ef7,2025-03-17T19:49:44.330000 CVE-2025-21539,0,0,96e8edcbb7b5d738ae13a970b69cc98d769116ccd85d60241af4d0e6dc8810ca,2025-01-22T19:15:12.600000 CVE-2025-21540,0,0,789ffb4a64e324b0a4bd5a21432b3d6b24419824bb0be217414ef33e78d39a38,2025-04-08T20:12:26.263000 CVE-2025-21541,0,0,ce0f70a063c40730f76f61a376994f3a0b3306f3513e41c95cfed9e59a33f9d1,2025-01-22T19:15:12.827000 @@ -283319,8 +283319,8 @@ CVE-2025-21609,0,0,a6de42b29fb27af22b2f328a2adb6b55148d54130efdaed884c8fa4d6c4fa CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 CVE-2025-21611,0,0,8e422e5fc6d4af0b6b34d70cc0908397e091aab260ca691c03a0f88c30af7c40,2025-01-06T16:15:31.413000 CVE-2025-21612,0,0,138b1e9798db0ff4693818b692f56ae3cb40db3fdb9ae68afaca02a8383a0a8a,2025-01-06T17:15:46.840000 -CVE-2025-21613,0,0,953c2137f5f2817516a9b3b37c6c6a7e7c3da6f78aca3be41016068b67a3f845,2025-01-06T17:15:47.043000 -CVE-2025-21614,0,0,86150776b4d9bc3319c3d144391c42b348ee6a3143898ddc4d4a97592f67fa34,2025-01-06T17:15:47.310000 +CVE-2025-21613,0,1,a78f39b8eec7d1968c4e5a6bb1863996b7dd9f4fcc478536ae3eb968869a75ef,2025-01-06T17:15:47.043000 +CVE-2025-21614,0,1,f6ece7bccf4aede82ba92d2f6a2f2d9a1b287cdf7d6c7f4b124f9c26fa268f35,2025-01-06T17:15:47.310000 CVE-2025-21615,0,0,cfb97692b989fd81bccccbf2f2ca2fbd2b4edb015e27dbadb4aef0a4db09ebad,2025-01-06T17:15:47.510000 CVE-2025-21616,0,0,e559ef4ac5df61efe4cf0701da0053dbddf1460e9e7d82184184acca52d86c59,2025-01-07T16:15:40.390000 CVE-2025-21617,0,0,7b4d3cd409e247af145af2eb5a48d15c4b9f239c86e7d266f2a1e45e29cfe915,2025-01-06T20:15:39.453000 @@ -283340,15 +283340,15 @@ CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9 CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000 CVE-2025-21633,0,0,49912650efede397bb80cd960106a9cc9aa2951cb56a1e77301af9a556d9cf6d,2025-03-24T17:40:47.083000 CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000 -CVE-2025-21635,0,0,4cf3da6333d0e4084cbf1ebe82eeb13cfba8e51169f179976a5cbb111090b21f,2025-02-28T18:52:04.810000 -CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31060,2025-02-27T22:01:45.773000 -CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000 +CVE-2025-21635,0,1,9beb493fbd712607c57a99ce402016d640670358402873ee98a5e3e17d21d7d8,2025-02-28T18:52:04.810000 +CVE-2025-21636,0,1,c669bcf3c318d65020e642b9376e6611d5cf684a0150c545175002707aa25158,2025-02-27T22:01:45.773000 +CVE-2025-21637,0,1,e247e6edf6e2a750cc5f0fc3a861554b1212e237c8477a1bfbeefc47d919fc64,2025-02-27T22:01:21.430000 CVE-2025-21638,0,0,9d86aa994135a768747d281875630b356945096fcb469d4f7c25e444b5635f12,2025-04-10T13:15:46.747000 -CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000 +CVE-2025-21639,0,1,d9e5f46c37d803ec06ce924d0154e48b59561afd6e0ae77305de57b611cbb106,2025-02-27T22:01:10.337000 CVE-2025-2164,0,0,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000 CVE-2025-21640,0,0,953f71ba357e60ac226bad23a14e2ffa823449a710acdd82904145531c90bad0,2025-04-10T13:15:46.927000 -CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000 -CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000 +CVE-2025-21641,0,1,dda0a9c91a2f2d6eb9dd6fb6cc7b915eb5ed1fcd59e40b0598ce022a90181b36,2025-02-27T15:15:08.843000 +CVE-2025-21642,0,1,00d0dd35f7a1c60132eb716222536560729dcaa07f7c48cfab2b89a970bfa9a9,2025-02-28T18:54:58.420000 CVE-2025-21643,0,0,cabaf0da35f1a3435ec7869964661b97a8bf2d764f2f1be480a70dfedc80edc2,2025-01-19T11:15:09.870000 CVE-2025-21644,0,0,07d5427a2099bf44db029dabc323f06f030f9547354cf0debecb7b4167ba0d37,2025-01-31T15:55:03.973000 CVE-2025-21645,0,0,8f74f4ea3009e3fd1cfe74b6defc5f27e4d96879e50843473a83691c779da4b4,2025-01-19T11:15:10.090000 @@ -283357,7 +283357,7 @@ CVE-2025-21647,0,0,364d8fe2a4a4581fc19523cce621fd21d39be059ff2f15125f2c929a3bec1 CVE-2025-21648,0,0,1e28b61383e7660836dbbb26d762b1871cd28f2a60ea4ccb673beb93821501a9,2025-02-02T11:15:15.433000 CVE-2025-21649,0,0,83a08c42f448e1e2fb20d671a214f30c7bf25568b8e5958ef29572790d694059,2025-01-31T15:56:17.907000 CVE-2025-2165,0,0,3fa02b527a752047d7599c3f2af4cf7f081441a816c4c1132099b177afee05a9,2025-03-27T16:45:46.410000 -CVE-2025-21650,0,0,979a638a4fc2874261a1028ffe64fc716d1395d9b241ea774792153993d8eac2,2025-02-27T22:00:13.243000 +CVE-2025-21650,0,1,098bb53712a9226fc538b608cd2eb2e46d8357046e2cc4ad8c584ab8967e2448,2025-02-27T22:00:13.243000 CVE-2025-21651,0,0,d057ff764ce31c4ac7e93c37cb4ba424635250ef668040e2530ccd52f14e89f7,2025-01-19T11:15:10.733000 CVE-2025-21652,0,0,20d739461f3527398cd43bd52a6f89c66a16cc1ddb96e5765be31fe2e5b35e8e,2025-02-10T18:15:34.883000 CVE-2025-21653,0,0,4054ad842aceda82766dc1a772620a2211cc9da6d0c6c3e3c2a1ffa9a7bf55f6,2025-02-02T11:15:15.557000 @@ -283369,7 +283369,7 @@ CVE-2025-21658,0,0,49f4fb1da0e36dec3735688e008c1d1b6e11cd524605dedd795d9dba62770 CVE-2025-21659,0,0,c34fae85ac5791c6acdfb8c055236ca0db3c10e1f998433ca0b29112c1552ff1,2025-01-21T13:15:09.540000 CVE-2025-2166,0,0,7dfb38375031ba4110b91a5c61a12cc1284a8fd503d275e7cc1f64ae6fa045d0,2025-03-14T05:15:42.723000 CVE-2025-21660,0,0,62f40623237245457c3e1282812660b56ee49a4868b504432c0ca95a3b8af3bc,2025-01-21T13:15:09.643000 -CVE-2025-21661,0,0,0133c37d65296cdc4e67645840c0f4e685787034d5f718c269f4c317c9b71da7,2025-02-28T19:01:52.967000 +CVE-2025-21661,0,1,a30d10b52a5f425556eab8a3a3f3321082939387d3f4513599ad5c47c23ec2dd,2025-02-28T19:01:52.967000 CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000 CVE-2025-21663,0,0,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000 CVE-2025-21664,0,0,87fd856e07f552629b0a9eaa9bb54dc5da1a52702744fda35e3dcc449f63ce6a,2025-02-02T11:15:15.697000 @@ -283446,22 +283446,22 @@ CVE-2025-21731,0,0,517373a1d7ba8b90aa467ebc0cdc1107bbc4beec5ff8663d2daddc700f880 CVE-2025-21732,0,0,4f8c0aee918472637ddac16b363ffbd3a3ed06383ffac0b747e65e4dc0756262,2025-02-27T03:15:13.820000 CVE-2025-21733,0,0,2169fbddfaa3299480040215746cb4189c541b3386106a8e760ba24d31681988,2025-02-27T03:15:13.923000 CVE-2025-21734,0,0,a1ca6870c8ab7386e769e43c9223647ef924ab440380e27b4f29866f41851e59,2025-02-27T03:15:14.030000 -CVE-2025-21735,0,0,208b272e4df634bd5fec135827c098b9b5f8470d6716823f91d4c5bc28f8e0e9,2025-03-13T13:15:51.153000 -CVE-2025-21736,0,0,03769f85d2039f613ae3ad43df981826291e2207544fe89f509c2da8a26a0d36,2025-03-13T13:15:51.307000 -CVE-2025-21737,0,0,37cf51ebb5e8c77de9e5d34e128d0d40ce63b592e6eb11ef8ad1fe6bb2849daf,2025-03-06T12:23:48.727000 +CVE-2025-21735,0,1,d2be763c7c02b19e3e7540b68df994d298f981a50398210459a6d9bda68e6bec,2025-03-13T13:15:51.153000 +CVE-2025-21736,0,1,f694a40d41d6c84db0c95b26f2c89c17330652e032c4ff892cfdfcc643daec53,2025-03-13T13:15:51.307000 +CVE-2025-21737,0,1,ff62a6fe3f0168c38f44b7054ae16d18682f9d570756899182731aca14ea9734,2025-03-06T12:23:48.727000 CVE-2025-21738,0,0,093ee763ae1cb586d8b1dcacd419104229c8dfeecc738985e1c2082b049fd838,2025-02-27T03:15:14.427000 CVE-2025-21739,0,0,0484aef444285c411fa3deff5639dca9db625d19f75037b12c09411a21bd5bbe,2025-03-24T17:12:42.593000 CVE-2025-2174,0,0,053d0114b98b53de55addf75882254531d2f009d8ec47b0c74af510084b7311b,2025-03-11T07:15:36.887000 CVE-2025-21740,0,0,c6d9198bdaa0c56c8b9a87f08ac1f0ea72d91aa24fa653c23426da784b7eb093,2025-03-27T14:15:22.250000 -CVE-2025-21741,0,0,37fa05c46e2b50f8d462c80cc47267e3a0ffd3da62b6c095bcde080a41446188,2025-03-06T12:24:11.507000 -CVE-2025-21742,0,0,383aa061e49cea19b0c0484cc65f8fb4436a5a0d815e27ed614c7f93bad29533,2025-03-06T12:24:23.890000 -CVE-2025-21743,0,0,81dbde35878c694088f8e3bdfc9e0f6bdba39b2d1875650b0fb74cfa26720a10,2025-03-05T18:52:05.927000 -CVE-2025-21744,0,0,49854bf53d0058426ac9d13ea98ad4988bbd9cd834a8ad091f5b6fb50a1fb9fe,2025-03-13T13:15:51.453000 -CVE-2025-21745,0,0,79105e255663348f3f19fc17a3b712146a711e997d63105bb5170d62c63fe59d,2025-03-13T13:15:51.610000 +CVE-2025-21741,0,1,b910bf8d3cc2cbf02c1b1762ab8c1ca2bc5a436ce7de419191246bd275cb2bd4,2025-03-06T12:24:11.507000 +CVE-2025-21742,0,1,e08ff7a45f82dd428f3c4f7544e424e156677a0da5bde47008832ab58a3a3747,2025-03-06T12:24:23.890000 +CVE-2025-21743,0,1,9d3ac1a70f73d6797c34c2bd25041b57d34c132452c0fb54c924fa0663937458,2025-03-05T18:52:05.927000 +CVE-2025-21744,0,1,394d42910703a54b2beb90d898017681ed2acc3d20be261a182764f72be36509,2025-03-13T13:15:51.453000 +CVE-2025-21745,0,1,32c22285e757250dbae50993d9408ea15b8fa0d50a42d460dec3333252307da0,2025-03-13T13:15:51.610000 CVE-2025-21746,0,0,abebf8b27a554f56da2c3af963591a3741ad6c9701a2f24e94fd1f3fb8c83aed,2025-02-27T13:15:12.240000 CVE-2025-21747,0,0,6945cf96acfa2f3325a6d802909fdcce17cdddd800a95eae51d0eda13c3f37c4,2025-02-27T03:15:15.337000 -CVE-2025-21748,0,0,ddb3136a885eeea65f8b87a6acaa29e8d52944893f38dff263b4c7ce00331308,2025-03-13T13:15:51.740000 -CVE-2025-21749,0,0,dfca7ee1e2795963bc73834563126be762c8273d5041d3d5ff6a0ef417ac6caf,2025-03-13T13:15:51.893000 +CVE-2025-21748,0,1,b74260237c25d388bf05cad2e68e68944b11b0ef021f05fea94e68f320d032c2,2025-03-13T13:15:51.740000 +CVE-2025-21749,0,1,07432d4a0d45201f8929286264dd6898e6d29893ba5ac4b5ab60a855d675abd1,2025-03-13T13:15:51.893000 CVE-2025-2175,0,0,896f157153cffae8d23254e309512b55c14f559d1cf76c68e25b08523ac0c5d3,2025-03-11T07:15:37.440000 CVE-2025-21750,0,0,f15dc29516045c828911aed313d0a5391b811b58339e2f47eb3626921007ec0c,2025-02-27T03:15:15.647000 CVE-2025-21751,0,0,fc5aeee4451a722453f059f92e4e88e84c17adf1159ddd72722c3f29690bee55,2025-03-24T17:20:32.850000 @@ -283483,37 +283483,37 @@ CVE-2025-21765,0,0,6c32220502c5e1b243fc64b879af944e2f21a94ba3b5caae10c32b75d9fbd CVE-2025-21766,0,0,1e61d5adcc38241ce92d9f437ff86c4de91053ee16540b6e5036dcac3ecc72b3,2025-03-13T13:15:53.827000 CVE-2025-21767,0,0,4225a284d864145993262bd18e5e8ed4aff0347e4901d199f48285d7e72411f5,2025-03-13T13:15:53.937000 CVE-2025-21768,0,0,fc643bd8709269969bc948419c8b4ae2dfcce2f3be64e8628189728a9184334a,2025-02-27T03:15:17.480000 -CVE-2025-21769,0,0,a07b7980e64484480337e8950c213a41bfc1ecc4245556794d681d566c58f0ae,2025-03-05T18:48:26.333000 +CVE-2025-21769,0,1,a531004869058d095ebd3537c4892317953bf7435c1845a44923c2bc62974bb3,2025-03-05T18:48:26.333000 CVE-2025-2177,0,0,c5648db1ad9f81628128428d72d69348fd9189f77ea601e4f4163da6530ac669,2025-03-11T08:15:12.297000 -CVE-2025-21770,0,0,c044c71846e20a23d6fd44dad32fd30f7203464dc36b96d9de7e9954ec998f91,2025-03-05T18:48:15.533000 +CVE-2025-21770,0,1,ec898a5ae2b8a744fffa2c9f37efb2d72d968bae944d03d728ec179c71eb75af,2025-03-05T18:48:15.533000 CVE-2025-21771,0,0,c91809ecb025a626a15de34623cf44629dfac343cd37afacfe0caa429de2bdd7,2025-02-27T03:15:17.767000 CVE-2025-21772,0,0,fe9ade422de5ac4df1dc28d8e63cfceb17cd50d60f0f9bba92b8b4d1af06e55b,2025-03-13T13:15:54.037000 -CVE-2025-21773,0,0,7b3282f14f190d23a07815fe3e9a4ffaf333ff7401e23d5bc8d963913432152a,2025-03-05T18:48:09.423000 -CVE-2025-21774,0,0,97258ddf714439af3c089a3440483c77b66aca0a845292a4171a42f3bcc0b17b,2025-03-05T18:48:03.253000 -CVE-2025-21775,0,0,a3e6accf8a13f1c0dc8faeee5da155ed90ff8a998ef86e3c699c286fd93ebee7,2025-03-05T18:47:56.107000 -CVE-2025-21776,0,0,b551fdcc84038793f88508aea01daceb7b07a8bca390c5c31b6373a5cebfaf88,2025-03-13T13:15:54.157000 +CVE-2025-21773,0,1,3120f7dd0cfbe432624a388e34f076dca6b7de6688330f946b121ae83a78700a,2025-03-05T18:48:09.423000 +CVE-2025-21774,0,1,58a040e4058c63ade2b6a4ac94ba80f9aaa1ee544d6e02d7f70f095bcda878f2,2025-03-05T18:48:03.253000 +CVE-2025-21775,0,1,0d70912b2be52fbf33d438a35ae66ca558fb442c867f1fdb55311ceddba793c2,2025-03-05T18:47:56.107000 +CVE-2025-21776,0,1,dda30cf1b02bc30fc32e000e690e84ded38e61ebb3b62098b7f3fd2a76be2047,2025-03-13T13:15:54.157000 CVE-2025-21777,0,0,7b78680346abf8713ba33d8ac2e09aa65789813ca4da1d487df84ad030b784f2,2025-02-27T03:15:18.377000 CVE-2025-21778,0,0,0c802a465cafec7b0cf75bd3642bc281bc51b491d7eaffcb0778a0688d330462,2025-02-27T03:15:18.533000 CVE-2025-21779,0,0,c0338c9da9cdbbe996ebb3f4a4c98ef74717beb271bf0d37e258e536b6501eb2,2025-04-10T13:15:47.123000 -CVE-2025-21780,0,0,01f0434a3d257b8ba9515a26126762d812e0204abab33ef12dae6fc660254fd6,2025-03-05T18:46:37.527000 +CVE-2025-21780,0,1,f3ed71a5937757c425c60debd330bfc6c9dedf492d1aafbcc218b730807e6175,2025-03-05T18:46:37.527000 CVE-2025-21781,0,0,a06889eaf8443274f189b81f6ebfd0500246541870dc146b227773bbea061b5c,2025-03-13T13:15:54.427000 -CVE-2025-21782,0,0,e0238cc0199ff7923b4d03a2573d1238b28faae69b93a5bfd79f77b3817b2eb3,2025-03-13T13:15:54.550000 -CVE-2025-21783,0,0,b0be4b1030692bf74f01e394fa0e7db1743ce5f78d0e8a110fbd4ec5597859dc,2025-03-05T18:44:45.983000 +CVE-2025-21782,0,1,7fc9693479ab98567de1d462506c20b100cf5c04e7383a32517206d16ed2426d,2025-03-13T13:15:54.550000 +CVE-2025-21783,0,1,ad08249d7235e91f9ffdbc398d9a30da20e6a2934da700a4f89513abdd739131,2025-03-05T18:44:45.983000 CVE-2025-21784,0,0,45ff73a81a2d77f223f24a345bd3797bd65afcb92ab691f045cec0adf817a5fd,2025-02-27T03:15:19.247000 -CVE-2025-21785,0,0,6297b6d6fa634ce3003ac7845affefcda26994ccc6b9b99d33501c39f91fb634,2025-03-13T13:15:54.690000 +CVE-2025-21785,0,1,41bc08f68ed3e58c25f0a81dbb49ed60d81a5a829815db8e65ed247a5817d734,2025-03-13T13:15:54.690000 CVE-2025-21786,0,0,b90a40eb16f7fe92d870af72b1f2242115b869ae2e223dffaefbfb6c1364ca23,2025-03-21T15:43:17.480000 -CVE-2025-21787,0,0,f282d9777c04821c3638272650f475ef21424baf1a0d4407aeeab43b97bcba09,2025-03-13T13:15:54.840000 -CVE-2025-21788,0,0,52e694ce058b3e739e461d2815835bff2b76af0dd92252e6a40e1a96f0925087,2025-03-05T18:41:43.490000 -CVE-2025-21789,0,0,1b09177de84f6ff50add7e55bd3d493b6a7a5d252acdab78160b61028578d878,2025-03-05T18:40:47.660000 -CVE-2025-21790,0,0,6da5d872bce5fc9d8dba6607e7a9bd877ec85e80f3d1952fb5de50579156a1ce,2025-03-05T18:39:47.673000 +CVE-2025-21787,0,1,fd125bf8a977b9e0478db619bcbed2745c4be999c43a8dc4ca44c732dc92f90b,2025-03-13T13:15:54.840000 +CVE-2025-21788,0,1,19cc0be201fd654d012e09d0e619f842b1c3773c1702b178fc7d12c28231fc72,2025-03-05T18:41:43.490000 +CVE-2025-21789,0,1,70292f22a02be7a6e3e1ce329ca22a5426b9319f32636e5898291eea86be70e9,2025-03-05T18:40:47.660000 +CVE-2025-21790,0,1,87b4874df5b4cd4d6a9177bf1894cd5b61e92ab7c4883f2e23c11fce8d8b3e14,2025-03-05T18:39:47.673000 CVE-2025-21791,0,0,3b9d7ef1748ac10faa4631ddc81f215987ce1fd556f5003e965b1d54a7c26aef,2025-03-13T21:53:49.573000 -CVE-2025-21792,0,0,075156b63dfa0062611d413237924723b2a75688e080510774b58587a8936343,2025-03-05T18:38:40.167000 -CVE-2025-21793,0,0,7f60f8cf7c9573e95f453033df16c384c59f29dc65afb3e4635e21616c008471,2025-03-05T14:57:48.210000 -CVE-2025-21794,0,0,597bdb2303b4bfba8cb71fbe1ccb172b2ae94f7eeb0cf34f445ebf7a039c932f,2025-03-05T14:57:41.323000 +CVE-2025-21792,0,1,614730b64aa9ca10890857dea3b98b786f6a1e16b547f99eb9507d7d30855cde,2025-03-05T18:38:40.167000 +CVE-2025-21793,0,1,999bb0cc6361b315a026add085191401b5800a0883ea73e0b8292a84f819de23,2025-03-05T14:57:48.210000 +CVE-2025-21794,0,1,daba644080545022108fefa450b140c016d3088d21749c377638a6140feb0e63,2025-03-05T14:57:41.323000 CVE-2025-21795,0,0,41a905f262273f3125e25b3c7fee5a38525dc83ec439d55b09556548293e3549,2025-03-13T13:15:55.257000 CVE-2025-21796,0,0,402d2f65b624ad3b45beea67b634cef47250e1621b44c455ccae7c5571792633,2025-03-21T15:42:34.703000 CVE-2025-21797,0,0,55dd5cb34d65406236b21e9b8fbffb072cf50e1f0b1f281bf2350fdb903c4257,2025-03-13T21:52:13.843000 -CVE-2025-21798,0,0,f637315accdd65840c6c7ea9336a16f24c1c5231ae82f64f4dcb9667ee0c4d69,2025-03-05T14:57:02.327000 +CVE-2025-21798,0,1,53db71fa71161ab00da107a738cc09e80f8fa716cc94fc3fa6530716c8885c77,2025-03-05T14:57:02.327000 CVE-2025-21799,0,0,63712a5c3cad08ea3f151f07c95bdda3df02539f15e74238c6f989d7e94c5ecb,2025-03-13T13:15:55.610000 CVE-2025-21800,0,0,4260e92732f8c6a7f6518189e662300cd8f506b5f184419a48f61f4ec395049c,2025-02-27T20:16:02.660000 CVE-2025-21801,0,0,da81985e783faa2502ae07010a07eb3d8778ced799720ff14748e2ac34975864,2025-02-27T20:16:02.753000 @@ -283524,22 +283524,22 @@ CVE-2025-21805,0,0,83015512429d1ce1bc9049e55ec1e37bf6b8af5c9ad9c2b1958bd205ed1b0 CVE-2025-21806,0,0,443f8039c1125656ae58c90e87897188aa10e0b48d188ad62755549c2d8b8eea,2025-03-13T13:15:55.967000 CVE-2025-21807,0,0,a1c6c5da4ae7a1154ac6f72155c4981e355672fd4d8fe121288e8a2f5ff5d904,2025-02-27T20:16:03.317000 CVE-2025-21808,0,0,9ceae351a95e7f48e3b731421082f24bc9aedc33279bc458c69eafbad1c046f0,2025-02-27T20:16:03.410000 -CVE-2025-21809,0,0,09f0a17905fb2ea9c441686c0beffcfeb26739f6b443588515d4717d1f966d81,2025-03-05T14:56:45.970000 +CVE-2025-21809,0,1,0e696c2071a6e34a123763a2ab7ea7ee2ea2d4f6a95205dc8fbab562b530da52,2025-03-05T14:56:45.970000 CVE-2025-21810,0,0,1992f049e00c8bf3aede3d6b0b1f239950c0a2280d3810b236fa997a0ca8e658,2025-02-27T20:16:03.587000 CVE-2025-21811,0,0,fcb63bd38dc7ce89cbb1d67f09edaa6b652358e7d0d06acdabe3ca3a5e004fba,2025-03-21T18:30:54.380000 CVE-2025-21812,0,0,0172989b53c6feffdc375708d0a02eb1d75237040d5e5920d81ce1955dc1efd1,2025-03-21T18:30:33.520000 CVE-2025-21813,0,0,78df5f168bcf407ef8d0541d43d53e4fe129ebc6e2716e4b36acef01df61f61a,2025-02-27T20:16:03.883000 -CVE-2025-21814,0,0,9111e96991ca4a8a7555974eb9ca029e35a3a860ab790719d75295fb5913855d,2025-03-13T13:15:56.290000 +CVE-2025-21814,0,1,c364ace44bd0b50483a36447581071f1df07a5f9d5793183d961c3e48b85a166,2025-03-13T13:15:56.290000 CVE-2025-21815,0,0,f4e2c12cd4a4edabd0c8b0bd958ad46a201e53ff9da54eb242d285bf4d2e973d,2025-02-27T20:16:04.063000 CVE-2025-21816,0,0,77e8315616cfd3295c24347d715bde3ac86c88872cfb41bfdd021a900f0796df,2025-02-27T20:16:04.150000 CVE-2025-21817,0,0,c1a7c26d0ccafcef71ad51858a2ffb9b84072383a4f0223ff11f842c70b97e93,2025-02-27T20:16:04.243000 CVE-2025-21818,0,0,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 CVE-2025-21819,0,0,fffb2ad585acacb7750de724d03060958e0008c1da6ee25489543c037e67d048,2025-02-27T20:16:04.430000 -CVE-2025-21820,0,0,4cd49ec42eda5c1817687df934dd825d43ee0555aae1505bf86c1b59832958d6,2025-03-13T13:15:56.413000 +CVE-2025-21820,0,1,0859a09c43af6d8b07b19bccff331f076441cfc7abb43f25bbb917105bee1706,2025-03-13T13:15:56.413000 CVE-2025-21821,0,0,8ec4be0b45b5548c264fe1bb9d0e85477b77cff40287ec4ffc1d89f6ff178de8,2025-02-27T20:16:04.613000 CVE-2025-21822,0,0,0b2049d3a83a0a3b63ea7cde4011204e2b4aff429701272520b7ec68b2bcf811,2025-02-27T20:16:04.707000 CVE-2025-21823,0,0,dac5056ba0606007e7b8c88bb1be440f4ea7d81f10766da6e633e3d7f3af8355,2025-03-13T13:15:56.547000 -CVE-2025-21824,0,0,7490d302a1b9637efe98bc56c5c03dd8b4dc1cefed3dbeaf8cd6f0102781637c,2025-03-05T14:56:17.040000 +CVE-2025-21824,0,1,8ef64bcb64404d2239a7c9496409d71414c24ea8a51acf0ab2158e76bd69e958,2025-03-05T14:56:17.040000 CVE-2025-21825,0,0,c34c077c7a13d54e4edb4dc54ac507c54d262309aa1bfc308a153f03bac660c1,2025-03-06T16:15:54.753000 CVE-2025-21826,0,0,9c7ee5dd146c293dadeefcf726b9845e3ea9770abaa2ea13363f1697b4f8f7ba,2025-03-13T13:15:56.677000 CVE-2025-21827,0,0,fb78647a6dc91e0914cafb0a95dce65769e2fb4cd399ca1202dd7318c55216c7,2025-03-06T16:15:54.967000 @@ -283575,7 +283575,7 @@ CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4 CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000 CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000 CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000 -CVE-2025-2186,0,0,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000 +CVE-2025-2186,0,1,cad89263354fd092311c6a0b967f19d144a65ee9997059fc729d42796f57f926,2025-03-22T13:15:35.683000 CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000 CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000 CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000 @@ -283584,136 +283584,136 @@ CVE-2025-21864,0,0,9493e0e3f19d26d5f5f28d9a142c5ed99dfd5520d76c54b34eae8e16cc387 CVE-2025-21865,0,0,d4d05887eaa1c713ed24a4eb9902c0a277f7efbb3a74c13e2f093ca2ea0e813b,2025-03-13T21:13:25.760000 CVE-2025-21866,0,0,b68246967aed0a13ecb7ecec070327f1e043320cb68e5c30d71c9149d538f4ea,2025-03-13T21:13:14.300000 CVE-2025-21867,0,0,675b3a6693533782a1dd9166920cf3454686fd0c9e63307359fa33c7243e2f1d,2025-04-01T15:44:27.570000 -CVE-2025-21868,0,0,e38efab895361092c6f2c1c1288f1a8db36070045fa9b9bac339452e6d0941b0,2025-03-27T16:45:12.210000 -CVE-2025-21869,0,0,9a61ad4a8f01ea27ddee4ae59ae06002c5666c2b4f139c2882f0f10c19df935f,2025-03-27T16:45:12.210000 -CVE-2025-21870,0,0,2a878beea703ca6f4f9773d427c39a0e202317697a48d7fdeb340d1be2f592d2,2025-03-27T16:45:12.210000 -CVE-2025-21871,0,0,278caeaf7ca3ab37586809f350682736e4b433bf1bd57d9c9a5e0dac53a0769e,2025-03-27T16:45:12.210000 -CVE-2025-21872,0,0,9714cccb1fa3af66786ff3b041688162099252cf9429422c71cc9bbf94076c69,2025-03-27T16:45:12.210000 -CVE-2025-21873,0,0,1f96b78a995ff355c6b5fa45c0061f97a70e564d55d0eb715bc190ee88faf12f,2025-03-27T16:45:12.210000 -CVE-2025-21874,0,0,1adcf9b78e1c8d145fbdfda75096e4809a2fc3b63c644c0852c82374ced12ce4,2025-03-27T16:45:12.210000 -CVE-2025-21875,0,0,b5625c8e550275d03916a5a20e4feeb93d091dd6e8a0bc9bd35a7506d0cb516d,2025-03-27T16:45:12.210000 -CVE-2025-21876,0,0,4a0038b7c7e3ad9384cea82279b1cf64a05a3e4225ed9d56a36a485128171757,2025-03-27T16:45:12.210000 -CVE-2025-21877,0,0,c437563af9a3bbb4466053437f14e6318de6523f073b70a549fee56451cd2d50,2025-03-27T16:45:12.210000 -CVE-2025-21878,0,0,85bb1d4ce91851874a9876add0fe2bdb719454b0f602c413429852acacb7c4e9,2025-03-27T16:45:12.210000 +CVE-2025-21868,0,1,c15bf95ad5e6aac453ccb1440348c1abe99115edc734320d2ca3e93c94d7942e,2025-03-27T16:45:12.210000 +CVE-2025-21869,0,1,a67a55a29c6c4f0d1871b2dc863b951bfebf768f72c54732a861f1b409c46582,2025-03-27T16:45:12.210000 +CVE-2025-21870,0,1,8c3acd2276a9b206895730ea9c6ff6060a7581af2d0693df3bb5ea9809d0a77b,2025-03-27T16:45:12.210000 +CVE-2025-21871,0,1,e5cf181ed390bb7bb9fda71fe61bc791f1ad854ebea40e254b6b2e1ea3b00e6b,2025-03-27T16:45:12.210000 +CVE-2025-21872,0,1,3ba523cc3005000375d4e547414f78c5d31f47b5b7aee1b73494a0012e9313e4,2025-03-27T16:45:12.210000 +CVE-2025-21873,0,1,2d9892a7a8efbf74d357eee3619e59e1d127c746a93380dc362e640544b670f2,2025-03-27T16:45:12.210000 +CVE-2025-21874,0,1,8c4295730e1675f16177846d4de0dcd316c3e5fcb89deacdefedb904859d8450,2025-03-27T16:45:12.210000 +CVE-2025-21875,0,1,ab4559ad53dc7c8c7bfddd80f031e55a303dfa7bf56d280d5379d08288529340,2025-03-27T16:45:12.210000 +CVE-2025-21876,0,1,29ac42f6e2dddef5e01d24d1f99b9149de3109991edd7e8724e43a3bead55502,2025-03-27T16:45:12.210000 +CVE-2025-21877,0,1,62eb51b2a8b8810a0a6857a1fc7de395bbc151e36231d2633da147da73791a26,2025-03-27T16:45:12.210000 +CVE-2025-21878,0,1,ea1c59c546da493c029ef9036231e5836f0d99163a312b86e94b9d72cf0f284e,2025-03-27T16:45:12.210000 CVE-2025-21879,0,0,52cde173ce6cfe8244003fb8bfaa70683fe2ac5f9fd95bb9d7e6cc6afb939a5e,2025-04-01T15:44:57.750000 -CVE-2025-21880,0,0,65446dd7a88d3aea0edc0fbbc44ae1ecb39e31762207fdb90d675ebb3ecfd495,2025-03-27T16:45:12.210000 -CVE-2025-21881,0,0,621c593ef852fd10664a6193911b19f75ba42ef286e0ef80709cdd2519027040,2025-03-27T16:45:12.210000 -CVE-2025-21882,0,0,b07c3caf9a06f9aa5a6a3daff13eb0af4f51c57b66970e54bef6a1226adf5b1d,2025-03-27T16:45:12.210000 -CVE-2025-21883,0,0,045f07428f0f4e79115be78966c0f19f59c19951efb25db2f322c663d06ce0db,2025-03-27T16:45:12.210000 -CVE-2025-21884,0,0,d62fef2e13b5f2be0bf092cf86311a09248a9d708568107fc6d5a1905aea09d6,2025-03-27T16:45:12.210000 -CVE-2025-21885,0,0,5baffbeac66931dc4837b76b5ee5b5ee9be1545f84fe5cf729c8539ecd5e54cc,2025-03-27T16:45:12.210000 -CVE-2025-21886,0,0,ef369f845dccace629d38b1b4a7d2b1db91c4537f8471735937df3d903584c03,2025-03-27T16:45:12.210000 +CVE-2025-21880,0,1,dbb8a128810b935b5b223103f0bc8ae55b429aee3df58a3565f1c1a08f50c5ff,2025-03-27T16:45:12.210000 +CVE-2025-21881,0,1,2e727f84c5496d9764fbc6e3a5fe913da9fb88fd498782db803d2968c85aa8ed,2025-03-27T16:45:12.210000 +CVE-2025-21882,0,1,83d0e496e7375f097e6b9972365cb79a279fa71e980ee63260d556590c4bcf9c,2025-03-27T16:45:12.210000 +CVE-2025-21883,0,1,189474838f11ee847ab1afd194a532dc48e4ae4a4d89cf79d467d1ec78ce7777,2025-03-27T16:45:12.210000 +CVE-2025-21884,0,1,9cec97f2eb0e35e2ad306c3ca75a9bb8959191e5439fd20fe1c5c19789241c88,2025-03-27T16:45:12.210000 +CVE-2025-21885,0,1,143adfceb7a3084ab7203e208f605004851cd2b38c1adb42010d9f7096c83110,2025-03-27T16:45:12.210000 +CVE-2025-21886,0,1,d036f9152bc268ad6b66d640db1bf1187f224f5fc132ff0a34ee8f9512529117,2025-03-27T16:45:12.210000 CVE-2025-21887,0,0,8e71519aded56871936e1e79917321bd82021d2c79180da2e08aba43d80e5c01,2025-04-01T15:45:08.943000 -CVE-2025-21888,0,0,49b46d552891ca0213ffc91df000ced6b0d78aedb1f230f00c65cb8bbd2a4c48,2025-03-27T16:45:12.210000 -CVE-2025-21889,0,0,770280777125586420d2a10fcc4b387645526310d5c6c6ee3e62a4bd56dfbf3d,2025-03-27T16:45:12.210000 +CVE-2025-21888,0,1,dc50779d5216692add3b81b8706de40f1800751b043e2d65b8ab08cc989a3a5b,2025-03-27T16:45:12.210000 +CVE-2025-21889,0,1,613bb8e5477dc8b9708e9f8d45b21599969d349bd31d212be67f4804b47da817,2025-03-27T16:45:12.210000 CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21baa,2025-03-11T12:15:12.057000 -CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000 -CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000 -CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000 +CVE-2025-21890,0,1,efb8b09c2309d374767a8998641a756d1775bf18aaf59d6cea8921db31bb7fc4,2025-03-27T16:45:12.210000 +CVE-2025-21891,0,1,e63cc7af69dfff9e4870183ebf69a8575538c1977db9ea80523f2e446045bb12,2025-03-27T16:45:12.210000 +CVE-2025-21892,0,1,f8d64669a9c31147113eeb71119c008da76c627f19abb9984de83eed80fb80c7,2025-03-27T16:45:12.210000 CVE-2025-21893,0,0,77af67f7ba022fe2f0a850b03c8fb5214a9efbab3a359cf8e731a18457c95188,2025-04-08T15:48:59.010000 -CVE-2025-21894,0,0,3518ad87830776ee5c456f2bcf0334909724e246cb0814f7b9f796f00f6b5953,2025-04-01T20:26:01.990000 -CVE-2025-21895,0,0,ecdcd68f96a27358be9b473e4f7dbeace23e71a535e86e1f922cc6e013fd6800,2025-04-01T20:26:01.990000 -CVE-2025-21896,0,0,6ce209f987b7643981187449403e84261f70a59c8693a0bc69e1616d860bd91d,2025-04-01T20:26:01.990000 -CVE-2025-21897,0,0,728eae5ab93be55a14953c0e3f8f1aa775a70fb305d140819143c71a44e186dc,2025-04-01T20:26:01.990000 -CVE-2025-21898,0,0,047f2040be5d6df24a142339e865f8b0986aae175e7c1654826fc344c8e5b4ea,2025-04-01T20:26:01.990000 -CVE-2025-21899,0,0,e38f90a9a754c5e5fb3b5a2eead3ab6e2e385fbe9ae95f286dfb8fef05c194c0,2025-04-01T20:26:01.990000 +CVE-2025-21894,0,1,483d5cbec59aff7a58e46e3bf31abe25129582087bc0c0cce00ce1b420761ab9,2025-04-01T20:26:01.990000 +CVE-2025-21895,0,1,9e711107c80d49094cb2796349b856c3e0f6ead22229895ca0bcec4c2808d57d,2025-04-01T20:26:01.990000 +CVE-2025-21896,0,1,abad3f6e38e361a07917fc4a381cec3cc388d6a6926f4a1ae3b43df0dc69228f,2025-04-01T20:26:01.990000 +CVE-2025-21897,0,1,73cda5699ea61a6e344375e727249a0bdbbc6b1d7dd60cf5df6b7f0da0053ceb,2025-04-01T20:26:01.990000 +CVE-2025-21898,0,1,a7eb81730533919ccf25e9fbd4327806089060f3b8cefe212e31ab24f57e6cc8,2025-04-01T20:26:01.990000 +CVE-2025-21899,0,1,1945a1c83cdfe081c8c93b7168da8b1cfca83829cd3c8d44980905c47c070f72,2025-04-01T20:26:01.990000 CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000 -CVE-2025-21900,0,0,21173fd15e873afca7953b981f7df83de22eb47d0ee770686535ca77547ffb58,2025-04-01T20:26:01.990000 -CVE-2025-21901,0,0,21510f7129c68140506c39346dd2c72c46e6739e4289551114d9aa451f588059,2025-04-01T20:26:01.990000 -CVE-2025-21902,0,0,86ccfd390f8a6dfee7253156905fd816583e76aee7d929d85595dbb0fcde9a45,2025-04-01T20:26:01.990000 -CVE-2025-21903,0,0,e58eac61a761743ff44c4ba42d852a2c8cbe68a5239f4b59a73f1e38abe88f52,2025-04-01T20:26:01.990000 -CVE-2025-21904,0,0,aec8d8c4a9e38cd0b531be4e34485604b05729866ca3bd2fff26578d74548393,2025-04-01T20:26:01.990000 -CVE-2025-21905,0,0,3d98a53c08cc4fd1ebb2b23b91c3b893a44c292fcac7c334c5f6a98e7937515a,2025-04-01T20:26:01.990000 -CVE-2025-21906,0,0,009a782966ce9f1287d2f9910134e408d20d2bf3a0609b3a1bc34ab26b03ec2e,2025-04-01T20:26:01.990000 -CVE-2025-21907,0,0,8098018c9dbb5177cc82b0608d16a4124f4a82a3afb6582e0f29c22c9e4a63b0,2025-04-01T20:26:01.990000 -CVE-2025-21908,0,0,ba6dd62537c5b1cbeac9bce95948a27032d18746e0033807cfa90c0d356a4210,2025-04-01T20:26:01.990000 -CVE-2025-21909,0,0,5ea8463806d89489a87b187b41a00ed83580d70c90a9d6d7ebbcd9309c30a32e,2025-04-01T20:26:01.990000 +CVE-2025-21900,0,1,d3ca63774acfab3ad91a9c806b97aa8ab9d8853f7a5e0ff117e1a7678fee8acb,2025-04-01T20:26:01.990000 +CVE-2025-21901,0,1,36ce6a62426e26a1b9b75d95c0edbb0b042ceee5e29a29166c9374b8e8e00d51,2025-04-01T20:26:01.990000 +CVE-2025-21902,0,1,a6fbf20b2910053831e413a76f640f4a1f81d32cdb1709a29c2a9f21a0e6b1a4,2025-04-01T20:26:01.990000 +CVE-2025-21903,0,1,789acb61686fd92f514c96d422670cde3efcd50a76f341584a32619a48277d78,2025-04-01T20:26:01.990000 +CVE-2025-21904,0,1,dadc0b20edbc7048b27f0d43c0e34337f50f77bcdb1861bb71824d65928a3c43,2025-04-01T20:26:01.990000 +CVE-2025-21905,0,1,9025e3ef7805dbb427530ebc42877634084c98aa130ff3b91f1c9cdf334390ba,2025-04-01T20:26:01.990000 +CVE-2025-21906,0,1,89dc5bf35a841a7fe59b6597c4149581b176e911721fe2e1759579d706bf7f19,2025-04-01T20:26:01.990000 +CVE-2025-21907,0,1,8986e06f97ae244ff2cf5506fa583053dbfa2c32118451fcf8bbba421c0203eb,2025-04-01T20:26:01.990000 +CVE-2025-21908,0,1,55dbee1987f2bdaa619e1be8e5de6d7c88e208317f648fd684640111f55e7fd2,2025-04-01T20:26:01.990000 +CVE-2025-21909,0,1,36192af1776f234a74b61c2273ac078a672b55ccadb270df4d38492ec734b1fe,2025-04-01T20:26:01.990000 CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000 -CVE-2025-21910,0,0,fd61ee760dd30b764d76616b955ebe4b1d691c7bb54c2b0220cc3e250b0580d5,2025-04-01T20:26:01.990000 -CVE-2025-21911,0,0,ced218eb225bd219499fb5eeff197ab1d1e324cf66d6478b81edde34dcf18ded,2025-04-01T20:26:01.990000 -CVE-2025-21912,0,0,1d7dcf5e0616e756094bd8430eead5965aead12896413ec394edd4cd5b805c98,2025-04-01T20:26:01.990000 -CVE-2025-21913,0,0,66c791bfbfadcaff848dd84ccb728aa02396727814a1b1f819998d5319df38c9,2025-04-01T20:26:01.990000 -CVE-2025-21914,0,0,43e8b841764a3fb4c5b2f5ca1dfd80d9a692c6c675aac830883c15ea6e9404f3,2025-04-01T20:26:01.990000 -CVE-2025-21915,0,0,e9ff01185dd6c94141f82aa842ee98c862510b5c38faa1b2f82c23eceaf3eae4,2025-04-01T20:26:01.990000 -CVE-2025-21916,0,0,5ff5f340e651fe9e743b93228fca454cbb2103c90f2d61eac89d73e481d51305,2025-04-01T20:26:01.990000 +CVE-2025-21910,0,1,436f1a51ad352ce3d0efe9383d7a93eacd46b912b4f1871334966797cda56af9,2025-04-01T20:26:01.990000 +CVE-2025-21911,0,1,be783f4bdd31e3e1100539b46013618a04c27c76c1f4eb289a09a51f6402fdbd,2025-04-01T20:26:01.990000 +CVE-2025-21912,0,1,f5aec98be5359c53bdd97e1187976cdbcbc895790c1aa8ab63adc23ede868f69,2025-04-01T20:26:01.990000 +CVE-2025-21913,0,1,9519933b9778ef27fd5bd2d0118730492d42f96ac20a534ebee25505ba69ad85,2025-04-01T20:26:01.990000 +CVE-2025-21914,0,1,ba1c7edff1e14b38b735641a5ee3682941e44109afd618d898aafe4281d5fe8a,2025-04-01T20:26:01.990000 +CVE-2025-21915,0,1,4483da46b2ca8e05afa3668fe127998a47d6010f1d7d27abfa9915db52df6c9a,2025-04-01T20:26:01.990000 +CVE-2025-21916,0,1,82ff2e9a88320f6ff8dd318c6a2b34ae1f83a312a158e63fda6fdc32c5170c45,2025-04-01T20:26:01.990000 CVE-2025-21917,0,0,1e7e41d404d1b544af2c17535b5ef11a768381ae05a2afc3f9d1af25d778e327,2025-04-11T13:16:47.853000 CVE-2025-21918,0,0,4abc2b860e5b8fd56ee2fb148846b64635e48933b47ce64fe45424c092533500,2025-04-11T13:16:41.533000 CVE-2025-21919,0,0,d95484d5119ab55d1bbcda159f66b9560ab36b503d3a23606661138d06fbbbe0,2025-04-11T13:16:34.527000 CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000 CVE-2025-21920,0,0,227de9f8dcfd4dcb13eeebea92ed1d329f8aac5df17a5aa2016c5cd7f7d6a673,2025-04-11T13:13:02.493000 -CVE-2025-21921,0,0,3e9a7f35cc18b46592edf084053e856472a3423da8398d5645163cbf96fa7327,2025-04-01T20:26:01.990000 +CVE-2025-21921,0,1,1ba58bf7c41b83015ab19d0088062fcb6dee327196ac3beff4e84bb0e820c735,2025-04-01T20:26:01.990000 CVE-2025-21922,0,0,12874dbf86e8bd3072c3c29573b0079a1cbbf9bca0501b9619dfb9c1bd87badb,2025-04-11T13:12:33.020000 CVE-2025-21923,0,0,225009ce97aa1ade9afd21e19666c2ed75c409568cf66156c0e557a8ca7f99ed,2025-04-11T13:11:59.570000 -CVE-2025-21924,0,0,8e0cde829e4464ab3878ae4a63811db51e453e508fa0103a60dbad95c335d800,2025-04-01T20:26:01.990000 -CVE-2025-21925,0,0,7c97ce890c05b2ec11354f2cc59c98aefba41881407e2245d3cbb8099c425455,2025-04-01T20:26:01.990000 -CVE-2025-21926,0,0,9225232b74827963c0387bc5eaae8f05b23b7fd767e9dbdb7307240d3ba7f3b8,2025-04-01T20:26:01.990000 +CVE-2025-21924,0,1,74792c2cdb344e307f3e5f4e37d81781c5e18e9bbd0c9131ea2d38fbb6e74577,2025-04-01T20:26:01.990000 +CVE-2025-21925,0,1,e2d1fa1a0f74d5c56427328c87cf7cfee7ae3db3253f3e29a90e0bace4d6c503,2025-04-01T20:26:01.990000 +CVE-2025-21926,0,1,6237bb586f5b2bbcc75ddcf70e28be387bc0fdcecd2fd1c4a1df578b0972a0e0,2025-04-01T20:26:01.990000 CVE-2025-21927,0,0,f161d8b86632a56386879cc505893ef77c3d74196fc1b4a962caab85e53057e9,2025-04-11T13:11:42.327000 CVE-2025-21928,0,0,94267e373621350f852688bdbfb38209cb30f6a6bf9ed387cb063e91ee567674,2025-04-11T13:11:28.080000 CVE-2025-21929,0,0,ef2c3201e29c9a03e57a70c01991f699fce7b648022c03a9e66e5ce09964b37c,2025-04-10T18:07:16.230000 CVE-2025-2193,0,0,8e5af84dde56a5d9b5155a16f15b4c6135e2277f321f17256e72c764084ccb18,2025-04-09T20:48:27.550000 CVE-2025-21930,0,0,0dd90264a695616f176345532649ba4b3a9ee9a4a0c3bcdfba75a44749ad3c66,2025-04-10T18:07:05.263000 -CVE-2025-21931,0,0,9861dcd5c43b17158a65324822dc7d0b2a46eb92376cd070551daef3d5461da4,2025-04-01T20:26:01.990000 -CVE-2025-21932,0,0,c8c24c1b95513aae9a303137920af81a2f313818387a6148a38ab1bf68167016,2025-04-01T20:26:01.990000 +CVE-2025-21931,0,1,f351304eae9e8a6da48b9c776c5ca9490c1107c907d43235b20b842eb0474ac0,2025-04-01T20:26:01.990000 +CVE-2025-21932,0,1,580f01886b9b5b583037292d283da0544b21192940b4ad004c1913f7c6eabbf5,2025-04-01T20:26:01.990000 CVE-2025-21933,0,0,0332eb668ea0c98047c961b88816e9812d2043129ef4a261f6ccb7e9f644709f,2025-04-10T18:06:52.953000 CVE-2025-21934,0,0,6d635995bb33c76acf3d21a0f390b664b32cfbb3f984976656ccc6641880d9f5,2025-04-10T18:06:44.560000 -CVE-2025-21935,0,0,aabcb33bfb6bb4e85f8b47a198545d914fdd6e3491f811f4392b4da2d2b146c3,2025-04-01T20:26:01.990000 +CVE-2025-21935,0,1,b358065f91c42f93c5649a52d4b72a0bde18fa7b2932083c37e353373eaed292,2025-04-01T20:26:01.990000 CVE-2025-21936,0,0,a1a443c9e594178ade7735727e912f294386bef3e2e590e38566fe26a232d103,2025-04-10T18:06:37.333000 CVE-2025-21937,0,0,cf445d124de4dc2965b849a8db6bb96cc1718269c7103dc87560ec2cc079dd57,2025-04-10T18:06:31.597000 -CVE-2025-21938,0,0,80d07c88b53688ec96ee15d798b6b40def2206c228ea9a90ddb2eed49fe24dee,2025-04-01T20:26:01.990000 -CVE-2025-21939,0,0,a787a16fdbfa658370f13a489dbbff6f008ee32954c421885701e640121c746b,2025-04-01T20:26:01.990000 +CVE-2025-21938,0,1,446c6bc6a69642bdeca304bbc404a4017b4e16be7e7d68c3e11b7c594435f4eb,2025-04-01T20:26:01.990000 +CVE-2025-21939,0,1,63d86570f56e80ce95238b65d0b26e70b64f0d083c6a1a0a54e8aa9e46d45472,2025-04-01T20:26:01.990000 CVE-2025-2194,0,0,3fdb717b1bc330f1d470bef99df31cb06c8ddc496778912df85edf14f5ac3b49,2025-04-09T20:46:03.463000 CVE-2025-21940,0,0,c1d0da43a3ea28afa76e2719094806242ee42930c6d123e1859a03e6263b19c2,2025-04-10T18:06:19.820000 CVE-2025-21941,0,0,c8de092b94d96e72e0036344fbf68e1978b5d52d4002b69c877051cc47352a4d,2025-04-10T18:06:13.530000 -CVE-2025-21942,0,0,349a2a434b71a6775457f2fe25f968468bbbe7edcf978d4717310c6f5742fede,2025-04-01T20:26:01.990000 +CVE-2025-21942,0,1,375bae4e12ca709e7f4f57d155440f0249586c530520ab0c51622af7a41897be,2025-04-01T20:26:01.990000 CVE-2025-21943,0,0,5510084929b704da25069da121f708776de5a931c4b7d99ace7bbf364a3ecb5a,2025-04-10T18:06:04.267000 -CVE-2025-21944,0,0,330601e4a6f25dfe681cd754bfb47e5d6a193264e47845a475179f3ff9267f23,2025-04-01T20:26:01.990000 +CVE-2025-21944,0,1,b06e6ddf72ac1130f624ec890a941286f5f1c97a7b150dcdfc1530a539f45133,2025-04-01T20:26:01.990000 CVE-2025-21945,0,0,b170158405035db3e87a8f38369aab1a64007dd05bb7998746b9cbab472ab560,2025-04-10T18:05:55.863000 -CVE-2025-21946,0,0,101d1de45df09258ed1075f1f5345bc99c07194f40a478653e6aed0db05d388f,2025-04-01T20:26:01.990000 +CVE-2025-21946,0,1,50f8d0ae033bb43873ce46d90fa810f70741ef5d14e70be706a95b7a0f83760b,2025-04-01T20:26:01.990000 CVE-2025-21947,0,0,da5d0cc40b66b8461a53fa907a5e0d956371cf46fcdb09417ecd43964205312c,2025-04-10T18:05:50.873000 CVE-2025-21948,0,0,8905e4be274bc9becb0ec3e550fee161be85c71da251c7587374617564a3150a,2025-04-11T13:11:16 CVE-2025-21949,0,0,dcdf72153bd923719f87dc8dd3720fd0fabcd013ba12340fae1954ce8ff05096,2025-04-11T13:11:06.313000 CVE-2025-2195,0,0,a3f28c3cebc6352ab864e3834dfd7f4a18550fa64fc8ce24cf879cfc067c7370,2025-04-09T20:45:17.083000 -CVE-2025-21950,0,0,32d785759702255ad8fa71822657b10592a24cc367b7cb4edb10d7b1cfd5c6d8,2025-04-01T20:26:01.990000 +CVE-2025-21950,0,1,88344b9be6389b07a4cc0a95875705bd0d2e969e1aaa33ac79555e6bef962b41,2025-04-01T20:26:01.990000 CVE-2025-21951,0,0,7611df174b58fe7ac1fc644bb27fcfe93686c73bd203fdc029188fc8dc041223,2025-04-11T13:10:55.757000 -CVE-2025-21952,0,0,3539418067a9eb47905c6a725aa1c4cf337f9ab2151a716be076ad0ece4851d6,2025-04-01T20:26:01.990000 +CVE-2025-21952,0,1,d4027f5d7d3a8aef28f85e99ab962bfcf275fd5db4e08bd8bd557cf6ef694567,2025-04-01T20:26:01.990000 CVE-2025-21953,0,0,028ff88137d31e0fbe2ead20e09b58bafe3dcb9a5b3d45c643b1c6dda1ebb6ac,2025-04-11T17:06:38.070000 -CVE-2025-21954,0,0,6157820ebf2ef0bae5efccb0d3cbe882c266edd1111db3a78fa24a8edbe9ffbe,2025-04-01T20:26:01.990000 -CVE-2025-21955,0,0,94bbe6ce28ea752a2dcef8b94e13df7fcface3c096a02e5a66b9f0e050fc7c4d,2025-04-01T20:26:01.990000 +CVE-2025-21954,0,1,970718c3d81651d4ec015ecfe6be9716c09103551372fe939c5bb927e306d777,2025-04-01T20:26:01.990000 +CVE-2025-21955,0,1,3f92ee40de2655adb46d1b057b00c5dc856955eaad7b904b9917c4750d77f0cb,2025-04-01T20:26:01.990000 CVE-2025-21956,0,0,4a8984510eb112b1f831009e6931bd3dda5a155c9ec28311bbb8cc79350dd185,2025-04-10T13:15:47.440000 CVE-2025-21957,0,0,f21a97cc998bb02c31536c1d78df27fb68940ec2036675e701c9a77361140386,2025-04-11T17:06:24.197000 -CVE-2025-21958,0,0,bb332d2c65fb62395d4a6a1470bdfb59200d05d98aa0097eb1832f7ac11306c8,2025-04-01T20:26:01.990000 -CVE-2025-21959,0,0,c1a027ba45f4c865aad7e919c98e728a14de7871e684e1165d615bbb2f3b17ea,2025-04-10T13:15:47.717000 +CVE-2025-21958,0,1,f1cc25ce6d13bd1e5cc16fdcdb0f90ece0734d1d101629ed0502f1555f7e02b9,2025-04-01T20:26:01.990000 +CVE-2025-21959,0,1,58c1a8b99ed249076dc97100adfc50ad1f0355ea6cebd00973c0696076715b06,2025-04-10T13:15:47.717000 CVE-2025-2196,0,0,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000 -CVE-2025-21960,0,0,deefcf69ed458179f3443ceaf1f7a13e8ad6c7428510fe7449fde80547547f6c,2025-04-01T20:26:01.990000 -CVE-2025-21961,0,0,08d35fb06287d1ce6f0793f2b539daf4e1b7125cfa39134cd2d4ac956f254f23,2025-04-01T20:26:01.990000 -CVE-2025-21962,0,0,e1439aec39e66ff23aa6755f528208f67db8deaeb399e400eda5a087486ea719,2025-04-10T13:15:47.857000 -CVE-2025-21963,0,0,57a26a39938094a374fd29a2faa07f4ce7af572308884954c965b1a1d0e34451,2025-04-10T13:15:47.980000 -CVE-2025-21964,0,0,1c9615f107a06e1393a03618a66344bf1f949e217847d92673a3f28bfaab2b7a,2025-04-10T13:15:48.097000 -CVE-2025-21965,0,0,eabf1c9694ffab817b7b209e6b04ddf30e4240614d21b4272eca11f622330a04,2025-04-01T20:26:01.990000 -CVE-2025-21966,0,0,959df35733bcc8f9896148954a5380423ba1dacb9707e4827b0642a0e6ff4498,2025-04-01T20:26:01.990000 -CVE-2025-21967,0,0,5b2d318e39931102a9797730efbf4938cc2d0ca33323422cadcaa62a5ec89980,2025-04-01T20:26:01.990000 -CVE-2025-21968,0,0,567d954a11efd2f8b070060afdf576450ed491d7a4f5fad07eec57e50b1fb766,2025-04-10T13:15:48.210000 -CVE-2025-21969,0,0,33d9acd579432a4be1bf96f6e04ef982cf048ceb11706d15d31d4bb5c0092880,2025-04-01T20:26:01.990000 +CVE-2025-21960,0,1,9bef9c369638087f2219c1a6981e05d97ee7985c40316eaab75e0651f0237ebf,2025-04-01T20:26:01.990000 +CVE-2025-21961,0,1,787c843ae3cd329f392334693aa54d766b9eb821133a0cc0fb1b8053615f657e,2025-04-01T20:26:01.990000 +CVE-2025-21962,0,1,f8dedebff3c3da2ec7193fa6c2288a255dfe310de15b5564b051adaf1c40eff0,2025-04-10T13:15:47.857000 +CVE-2025-21963,0,1,5c137e5e5b4d8d65e85da1b8840c64d28d164dea83f98a6aa9c4cad2b62fc1bd,2025-04-10T13:15:47.980000 +CVE-2025-21964,0,1,383e3303da1a07540fcd3a282d3b8c396ce4a15e26261b1be7009bf2606412fb,2025-04-10T13:15:48.097000 +CVE-2025-21965,0,1,e07fca671066f4a4b50d52f56929a677533b71270d577411490bea8c39ec237c,2025-04-01T20:26:01.990000 +CVE-2025-21966,0,1,59f09c7c75f24e29ebb4d26c21dd66091ea9f6aaa6b9e50875acf691839f526d,2025-04-01T20:26:01.990000 +CVE-2025-21967,0,1,404791f95811aea6c7f4033d591aa9eaaa19604b32b384c9e8d025d8a86eacbb,2025-04-01T20:26:01.990000 +CVE-2025-21968,0,1,bac9b405bee848f090f3e3a32a7d3ec27b7cdc8dabf0a00d6789b5e1fab115a7,2025-04-10T13:15:48.210000 +CVE-2025-21969,0,1,b1cff6d184e6c791ac738b739d0869779580e5620835327def75a36d2750f028,2025-04-01T20:26:01.990000 CVE-2025-21970,0,0,ba7445dc61bccd37c0f7ca1a141461c1c02ebd565257c235441700d71cfad345,2025-04-10T13:15:48.327000 CVE-2025-21971,0,0,b9d234e567e462d15ed318b3bf4dc7551c45c9f6c61850ac7f7a28311b584baf,2025-04-10T13:15:48.453000 -CVE-2025-21972,0,0,aadee25ba27bbefcb750b4416d7e86bd4cd8a8e375154227f8660bc60f1521cb,2025-04-01T20:26:01.990000 -CVE-2025-21973,0,0,68cd8d4feed32b30f36da235adc524f78160f7e336f5e042493f8bb8318631dd,2025-04-01T20:26:01.990000 -CVE-2025-21974,0,0,2c7ff97e9a5d39a305fd3ff61bed7371427903de1151ab3fc323f2d8e887809d,2025-04-01T20:26:01.990000 +CVE-2025-21972,0,1,d85845769d0cd5fe597b1eb7b9c324d06cd06a54a4c2f3e7cb0d6c39aa6a1b43,2025-04-01T20:26:01.990000 +CVE-2025-21973,0,1,ad75bdb2d432e7adf3ae5745fe813b5fd06211df30afeabf9c66a8708fbff64e,2025-04-01T20:26:01.990000 +CVE-2025-21974,0,1,2689fe6c6d3b578d8167e395086a89ea51a6b02c8bd4073930ec77a6cb2afead,2025-04-01T20:26:01.990000 CVE-2025-21975,0,0,d8705123227ae80536c9a24928bc70b1fe5bed745ad1dc2a429e1c756a090724,2025-04-10T13:15:48.573000 -CVE-2025-21976,0,0,4941ad863aa3198fd7fada061f8668895e63748c2d5e55237b30372ca7146866,2025-04-01T20:26:01.990000 -CVE-2025-21977,0,0,f91bf235f4cca74d524b98373c6c9eef911841e5d265a74f3307666dbcc13d66,2025-04-01T20:26:01.990000 -CVE-2025-21978,0,0,c017c875b6d5debfb5fe65bd022dbefeb7183095407442c8640d9394d9c7b54f,2025-04-01T20:26:01.990000 +CVE-2025-21976,0,1,939bdd2d1e1d68decf09c6b159ec29bdb2888cecb0540d4e232785dc2b8b591f,2025-04-01T20:26:01.990000 +CVE-2025-21977,0,1,ea9624cc72719e94834acbb2d192e7c1ab3aee2a72684846cde6dac7dafcaefd,2025-04-01T20:26:01.990000 +CVE-2025-21978,0,1,02621a80f6c5ba8cd6e8ffe8f45e826c1f0d5b96de1e43085ea965c1806bd164,2025-04-01T20:26:01.990000 CVE-2025-21979,0,0,d82cd2d0f5c320c8e76f28a33969e6c3a1a898db839234291d6e1c0f5c28d988,2025-04-10T13:25:50.870000 CVE-2025-2198,0,0,f4e4d1c774196cd95c8a84e5b73cf7bc3b77b51ced927b7f810f100bb8c512c6,2025-03-20T23:15:12.520000 CVE-2025-21980,0,0,ca3a23fe5612f79d1db215d56912aa585e47d27ebb0fcdf9127bdaa53db612ba,2025-04-10T13:25:42.490000 CVE-2025-21981,0,0,56cf7520d86490869f5449abbe30bb11f8dbb71b85d42b392133a285522dc26f,2025-04-10T13:25:35.970000 CVE-2025-21982,0,0,c7384c1191fa97112f9c98b3a394c1935d6aecfdd8da49bf04580e705393600d,2025-04-10T13:25:23.140000 -CVE-2025-21983,0,0,c5b65bbeb7f0ac57718e0fb77aaa5b43a1c6911111f940b0290d414a7af83c27,2025-04-01T20:26:01.990000 +CVE-2025-21983,0,1,dff26c01d6ba224459840d2a40cd2f031fb3bf5d1294045517ac3e0c25615e5f,2025-04-01T20:26:01.990000 CVE-2025-21984,0,0,0c582767f8e0808eaeddbb9bddc83b93eb9f25072d3cc940f4578109471f8778,2025-04-10T13:25:15.120000 -CVE-2025-21985,0,0,280ec0d6f7baa6e0d8ae7a6e5d0f668c0199c4f77ce90ac583ca778e8966c114,2025-04-01T20:26:01.990000 -CVE-2025-21986,0,0,fb287982c4b7a869a7bc98ba0c625cbaa01e8337a3b47a086619e81f4fe4fa1a,2025-04-01T20:26:01.990000 -CVE-2025-21987,0,0,aa90643ad5e8c3d9497e088fec5ef4f2255cf9e4d776e894a3aee4abf4fdf4dc,2025-04-02T14:58:07.527000 -CVE-2025-21988,0,0,5b07386bd61dacc7caa284694350b61fd7f7a7af482dca8f5fd89ec747f667e6,2025-04-02T14:58:07.527000 +CVE-2025-21985,0,1,a028042c35c3f8f43be926810c3aae1d5ee0563915267870ecf2581ccab34538,2025-04-01T20:26:01.990000 +CVE-2025-21986,0,1,1c9099b8f9210d896b02124f50f1bc8e0323d3cc4871019dbb092bada8b27a29,2025-04-01T20:26:01.990000 +CVE-2025-21987,0,1,590e0d761f6616c9983e00f4b52ac2355274024d304c8685e602e0601415badf,2025-04-02T14:58:07.527000 +CVE-2025-21988,0,1,6917268db42ed0bfd386989b7aaa8658e61720c9fae5d27f98fbbe7e32a2cecf,2025-04-02T14:58:07.527000 CVE-2025-21989,0,0,154e034c6e299a2a9b3600f5e682a41ee35277312b832c388d52baa36fe5f262,2025-04-10T13:25:07.567000 CVE-2025-2199,0,0,6cca999d1fd02ccdc948cc3c785871dcf520469b36ed9558917218ebe5cdd745,2025-03-17T10:15:16.243000 CVE-2025-21990,0,0,c6f830c7a6f95cb12721fb767d6ec640320b1f9276d5551b2ede2366ad6d31f3,2025-04-10T13:25:01.577000 @@ -283721,7 +283721,7 @@ CVE-2025-21991,0,0,63b49f43cf2133ca43a412e23175e72c099a14957aef6c2061b912b623048 CVE-2025-21992,0,0,15562f59303a19ec99d0304ad06949423b421a45c8bc31ef39284adf4b1d9575,2025-04-10T13:15:49.053000 CVE-2025-21993,0,0,c7d7a240f7e952f7bb94c66a07e027bda01efc77ec36981187d03cb58fdf6d20,2025-04-10T13:24:10.787000 CVE-2025-21994,0,0,fb9048208441dce66026c77200fbc30f31fbf21a4c08fe3e825028547f121380,2025-04-10T13:15:49.333000 -CVE-2025-21995,0,0,39cd5a3684b1268074ce5543ed4e1145926df1a1efe6a4230d26e4ca94fe5d6d,2025-04-07T14:18:34.453000 +CVE-2025-21995,0,1,be3f203f29c23f487b880a834b782f44e65b5336b161982d29e494fc726f88c1,2025-04-07T14:18:34.453000 CVE-2025-21996,0,0,588f0fd0b54d9addc949f3c824af6a9ae5f47eb17c59b79156a90266569b6ab7,2025-04-10T13:15:49.453000 CVE-2025-21997,0,0,75f2db7346f5e11f441832bc84fd599e6226bd742c17a20daa803e3391a1951a,2025-04-10T16:16:08.107000 CVE-2025-21998,0,0,2132e66f9124475ed72918a493be29e5d88b09b204031de702954c5cff8b4124,2025-04-10T16:15:28.363000 @@ -283747,7 +283747,7 @@ CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7 CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000 CVE-2025-22017,0,0,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000 CVE-2025-2202,0,0,cf0ba4cc9b924e183defbee63ce1af96a184cec0b7613a3c88b1e156bd38ec40,2025-03-17T11:15:37.970000 -CVE-2025-2205,0,0,b1382e6746291ecf1fa2fa4001a821037496afd4b23e79b7c29516948b896185,2025-03-12T04:15:19.810000 +CVE-2025-2205,0,1,fbf363faec05dffcfc872bf5b989460ea4958dbb9808068cb2832da5e42818ef,2025-03-12T04:15:19.810000 CVE-2025-2206,0,0,6d4b6e8bdf6b24741a4430972818a20f8052ecfc15f1df2ff630f331c8dbd714,2025-03-11T20:15:18.487000 CVE-2025-2207,0,0,56f8ea6de312fa52f135a30fd05af611b5ec865ae25945c14444aad808ec80f8,2025-03-11T20:15:18.690000 CVE-2025-2208,0,0,99b9d91a36ada917eec10dfce1128ade8f30ac7ffcb2e43a5105e2922f45ad1f,2025-03-11T21:15:54.117000 @@ -283802,18 +283802,18 @@ CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855 CVE-2025-22217,0,0,9cdcef52095db7e9904d6b3326fc88cf0e987f626da15eb2ecdedfea3492a01a,2025-01-28T19:15:14.640000 CVE-2025-22218,0,0,f601a81266c0cd0101089f5555d53f0c2dbff758ed8617a00f74ec5eb5ee65af,2025-03-13T16:15:26.910000 CVE-2025-22219,0,0,15a8c0ed57cde9402d747ee08a9fcb7816a0eec2ef22de5c372705a6d7374409,2025-03-13T18:15:46.553000 -CVE-2025-2222,0,0,f33432fad33ca500b06ce505261da82dc1d9e05fd8b710e5991f6ad3d410dde3,2025-04-09T20:02:41.860000 +CVE-2025-2222,0,1,83c34d1a9194c11ed002d6f3912658acb237d5e8ccdcca04ba6f700807b516d4,2025-04-09T20:02:41.860000 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,4cb947e6faf21297f90661fc0e04de33a78453bf920a147b2042bfe63f151b75,2025-03-13T14:15:35.450000 CVE-2025-22222,0,0,58fbf61f1e86261177996a1b70d050ee1228a83c36092ff3d83feec937c303a8,2025-03-13T15:15:52.450000 CVE-2025-22223,0,0,378371d90f0991131b0046e32f771588d25f8f9dd668abb17d7c0f37e7851c72,2025-03-27T16:45:46.410000 -CVE-2025-22224,0,0,8a77aae7700a2228886ae679a0216a335ecf02ecf88fef5838f7708a2afdd3f4,2025-03-05T16:18:36.103000 +CVE-2025-22224,0,1,0c0906335b7f86da24b3fde710fab603a9c0fb60b93cf41fdeb4c7c486105569,2025-03-05T16:18:36.103000 CVE-2025-22225,0,0,58146fae408760c2f60bbe9bfdce94156ea27b616f03de267b996bc262a30f1c,2025-04-10T19:19:49.860000 CVE-2025-22226,0,0,d8b6281876fd003f404f7031a16d8be8c66b83496a9c80b329f6cf341e4f4e88,2025-03-05T16:22:52.433000 CVE-2025-22228,0,0,fa7f165a4b7ea7a15cc95ee04c8cc8a48940b5c217d39b7a5efd68469d6e9030,2025-03-20T18:15:18.663000 -CVE-2025-2223,0,0,16d94e880dc7cf5b8eadb9ec28bd7ef40145c0095cdb04aebcbd963af69f8b7c,2025-04-09T20:02:41.860000 +CVE-2025-2223,0,1,094854a8af1f4b5bbeb2189724ba72e42aaf7e61c4bec22dfd5aa3c105196939,2025-04-09T20:02:41.860000 CVE-2025-22230,0,0,3e91dce00139a0364993ef91e4dc70d3b6016fb8a3b6eea2cbe343e4ad228132,2025-03-27T16:45:46.410000 -CVE-2025-22231,0,0,38152a3110370108b825f0fdd0a499588968be14feabeb92e601098ca54bc3ab,2025-04-01T20:26:11.547000 +CVE-2025-22231,0,1,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e5497419ad,2025-04-01T20:26:11.547000 CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 @@ -283829,8 +283829,8 @@ CVE-2025-22273,0,0,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb76 CVE-2025-22274,0,0,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 -CVE-2025-22277,0,0,d3953de33b0251c415d71264a93a8d08d09a60d984824c8d1bfdf7718d25ecad,2025-04-01T20:26:11.547000 -CVE-2025-22278,0,0,cc8f354bce230092658929ccab2063a437175395281c0a62d02df7bef8385557,2025-03-27T16:45:12.210000 +CVE-2025-22277,0,1,61aa9117c2a7cc4aebdfc3c04648623285257489d25adb26a2923da1e4aee804,2025-04-01T20:26:11.547000 +CVE-2025-22278,0,1,339794c90b448a5d99f5a00f5aa09facff0a522f6c4fba2783cbf0e0fc752ea2,2025-03-27T16:45:12.210000 CVE-2025-22279,0,0,451caaf4e9d2850df252d6f570e3ef554097b40a6df04e1675d105de8bd6fd51,2025-04-11T15:39:52.920000 CVE-2025-2228,0,0,b8e082346d4d2d148e6a99881a0d1d5f06a659dc8972867638956a785b9cdf28,2025-03-27T16:45:27.850000 CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000 @@ -283911,11 +283911,11 @@ CVE-2025-22352,0,0,05ab364f7e7a1c5c049208b0f9460479a7ff74cb37dbb98d3f27efafd51be CVE-2025-22353,0,0,000f3439c34c0fd18a96f9bb39dd1b25c8059f2fcd0e1683a6551f664e444d87,2025-01-07T11:15:18.693000 CVE-2025-22354,0,0,66e404e55340b213b0c2657d1f6b7ed8a803e8838cb6bbee91b29999b4687ec1,2025-01-07T17:15:33.230000 CVE-2025-22355,0,0,ca39854898c1796213661f5ba88920b4dbe4062400b636abea87602baebf8bcc,2025-01-07T11:15:18.857000 -CVE-2025-22356,0,0,069c591eac6fee7b91c69caaedf961fb89250c802504dbc7a512017a895666fd,2025-03-28T18:11:40.180000 +CVE-2025-22356,0,1,952d8e387ab44649247f2e11ce0f85bc4cf6c2aa614d4eece9eb06300d64f3f4,2025-03-28T18:11:40.180000 CVE-2025-22357,0,0,8145dc70a7e6819f28516928dba6a6374a9f2bfc6bb0f15e92ae4f33b07e879f,2025-01-07T11:15:19.013000 CVE-2025-22358,0,0,58275121d439329ac6bcb88bfbc8948125788be2bee13fdbccdb8edd57659b00,2025-01-07T11:15:19.167000 CVE-2025-22359,0,0,995a1cace9e7721854dee56d9daa4b4cd821bc63cb750269e526e424750b384b,2025-01-07T11:15:19.310000 -CVE-2025-22360,0,0,723483e73147eb50d68308fb81082c4c52a3e9beeda1105671b3cfda33cec741,2025-03-28T18:11:40.180000 +CVE-2025-22360,0,1,f25f0448dc2e586aed86bf6bb195a5399e40b6b371cd3dabcdf389fc5ff68635,2025-03-28T18:11:40.180000 CVE-2025-22361,0,0,af12e2c6ebfec3624d0ee30cd638aa7b24fc59355579c0263e32fae5077df9f7,2025-01-09T16:16:26.830000 CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf16a,2025-01-07T11:15:19.453000 CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000 @@ -283925,7 +283925,7 @@ CVE-2025-22366,0,0,97374946d476a1e08535f722893bb8acd198d9f71f967181dcb7a41966417 CVE-2025-22367,0,0,f6b48e4e6414fa9f75650108ce2f805446a91f752f88d5798591a48240cb180f,2025-03-11T14:15:24.480000 CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9a6c,2025-03-11T14:15:24.627000 CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000 -CVE-2025-2237,0,0,5abe8aae0fc2ed4e21d30009a4a645b5354722e78a6daf854fe7aa80a45532a0,2025-04-01T20:26:11.547000 +CVE-2025-2237,0,1,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000 CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000 CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000 CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000 @@ -283941,7 +283941,7 @@ CVE-2025-2239,0,0,9d2e9828cc688e239d6efe000df62673f2e02977b1a02588fbeac8a08d0d24 CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6ad14,2025-01-06T17:15:48.170000 CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000 CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 -CVE-2025-22398,0,0,a8ac567fe8324093c2757603901a627e5da7df301e9b16b02364a5afdc0ef892,2025-03-28T18:11:40.180000 +CVE-2025-22398,0,1,d5808c469faeef2a1e50d4493a18a7c44c9f093692e902eb0df6d2e147a052a0,2025-03-28T18:11:40.180000 CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000 CVE-2025-2240,0,0,2a3ccc213981a0c7a04acca32ee567b557068e9dccba83e3d74fc058a2aa567d,2025-04-02T17:15:46.023000 CVE-2025-22402,0,0,6f8fff7283a94f5896b11ef84f302b0565ff570b2cada8e73fd3faea43645321,2025-03-04T16:24:09.313000 @@ -283958,12 +283958,12 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 CVE-2025-22457,0,0,06854130f0059ca72764b9c6e13d7893e783ab5e6f2271d978b176c2139c91f1,2025-04-08T13:39:05.933000 -CVE-2025-22458,0,0,0310bb26883ce6cc1997daa8ec16445a1609bbdc1d10a0c92a2372a274c3f1a6,2025-04-08T18:13:53.347000 -CVE-2025-22459,0,0,803574726908d4841242ef9bcef05a30c709737122eae86120068b4657594172,2025-04-08T18:13:53.347000 -CVE-2025-22461,0,0,ac0ff79d18799e9e861ca9d33bd2cf43e185144b76fac6be40f2df6cda5e30b7,2025-04-08T18:13:53.347000 -CVE-2025-22464,0,0,c7424f72b2f96418913aad9be4d15eb4eede55a90794f0ba18faa47df393f66c,2025-04-08T18:13:53.347000 -CVE-2025-22465,0,0,59af6a83f339492193c42e44605376f3bda5aed7d0edfb5b53dc78af273645e2,2025-04-08T18:13:53.347000 -CVE-2025-22466,0,0,022f7c654cc1d5121d6b3bf4597e41fb8ac9a9cb85997e032207daf34545cade,2025-04-08T18:13:53.347000 +CVE-2025-22458,0,1,3a29c4c6c44416f16d3e01186362659e7d6e8dec6de5080985c980824f38fdd1,2025-04-08T18:13:53.347000 +CVE-2025-22459,0,1,d2cd156973c823692aed54e075b5ca570aa0ec098c5149995e1fafea6c3c6a33,2025-04-08T18:13:53.347000 +CVE-2025-22461,0,1,662dce51e6ba44acf6060011388fadc6b56d9137472dbc6672373dcb76699789,2025-04-08T18:13:53.347000 +CVE-2025-22464,0,1,0aa2c443731a4296e6c6b5c445776670d75eb1da135b30ac8d1356982130b89e,2025-04-08T18:13:53.347000 +CVE-2025-22465,0,1,332c143ec0d16ecadbd80e14f2c982ad9709626649f73b861b723eccffcc38a1,2025-04-08T18:13:53.347000 +CVE-2025-22466,0,1,c5c990ff7bec20cb939e49fec2cf7fca34ae49e526db80860160be29dbc7355a,2025-04-08T18:13:53.347000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22471,0,0,4ec1d2587ea1a9c0adc8ac663c3f7ded32bed3d4477075047035b330b85f2bda,2025-04-11T15:40:10.277000 CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000 @@ -283976,13 +283976,13 @@ CVE-2025-22491,0,0,ad85f2f60683d1b1d15d527fe2b105a5594d84c0da0f697daa4684f44b948 CVE-2025-22492,0,0,6675658809687c830ee351f78ca107f7df64e972ba8ef72f245dee116e840551,2025-02-28T09:15:12.680000 CVE-2025-22493,0,0,d929c5d6113570551417420f2e90fa0b9e868f3eee937ae9b18c8bf109c1b5b2,2025-03-05T09:15:10.443000 CVE-2025-22495,0,0,8392620cb3f5289df4103c4151ecb349dfb461cd09122f2d139b36566f51370b,2025-02-24T17:15:13.723000 -CVE-2025-22496,0,0,133ab2126ae0ff8d85b311ec1cdacd1606f5f94b1a8a46108beec712d8de1ea0,2025-03-27T16:45:12.210000 -CVE-2025-22497,0,0,92c16d50f083d64fc736fded284c2d1014c174aaa0e73fd4703a073bc71736b2,2025-03-27T16:45:12.210000 +CVE-2025-22496,0,1,2b4cf0b3fdb63412d18a83b0c2a66cb3e20ae4936674e398a14dee5df68d38c8,2025-03-27T16:45:12.210000 +CVE-2025-22497,0,1,8c41f3895e5868e4f6304c2226991018c70f04367f1d2d4be5663003326f502a,2025-03-27T16:45:12.210000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-2250,0,0,6a0e04abb2adbc03bbe00299adb0beb9b8293cf33361973132e7a4e0a309006c,2025-03-13T04:15:23.137000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 -CVE-2025-22501,0,0,53494a480d4daa32346e51f3878b69147dec22f036ff70dc54ebfb8d8882cd10,2025-03-28T18:11:40.180000 +CVE-2025-22501,0,1,aa6e3e792584a3b91a174d3b6f36c54d1fb1c04908975d240ac95a7d9dba9f21,2025-03-28T18:11:40.180000 CVE-2025-22502,0,0,3183867d6d0bb4304290089bf31cd36b52e2a0152aa74b8aad25d0ed6a2a48d9,2025-01-07T16:15:45.717000 CVE-2025-22503,0,0,2312eda7beecfe6ecfb9249f8a971c65cfe30e58668d20a90b2c6b9852f7f977,2025-01-07T16:15:45.877000 CVE-2025-22504,0,0,a9139c7e10a4bdae0f6c289db8b58ce819e8b48dfb9a72eac5250d51a0c5e3e4,2025-01-09T16:16:27.110000 @@ -283990,7 +283990,7 @@ CVE-2025-22505,0,0,c16051b04eb145418bded72ca77be037cf9fee37f07ce6a67c59037e48b9c CVE-2025-22506,0,0,dd4f7e8cd5bba1f92d667c12097d46cfeb46c7441fe76fb524ad95b719119656,2025-01-13T14:15:11.127000 CVE-2025-22507,0,0,c94c1401c11ff9cd6e4f5b9836ac27c2be70ec71a54af6e374399078e6643932,2025-01-07T16:15:46.040000 CVE-2025-22508,0,0,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20397,2025-01-09T16:16:27.433000 -CVE-2025-2251,0,0,e3b2c76b507cf884cb11c0c17468c497bd457287baef176c9eec7e7bc84e78ae,2025-04-07T14:17:50.220000 +CVE-2025-2251,0,1,ac22ef3ec940f9a360341d24578091320a87b879e6a04182bdced2ddc225b766,2025-04-07T14:17:50.220000 CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 @@ -284005,10 +284005,10 @@ CVE-2025-2252,0,0,8225b36f95860f767886fbbd52c7dc832516be319652facf235d70dcb25749 CVE-2025-22520,0,0,d90fcded13c83210ff25a704cf2d7700ad6fc2bbd95729d89ec73c52d86588de,2025-01-07T16:15:47.310000 CVE-2025-22521,0,0,e62fb335e410addf0641d689eefeeec9d9054d8a13b83f38fee365914160d44b,2025-01-09T16:16:27.743000 CVE-2025-22522,0,0,1ebc82346c4e34dee12844f6aa464ab0e7c0d220eb4925eee3392344e450fdee,2025-01-07T16:15:47.513000 -CVE-2025-22523,0,0,325e1421a26cb831069ebe01ee0137d009a3ca0cbbb394f1c7919a087b850043,2025-03-28T18:11:40.180000 +CVE-2025-22523,0,1,56d5c0829ae59f4fc585c3578199f3561808985206219f284850ce0d71c36992,2025-03-28T18:11:40.180000 CVE-2025-22524,0,0,8a23e2aa149aafa1995794612c63a3f12fada023081e14e67818a48edc5f07e4,2025-01-07T16:15:47.680000 CVE-2025-22525,0,0,2450e2a7890b860ebbedbee23a3778e19f1af2d502cf8e6fca48c14a5e43a264,2025-01-07T16:15:47.830000 -CVE-2025-22526,0,0,c58a09435ca203fd4fa2f775332e81103f8ed45e6f90ec84e0469541c14e01ad,2025-03-28T18:11:40.180000 +CVE-2025-22526,0,1,489fe2c1f10261dbf99116e7048b1f34de7b0f8ce66195da3ffc3c8ea7ab733c,2025-03-28T18:11:40.180000 CVE-2025-22527,0,0,dddb72d486920faec7518243d87904d14ce0784eb212bedd940fa2ffaca5856a,2025-01-09T16:16:27.890000 CVE-2025-22528,0,0,587c2eb86a91198b816a3b392027083dc7733d721ed5f73afa2d78180d1fdaca,2025-01-07T16:15:47.987000 CVE-2025-22529,0,0,f078564d1a2cecc5128f9b5ad9b171bcf776a688face6093deb4549ab61309fe,2025-01-07T16:15:48.180000 @@ -284048,7 +284048,7 @@ CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5 CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000 CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000 CVE-2025-22564,0,0,c6bcdc2f84aa39c7ba65ae760aaf069d1367d782297729876d0295b371334f83,2025-01-31T09:15:07.627000 -CVE-2025-22566,0,0,2de3b8baf4a5b5547d0884f92ee8b474a756ae12ffd24e7913d7b549919571c3,2025-03-28T18:11:40.180000 +CVE-2025-22566,0,1,1ee3261a54270cb3b8d151a749d1a0de637d9169a00783bcb470b242f42071e2,2025-03-28T18:11:40.180000 CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000 CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000 CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000 @@ -284058,7 +284058,7 @@ CVE-2025-22571,0,0,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508 CVE-2025-22572,0,0,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000 CVE-2025-22573,0,0,cef0a0fee2a846fdd99777eab6d59d8922d33c31d91c1289eff639dfb1ced15d,2025-01-07T16:15:53.520000 CVE-2025-22574,0,0,84e101e6655207515e3d308aae10328b324f66020c49c27e6a9a740f08e66749,2025-01-07T16:15:53.667000 -CVE-2025-22575,0,0,8bb2d7f373bd62d1d3b68166c96c6f139aacf475907496866c1549cb0988bbe3,2025-03-28T18:11:40.180000 +CVE-2025-22575,0,1,ee20bf07b3710efbf402d6fcb04569d2ea57e135683c9e5eb2441c1cbc9ffaf5,2025-03-28T18:11:40.180000 CVE-2025-22576,0,0,d91ec1220267346d1a0f0443983782bbf181c797facca8f491a7bfecb878d90d,2025-01-13T14:15:12.117000 CVE-2025-22577,0,0,de49ca44634bd4c2dcd4ed4b2c861f3aeca16b15d3e20dc646883514b316145b,2025-01-07T16:15:53.823000 CVE-2025-22578,0,0,a663c0074d74b9b4b7e504663f4236ea23bd746235c7a6cf544a9a518e4833f7,2025-01-07T16:15:53.970000 @@ -284112,53 +284112,53 @@ CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff CVE-2025-22622,0,0,0a67f003bf728be4e0886c35c47488ba14ce354a6aa44e3a32da5ad98803d9bf,2025-02-19T04:15:10.550000 CVE-2025-22623,0,0,2eab4069e416a99891fc5b58b6540d9e02ab5cb0f46569d47f20592dc70176ca,2025-03-06T05:15:21.790000 CVE-2025-22624,0,0,3150de4f7a54951c23cb3cffadbaece2b77c163f8f3e2c796c2351f5c75a26cc,2025-02-27T19:15:50.940000 -CVE-2025-22628,0,0,e2cf685d7082bcfa30e646833b85d5c599a41f21801e83d684dbafd231ca1975,2025-03-27T16:45:12.210000 -CVE-2025-22629,0,0,bf1097ca55cf433f5897b1cdb9a2a31c102a885e7399c9e00ac0dcf865ef7694,2025-03-27T16:45:12.210000 +CVE-2025-22628,0,1,d62cb8c50d9c11b0b278673f824284dc0fae587878b5ba4199ee68598cf8cba3,2025-03-27T16:45:12.210000 +CVE-2025-22629,0,1,cf5f568fd34ead1bfea3a4a721d51d94d54d98711c69ac6b2e5e3dec2039db3e,2025-03-27T16:45:12.210000 CVE-2025-2263,0,0,c76dd53fa881d845b866a284dff440d13bd235921f9fd6d6341359a12b4ca1ef,2025-04-03T18:20:38.627000 CVE-2025-22630,0,0,593d04dbe4592bbbd0e67cbe1d1c9339c2fd794f2c49ac1ded1166dba2e072b6,2025-02-14T07:15:32.750000 CVE-2025-22631,0,0,698f5af7c231ca612ef49b5c9557ed0a6275cc603aec3b288e67c713c264419b,2025-02-23T23:15:10.290000 CVE-2025-22632,0,0,a00ccfb79a24fc13a5dc854108dab7b330a127a143f3348ecdc06f096bf01241,2025-02-23T23:15:10.440000 CVE-2025-22633,0,0,02df1f9c4167b5004d9e46deb61bcc6f164b0d8af25621032bfff352c06f6449,2025-02-23T23:15:10.573000 -CVE-2025-22634,0,0,dbc545dec3060cf8a2823b3040a22d815aac7a53c2128d3316fbee078f0b6098,2025-03-27T16:45:12.210000 +CVE-2025-22634,0,1,b03277bebcdc7f5286619f4e6ff60ea64ce0d2eaabaacad77766dce67b417bc8,2025-03-27T16:45:12.210000 CVE-2025-22635,0,0,09e419c8f16726a5ee91c4fc6dc7331c581a4170004efdf2c30917789f693c93,2025-02-23T23:15:10.720000 -CVE-2025-22637,0,0,e71e9ddb1ab2e3833fe3cec46aa63c757d77918ce0e126096555be6d73274b93,2025-03-27T16:45:12.210000 -CVE-2025-22638,0,0,3af5f0771e553e7215453cb3d2f245edf57b377e9824ac7823fdd7a142b50674,2025-03-27T16:45:12.210000 +CVE-2025-22637,0,1,6a9cff62b9581e23d01b6405fb8b76f6c4b4d3585406e82a25ce549de6d228e0,2025-03-27T16:45:12.210000 +CVE-2025-22638,0,1,c8f27dd00b7ba55c8743424014743e114bb69ee621dd7d69f2c27b705bc53bbc,2025-03-27T16:45:12.210000 CVE-2025-22639,0,0,be7302f0496784c815dda454f246bcda7231f0fd624159bb2f829ea5a8a5cc86,2025-02-18T20:15:26.010000 CVE-2025-2264,0,0,32e3dc3a857e0aab5079b9d48ba3e4dc6b7e1c1ed89b0a7df3bb921e6bfd15b5,2025-04-03T18:19:34.337000 -CVE-2025-22640,0,0,b360c1c8bccad37a99daa928901426d870df4c3d723819386b5b55b4ad948053,2025-03-27T16:45:12.210000 +CVE-2025-22640,0,1,2a773564f99db98e59d375c542ad30b06d0e6afd8ca7f648dc88a90e85fab9da,2025-03-27T16:45:12.210000 CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000 CVE-2025-22642,0,0,11c66884fcc0c5b60dea8fd453f90eae4e8d1cdd88bcbd39e4c0551736d3dc74,2025-02-18T19:15:25.350000 CVE-2025-22643,0,0,65c625211e7e886c19d6b17e08b20683447546e65838c862a04bf47449cfe4ca,2025-02-18T19:15:25.483000 -CVE-2025-22644,0,0,7b2e18c3dec9b0a89a868e523d5f6f07af7fb79577ee27fa94e882bfa41b92db,2025-03-27T16:45:12.210000 +CVE-2025-22644,0,1,090519edb78d6e55072c636fb094ad44d625063cec02ba4a1bd40a561307519b,2025-03-27T16:45:12.210000 CVE-2025-22645,0,0,c312dc34f366f4571a148024c74e9b73438a7663d415a1f47c1379d406326ae6,2025-02-18T20:15:26.570000 -CVE-2025-22646,0,0,551cccf00bdb8ef8bbeb66219ddee28489ca20c036da05a821178fe970d61a0d,2025-03-27T16:45:12.210000 -CVE-2025-22647,0,0,1ca295b5289e07b7f5a45983cf542b38e30dd1c1973386c04946a97016bb90c4,2025-03-27T16:45:12.210000 -CVE-2025-22648,0,0,561d3775f1112704e3b0614af639a786bce9e2db74e31b5da9726856b25934a7,2025-03-27T16:45:12.210000 +CVE-2025-22646,0,1,af83652986c742ce748653207eff3bbc2a0cdad1c7dbe38c2707a352b3755ecc,2025-03-27T16:45:12.210000 +CVE-2025-22647,0,1,ee5265955fcabc77205c9d4812b84ebfba6fafd3ed06bb0367d64486eae3cdbf,2025-03-27T16:45:12.210000 +CVE-2025-22648,0,1,55738e627b4f9c06dda2d2ebadc9d38e4826e76f1492f66a5be9f04deb54a102,2025-03-27T16:45:12.210000 CVE-2025-22649,0,0,4f6afdd07a29f280d9ca9b47c589e62a29bb960468d641471f5297ee4f2b67d6,2025-04-10T15:17:19.167000 CVE-2025-2265,0,0,c4fe07c25b6ee7493f2087c46370c497d720b57d923cc3d537d197899fc734c6,2025-03-13T17:15:38.967000 CVE-2025-22650,0,0,6fea642700a750486c5548c0e02b82ceeb34b715192d7f1e0337ba66322d17a1,2025-02-18T20:15:26.720000 -CVE-2025-22652,0,0,26f281d70558ad411dee52672f90d67a40a6f827d2aa04b43b9f9a910de12733,2025-03-27T16:45:12.210000 +CVE-2025-22652,0,1,eefe232f3e397501caa11bafe0521cc0388fdb49008519e36f19bc4ef50181a0,2025-03-27T16:45:12.210000 CVE-2025-22653,0,0,9c567e055653dafad6942fd8b868f59c075bd7f242efd581fde5462b3a64169a,2025-02-18T19:15:25.627000 CVE-2025-22654,0,0,619689232e1f1160eee83e01e9214201ad5c0f239f29990515b2bea94e59408e,2025-02-18T20:15:26.877000 CVE-2025-22656,0,0,ad37e68103bde51d08c5db387780e1b721fcccf1a0761aa29f30889aabd90e9b,2025-02-18T20:15:27.037000 CVE-2025-22657,0,0,df4be7d8b190b0d420249b9a05b34c5cbc047e57208d54d7b91afd066e81706c,2025-02-18T20:15:27.190000 -CVE-2025-22658,0,0,81b082487d833f995281574aa74945ddd7b59b82829595ed44e73271827ca0b9,2025-03-27T16:45:12.210000 -CVE-2025-22659,0,0,2c88e51a64d794f947458634f9ae5c92071e17956c2c473b9dca4107b78d3d54,2025-03-27T16:45:12.210000 +CVE-2025-22658,0,1,9dfb3a54bee9230fd14a9a19f7d7d5326e8f45c7bc64398130b3eac9128245b1,2025-03-27T16:45:12.210000 +CVE-2025-22659,0,1,5ddbe6ce3aa9d4c3f7a2f0c0c6e008ee25bd96e1d9c23f205287bd9dbebfc372,2025-03-27T16:45:12.210000 CVE-2025-2266,0,0,74192156a60a81f3d28ceb45808dd6d5a6db00b763ad96fae77f447613db9547,2025-04-01T20:26:30.593000 -CVE-2025-22660,0,0,0c1d9236dfc13f03336566c80c75d5ecd8069f6cd5c5e88ba6bf4e624eebfe4e,2025-03-27T16:45:12.210000 +CVE-2025-22660,0,1,24e205bb3567c198cd88fd813d729099459a10db23d39998d8a2345c61726c7c,2025-03-27T16:45:12.210000 CVE-2025-22661,0,0,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a81e,2025-01-21T18:15:15.707000 CVE-2025-22662,0,0,962ab222d5a96ff811aa7aa96d0d9f516c663f85299dc1f3c1080c9811010ad9,2025-02-18T19:15:25.753000 CVE-2025-22663,0,0,1613aa583a23b982f2905c79aa7dfe29b73a11cccfd0ebc15923bf3c61bfea52,2025-02-18T20:15:27.343000 -CVE-2025-22664,0,0,f7d6e496e62415f46b76c8ef55e71f4304d572ade17c6569a88c324811b52af0,2025-02-18T19:15:25.890000 -CVE-2025-22665,0,0,ee04fd003d3737181aa71ed8aee1455af1ed540c5946074dd04fa358f3424b81,2025-03-27T16:45:12.210000 -CVE-2025-22667,0,0,2ab317bfb9739f9ac69abaab5066562f28e15bdd464ff7c31f6ed096782914f7,2025-03-27T16:45:12.210000 -CVE-2025-22668,0,0,d1a30578a3813e474f66c5bc21c20232c78286e745c9ce23f3a63f59b8708ff3,2025-03-27T16:45:12.210000 -CVE-2025-22669,0,0,e5fbf912bc05fa45475aad2c168ae954ab63ba0abbd5bea8bdde2e4ebd40e813,2025-03-27T16:45:12.210000 +CVE-2025-22664,0,1,6f7f5e9159d22dbd6d5059178363bf38c34b6c093eb1b2624ab03339af9afa1d,2025-02-18T19:15:25.890000 +CVE-2025-22665,0,1,e3993afaaa9c8eb161d91bffad06b5d257351acf4de62ac173d068844f373605,2025-03-27T16:45:12.210000 +CVE-2025-22667,0,1,eb326889445506e1b14be13ccd71851e637afdeb628cfad2654c968ddf2aa49e,2025-03-27T16:45:12.210000 +CVE-2025-22668,0,1,537f3df19f4fa3cd90946cbf426a6bea45f03f1838f5367bed723e4a115871ce,2025-03-27T16:45:12.210000 +CVE-2025-22669,0,1,1cabcd179c4feb9bdb036942af9b2100cedaa660ae41846aa764916a98d2c655,2025-03-27T16:45:12.210000 CVE-2025-2267,0,0,0c210bb94de91f1a5c946acfcd05444c3820c09c735514c8cda79d04010d61ad,2025-03-28T15:41:57.253000 -CVE-2025-22670,0,0,f7d120be15ec687637a24f4cfe34ca174d878f05cc9709f53bbf32189a117b75,2025-03-27T16:45:12.210000 -CVE-2025-22671,0,0,7049746c0103b49a53468496e534a8831850ccdfee2f43af04ce208028c9bf54,2025-03-27T16:45:12.210000 -CVE-2025-22672,0,0,d6fe52a7a95257cebb58cc9fe6e43dddd5412620585ce73657df41a91a7113a6,2025-03-27T16:45:12.210000 -CVE-2025-22673,0,0,c9b71987caa7a099f84fedd6895c8bc146f6be332a3047128013d6b34a0a3c99,2025-03-27T16:45:12.210000 +CVE-2025-22670,0,1,bb5ce15cb0533ac7c2009ea131f1d531246cd4160867846222d39777c04c246a,2025-03-27T16:45:12.210000 +CVE-2025-22671,0,1,b274bc026bc32bf2baa28a435bfbe89d62cad60020ad7c1c25d5d6294fa7bb4c,2025-03-27T16:45:12.210000 +CVE-2025-22672,0,1,74a1836c9799328ca3afe5dbed91062ed46f451ca1fcbd4062fd8427060836b5,2025-03-27T16:45:12.210000 +CVE-2025-22673,0,1,c8532808d7961bf12937d2206394e41cab47386d46a2797fece3a08c0a8e9001,2025-03-27T16:45:12.210000 CVE-2025-22674,0,0,4c62711247e33f87026272b579a8a4aeb1faa8374abc3fdf8f1eb2eaf5535454,2025-02-18T19:15:26.027000 CVE-2025-22675,0,0,976876d8bada85ddb7f9b01306108b5dc8490f124ee847cc17386ccf664141b7,2025-02-18T19:15:26.160000 CVE-2025-22676,0,0,f4c77d445e330cc96300170b283a943375cafd2a56102f55d30d95490870d22d,2025-02-16T23:15:10.037000 @@ -284177,7 +284177,7 @@ CVE-2025-22689,0,0,a6bb71e4967076b3f540b3610fafcb785c5a34d17d73ce5496d44ac029c93 CVE-2025-2269,0,0,f373adaf00ddea07a12f2136ace0ef577bf62edc98c622985b70788cda9452a1,2025-04-12T00:15:18.367000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 -CVE-2025-22693,0,0,c893eff5f2226b03055b6c9c68aaf4bf3303cc144b5968af874a6d7eb6cb2993,2025-02-03T15:15:19.467000 +CVE-2025-22693,0,1,81ce882c724d69ac9b39413a41a994306e4d20fcfa5be762064aa23c22d028bc,2025-02-03T15:15:19.467000 CVE-2025-22694,0,0,96b1bc67077d6724bed157ad909e382f421512dbde661698a81e8882d1d6a676,2025-02-03T15:15:19.597000 CVE-2025-22695,0,0,0a8a71d8bc1a4d3051f4475b36e68c6610b345ec6ee024bc91b765df5cb592ec,2025-02-03T15:15:19.770000 CVE-2025-22696,0,0,a78ad16e71ffcef32da6e8beedb19b7429b4548fb7904e608e5ab76d1d2bd28c,2025-02-04T15:15:21.643000 @@ -284217,8 +284217,8 @@ CVE-2025-22735,0,0,de6a6f26a15403b2f22d28132a742d5d30dbb5d122c903ecf659b867065c2 CVE-2025-22736,0,0,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000 CVE-2025-22737,0,0,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000 CVE-2025-22738,0,0,5df876143cd2e8f6f1b456f1a5d948e1f71ead69b99197fd86f9725871713218,2025-03-03T18:36:26.930000 -CVE-2025-22739,0,0,fbcbe117d5eecd1ae040bc3fa4e34598c82e8643bc37ce75d5a130929f702b2b,2025-03-28T18:11:40.180000 -CVE-2025-22740,0,0,2a68701a149cd8539facad489470d05efbb524f7770d44bdabe805fe017995e7,2025-03-28T18:11:40.180000 +CVE-2025-22739,0,1,091cfc4a76b54169600524be3ffeaf8f96cf495503e0c0f88f2064a2a1698d5b,2025-03-28T18:11:40.180000 +CVE-2025-22740,0,1,b5f2ec11a8a6b18f0cfd3aba72b63c509d139e601c66b5e11cd1ec0dab7b9a0a,2025-03-28T18:11:40.180000 CVE-2025-22742,0,0,11a4a56fc317da9c8dfee788933cef43a2971f0d29d36632165000485ef746b0,2025-01-15T16:15:36.350000 CVE-2025-22743,0,0,76f32fc2f88d28b097346bb603b63ac7aee93ae537a00506ea3d57cf32b7feb9,2025-01-15T16:15:36.503000 CVE-2025-22744,0,0,9c4303b28715077c0dbe485fb40535cf186962e58a22a39419bcf9fb85bca699,2025-01-15T16:15:36.657000 @@ -284245,11 +284245,11 @@ CVE-2025-22763,0,0,947af1deb8d9cae5ca079e909cf29879fdb4e7f4a385aecbc64b3952727ab CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000 CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000 CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 -CVE-2025-22767,0,0,539be79a2a74a34b58778ab82917bf182fcfd3bdc45dc9363e483c6e140854f3,2025-03-28T18:11:40.180000 +CVE-2025-22767,0,1,37001d0f50afce6fa8dd780bb273ddcb88dcd7b8fdadc4330e7fd1a5778f4f4c,2025-03-28T18:11:40.180000 CVE-2025-22768,0,0,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199e1e,2025-01-23T16:15:37.403000 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 CVE-2025-2277,0,0,a8bc5cd0b16e309d43e095ac49658b66e2986d9cb52a0ffd2f162d5b8eec71aa,2025-03-28T16:22:58.023000 -CVE-2025-22770,0,0,6c0a61f5d2c09a807a23423a9bcfcaaafa14efb25e8cd93f2594fef192e51f9d,2025-03-27T16:45:12.210000 +CVE-2025-22770,0,1,9a151362435bd9d8c4bbd128307ca9249a359d573f4c6c9322ea798c07df98b4,2025-03-27T16:45:12.210000 CVE-2025-22772,0,0,a49a7641398a6c78abf7bdcb1538e84ecbf25664c0b69cb2fc2516de3178101d,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 CVE-2025-22775,0,0,7d2a06197d6a9d775e8fbcfc5379bbce7f2f443442e1d2178247e5bcb0b27213,2025-03-13T15:15:52.570000 @@ -284291,7 +284291,7 @@ CVE-2025-22812,0,0,7eb3929399cc1fbb26f1acb4a6b3defb11b6a681947f65ece8ba3a4769554 CVE-2025-22813,0,0,0949c9095843318912b500add4a3ad813cad20561750d29229375728994d8694,2025-01-09T16:16:31.200000 CVE-2025-22814,0,0,7dcd068dd774394c72f5e46658445be9e10072ed44490ac7c32e7b13630b83b3,2025-01-09T16:16:31.370000 CVE-2025-22815,0,0,427a47ccf7bab8f3a211fbc605d291cf16b3dae87022e7a139ad2415f6a23a2d,2025-02-25T16:55:23.470000 -CVE-2025-22816,0,0,8fc015c2f3864e880dfb7a4d869b63979d8ad1816246144e82cb9d50bad4111c,2025-03-27T16:45:12.210000 +CVE-2025-22816,0,1,245a6d061ed19c0112ba6c7bca68d7984e224c02c61ec3b1a06a9241e4c8ef2b,2025-03-27T16:45:12.210000 CVE-2025-22817,0,0,954c74c28c9ae42ccc9c3d99fac64ba05760f79804930893f4d8010e8621b083,2025-01-09T16:16:31.693000 CVE-2025-22818,0,0,df699b9ee8f7ac13eddd7a376e3176900d794c4cb9e61c7068ce95105f69c9ee,2025-01-09T16:16:31.850000 CVE-2025-22819,0,0,69c84d2b50a6b5a6c8f29ca3dda1d44a7a2b2e01b78e86c194b0307af2945f38,2025-01-09T16:16:32 @@ -284311,19 +284311,19 @@ CVE-2025-22841,0,0,c5bade831fbfcc0c448601d2e5123f6502d61bdcc4812c545d0acde86b73c CVE-2025-22842,0,0,faf6c920f460eaed5c71db376945195f25e95dd8f0b0b07a1be494ceccdfcf06,2025-04-07T14:17:50.220000 CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31 CVE-2025-22847,0,0,0de483179c1066e1dcd28554acee3e5fb1b273a7c68d4f167ad861a991a595e2,2025-03-04T17:39:25.643000 -CVE-2025-2285,0,0,768ed68f8cadb2e51078e6ab7f79b482b9ae7bc30f5270c8c1c9755b70039b38,2025-04-08T18:13:53.347000 +CVE-2025-2285,0,1,98fc658609c4f69aaee78398e9e81043e36556f176ddcb77fdb67c9af81d073b,2025-04-08T18:13:53.347000 CVE-2025-22851,0,0,f2a6332c8e5e9b9a1e6161891c357461c7bb64ff86725b50b37556c69f8a4a26,2025-04-07T14:17:50.220000 -CVE-2025-22855,0,0,021f0ce6d559865f012508631f4f18936a8d85a2fdb38f591b71f892a9db3993,2025-04-08T18:13:53.347000 -CVE-2025-2286,0,0,69a44ca827bc7f60812131429c3957cf729fb23695b27d3954f6a4d9a0c18cbe,2025-04-08T18:13:53.347000 +CVE-2025-22855,0,1,0ea644d507eefb1364e7f8ce7a6f7b59da91a785412c2309fc15d80da09b4a79,2025-04-08T18:13:53.347000 +CVE-2025-2286,0,1,a29011b43d479279660c1eaaab71fd21b21b30735d3755825b9279066e08e188,2025-04-08T18:13:53.347000 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 -CVE-2025-22868,0,0,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387aa98,2025-02-26T15:15:24.993000 +CVE-2025-22868,0,1,62e5cc790705ff43a96912efe031bc8048b68c63111113cd225e255aecffe6c0,2025-02-26T15:15:24.993000 CVE-2025-22869,0,0,79719125726880f26bc2b13b7ff722f5a8e85ca88bf5332b957a80e592d67370,2025-04-11T22:15:29.837000 -CVE-2025-2287,0,0,867479dfcedb4cce723b7a24882e9d97da2870c741258a3b4042096664ac6f25,2025-04-08T18:13:53.347000 +CVE-2025-2287,0,1,8813dfc8049edc90f8c2884aee49dcafb730530912f5261432ad51214abb5088,2025-04-08T18:13:53.347000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 CVE-2025-22871,0,0,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000 -CVE-2025-2288,0,0,6d20448db5009c36c81fa010c5ec138daa8d6c739d9191b9c8bfd5b250732f41,2025-04-08T18:13:53.347000 +CVE-2025-2288,0,1,ea5cf9eb4e5e7d5beb8e92f7104073ba5d1adc8fc07f8a97145fc23482c0367a,2025-04-08T18:13:53.347000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 CVE-2025-22888,0,0,8715446d28ee196d4b5c9f7b0ea6743f100a7fae140bfca4a55cb2369c02c83f,2025-02-19T06:15:21.687000 @@ -284344,7 +284344,7 @@ CVE-2025-22916,0,0,48ec3f4c4e4ef1a7215c355c8bb61db6b7ae3ede07a20bf011c26b3a968bb CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000 CVE-2025-22919,0,0,329e8b26e961cfd3a5f94c152403744377d574dcba7ab4dca039db01cbe65e83,2025-02-19T22:15:23.623000 -CVE-2025-2292,0,0,1b372458d1e6cd89c4a85110be758c5a57d23ddd2c4165cfc8358faab1285659,2025-04-01T20:26:22.890000 +CVE-2025-2292,0,1,3d13f557984e1fd13609173dae188a25e6235199cc3f1241f6c70794549df207,2025-04-01T20:26:22.890000 CVE-2025-22920,0,0,90e7ff21ce793067aa456b5ccb84cf38ff13a7ab9f13a9d4f7138f20eaa66180,2025-02-19T22:15:23.810000 CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b9762015c,2025-02-19T15:15:17.497000 CVE-2025-22923,0,0,db710676251db580c239a793c17d5d355adc03a613e49a945a86438fe3f120e3,2025-04-07T14:18:49.830000 @@ -284354,21 +284354,21 @@ CVE-2025-22926,0,0,1f627a01756f2bc8a6664d4218976f29e818bf46f873425063c7df4d2fabd CVE-2025-22927,0,0,88bf50b75a659bbab243a76f03ae8c557d1d6e8ca7f2e974e1743b02183cb5d8,2025-04-07T14:18:34.453000 CVE-2025-22928,0,0,4c964912abb95b29dbe026003f54c71c7874669cb5c0ddbb2b51bc75c13be164,2025-04-07T14:18:34.453000 CVE-2025-22929,0,0,1452b8a2fff94532d0fed1efabb09a58f398245a55704e8724aa3e5034629857,2025-04-07T14:18:34.453000 -CVE-2025-2293,0,0,a7982a60f7b24b088bf712ff356ab40f3b97c7c780342c39e2025736db7a73a1,2025-04-08T18:13:53.347000 +CVE-2025-2293,0,1,13f4d370f6d102d5ea10cfc1ff5e16c08ac308f70d6c6e0827ad4ce3947e07bb,2025-04-08T18:13:53.347000 CVE-2025-22930,0,0,9f037cce0cbbdbb57ebcef79426c72c5c553146b35be0ba75c142417aafe25fa,2025-04-07T14:18:34.453000 CVE-2025-22931,0,0,7040cbf9d7877251b12ddaa03bb535fb63f9768d1a2571d19941499e73bb1b90,2025-04-07T14:18:34.453000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 -CVE-2025-22937,0,0,a1f68aff808d4cd1fe386fa0863a8d4ad13e3d819b5c4fd08d5e98d043f82ae7,2025-04-01T20:26:30.593000 -CVE-2025-22938,0,0,959260441b4c98f3ac8c8ebe3ba026cec0c40beb0b460ca2b1e2ebfb41bb7f40,2025-04-01T20:26:22.890000 -CVE-2025-22939,0,0,a661d5997aed32171526427581fa69af511646df1bbe29227ac084c593f6a62f,2025-04-01T20:26:22.890000 -CVE-2025-2294,0,0,1a5e48440eae90fb3ffb2ab4246fa9a7f3a3bd6b2c08714613b5622012818910,2025-03-28T18:11:40.180000 -CVE-2025-22940,0,0,4adec11a6d9ff0deea27c11a540b6675dc6d4766a97798669a96a7a71d36b799,2025-04-01T20:26:22.890000 -CVE-2025-22941,0,0,b0b33902ea046bb449e13dd1563ba4eb515bff20aa45453dfdf5732bed432414,2025-04-01T20:26:22.890000 +CVE-2025-22937,0,1,f00870f4d203419cdb8a8e3de1c22c7cf9a24252b600302e8d300037c02ec333,2025-04-01T20:26:30.593000 +CVE-2025-22938,0,1,e6807abe137e5b2b47b5ff4158bb661bb62a642f14207093ac8ab436303894a4,2025-04-01T20:26:22.890000 +CVE-2025-22939,0,1,43a5e4d533191c33465b6a6dc86028a3cc6c289175d0a528570933147420cd2c,2025-04-01T20:26:22.890000 +CVE-2025-2294,0,1,1a05467c41eb5981388eaf0b9197f5e7cd9d05937d25f388597e1f34f296e807,2025-03-28T18:11:40.180000 +CVE-2025-22940,0,1,d97dc2eae3e26fb6624010719f59be6d0b5ca1761f6c260f5028360d669673d5,2025-04-01T20:26:22.890000 +CVE-2025-22941,0,1,5c314b5cce5a97ff5f95a7de2c69a40ec47fb2a9f0d215e48b7dc301ebe60431,2025-04-01T20:26:22.890000 CVE-2025-22946,0,0,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0dd8,2025-04-09T18:35:44.810000 CVE-2025-22949,0,0,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000 CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000 CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 -CVE-2025-22953,0,0,317cc89665d625a02de49f69517260774d4234589f6e5e532d3b007319aea76c,2025-04-01T20:26:30.593000 +CVE-2025-22953,0,1,7e179857458e1d5cc9dea7dc6fb4173fbe957e9a1cadf5f38fc621fb09d0a1b3,2025-04-01T20:26:30.593000 CVE-2025-22954,0,0,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000 CVE-2025-22957,0,0,78c986249320701d31e3769659f247864a435f5c1d673688267deb95bbf3701f,2025-03-20T16:15:16.223000 CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000 @@ -284412,7 +284412,7 @@ CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6 CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 CVE-2025-23027,0,0,3d8a20e7f66f71ebfff4348388587603a6ab48265ca2628da8f07052fa639ed0,2025-01-13T20:15:30.150000 CVE-2025-23028,0,0,b461d5999923f45733c7f4820d2f26b84d08a8cb2fd763af1576f937329307c2,2025-02-18T20:15:27.667000 -CVE-2025-2303,0,0,eb5e83b74d9e6289540a725978256b8c1f14d7263aee91cface4100fa912eca4,2025-03-22T07:15:24.613000 +CVE-2025-2303,0,1,b33a972b54e449694265340555551ba618e00de627e07e7af910c337ea037db9,2025-03-22T07:15:24.613000 CVE-2025-23030,0,0,224bc8d8995dc88d3c86d6114ca525c5229fca92a135db301a6a8f22ff778542,2025-02-13T19:43:16.880000 CVE-2025-23031,0,0,bbc814544f9f7ab453b85a0b99362feb620cb118933ff9c4d1451952d2b87ecd,2025-02-13T19:42:27.367000 CVE-2025-23032,0,0,585588cf58c1e2f9e94311fe0b553a8b2ca72bc0f7df37151cf52ab6013e311f,2025-02-13T19:42:11.293000 @@ -284427,14 +284427,14 @@ CVE-2025-2304,0,0,cb35b88004cf4aaf5937037b5e2a3756c0a2b054bfcddb467003fce9cf7631 CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8c5d,2025-01-15T18:15:24.797000 CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000 CVE-2025-23042,0,0,afc715b4dd34097c6adef37f4433f6aa2747936efa0df044baa0bbe2e7f26ee0,2025-01-14T19:15:44.863000 -CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000 +CVE-2025-23044,0,1,0990c6a6490b0db35b8cce26f38ee3a773d65d97dc0e58518e462347b92b4eba,2025-01-20T16:15:28.170000 CVE-2025-23045,0,0,1ad1030c132b3e45e8d0c7dfd470fa757b9ecfb67ba9139471ee005cd2d02221,2025-01-28T16:15:40.690000 CVE-2025-23046,0,0,0be4f0c5ceefb1d9073dac1c876d534b112c7cdaae221c8db9bcc89d02a02436,2025-02-28T14:54:50.080000 CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 -CVE-2025-23053,0,0,2154fd250835484bb6ccce53478eb965d8f1edbdd03abab608698eea87947694,2025-03-13T19:15:51.370000 -CVE-2025-23054,0,0,c4c0482a2859af3e1bc8205eba573e1420eb6bcf30e508e222518be7010a4ce2,2025-03-13T15:15:52.867000 +CVE-2025-23053,0,1,0f9ff6fdc9c88083db0dfa8462eafa3cc08eed92185165a7c32d8bb1aabb2147,2025-03-13T19:15:51.370000 +CVE-2025-23054,0,1,dbf0c7b17cfc7c5e83e5fb1e8e1bcbe476c5cf79d3972a4541fb9b5449067490,2025-03-13T15:15:52.867000 CVE-2025-23055,0,0,c320c9b7ba8de3c3569203c1baa4e2b97aaeac70892d0d52ef7e6f2b2d2e7f09,2025-03-28T19:00:17.160000 CVE-2025-23056,0,0,4ad51319b831d2cafdfbfc6dcd6b9bfea9f1b08e8a95ac387910d9950093231f,2025-03-28T19:01:49.937000 CVE-2025-23057,0,0,678545b1e2d3328063bbd07864854aeded51192c0c95e159d86b6eeda2e93167,2025-03-28T19:03:27.317000 @@ -284518,7 +284518,7 @@ CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6 CVE-2025-23212,0,0,a254c6cafc1b01dff612632fa5582bc4bfe7d1dec0c6404fbbe7e7b50bce51f1,2025-01-28T17:15:26.273000 CVE-2025-23213,0,0,2bf873f3e92d2859935b5ef9b9525b2aa9b31b0a41c4fb971f8db8fa50fc90b1,2025-01-28T16:15:41.217000 CVE-2025-23214,0,0,d7b0fa512182351e830830c91ee62a319de1d244ead75e3cbb1db4499f765b2c,2025-01-20T18:15:14.127000 -CVE-2025-23215,0,0,1c257a67282c2f0d3524acc4b966f2b9c277c425378cc3c88a5e5865c01860fa,2025-01-31T17:15:16.957000 +CVE-2025-23215,0,1,3be1e00be3e596f5e097b5f11a580881994ff4d2b3bf9b9284081228d6bcb296,2025-04-04T21:15:44.423000 CVE-2025-23216,0,0,59f4f775f33e0ca9bd5247a87df3d43f61057b75f0cde53093fcb610ce66cc2a,2025-01-30T16:15:31.473000 CVE-2025-23217,0,0,5582be0059e80309a3ca3f04c07f88b29c6cce1b4cf19165e08c28e260946ad6,2025-02-06T18:15:32.667000 CVE-2025-23218,0,0,d6a62a680e70e7ea95f2b47e6cbf7a512c76eb49ad3b9eedb4e2ad62ada37e05,2025-02-28T19:21:46.703000 @@ -284540,8 +284540,8 @@ CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000 CVE-2025-2325,0,0,13c6f3c24dd300d81977cebacc098db98e57b148c37ef530d50f5e2edd70e656,2025-03-25T20:07:03.383000 CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000 -CVE-2025-2328,0,0,23887a45fbf5bb1e126827b53cb20ce66ace393985d7fffc1892ed068f9e707f,2025-03-28T18:11:40.180000 -CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000 +CVE-2025-2328,0,1,432be9c7b77876c37841232148e3f6774268d50f769033c9c60a49c79bb54e41,2025-03-28T18:11:40.180000 +CVE-2025-2331,0,1,ba6a506c04c459bf4d4f1d883b767008a848176622abe4526fa84600ec186015,2025-03-22T12:15:26.833000 CVE-2025-2332,0,0,046a67a9cf7f433a88b7d72805ea1318db1beb7a584083c71cb5548df758625f,2025-03-27T16:45:27.850000 CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000 CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000 @@ -284559,7 +284559,7 @@ CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea450247 CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000 CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000 CVE-2025-23382,0,0,607dd91845211bbafd299e41a03d19f4efc365f4aee35f49c34ca976065bd66b,2025-03-19T16:15:30.787000 -CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000 +CVE-2025-23383,0,1,d1c3a17d942c6d64a3ee69d53222a9b28d391e05933c2067234fce4a24ef08cd,2025-03-28T18:11:40.180000 CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23386,0,0,2d9e4c331be95cbb38684666dfcc9a4310ff0991551faae39127a4296c6bc7e3,2025-04-11T15:39:52.920000 @@ -284593,7 +284593,7 @@ CVE-2025-23418,0,0,eaa977c3712de827637fe8b26b1c9584964237077e6aebddc00a01c8a84de CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000 CVE-2025-2342,0,0,621f21b6a22f60a6748d063e26822d3e6fb437cc9181648606379b2d8ac872c3,2025-03-16T16:15:11.613000 CVE-2025-23420,0,0,ea19881d25ade64b6c8429d514b5edebdd89c09d7db1271e5f57f9dea48d9a7f,2025-03-04T17:15:27.643000 -CVE-2025-23421,0,0,e43dea6eba9dd389189f164d376c83ee3800e2f7fb6bbdb2086d590d848a63d6,2025-02-13T22:15:12.073000 +CVE-2025-23421,0,1,00e828297d8c47e57ba7a8d1a3f41d7d51541a2cde4acbd6d1a3d704f1af2297,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 @@ -284738,7 +284738,7 @@ CVE-2025-23556,0,0,1fd82bfbf042fc760c0f089b899fc4b34bbf2e58c93ae3afd82a24ff87d11 CVE-2025-23557,0,0,4948e4f74dc87131949549d056234a4050a760fc1ac3fba66738bd84c832aa2e,2025-01-16T20:15:39.363000 CVE-2025-23558,0,0,4291468aaa8c22c74e0bbb0da124051b4e99d0d01c1849f5de31eebeb38c94a6,2025-01-16T20:15:39.503000 CVE-2025-23559,0,0,f107280d0e32fb23f5905ab5f11f98c3b724795adfc26ea0537d5d8ff93e33a0,2025-01-16T20:15:39.650000 -CVE-2025-2356,0,0,a4916c51b84518fff2680f214bedda1cdd5124b5e49a95128367db29997f53eb,2025-03-17T01:15:37.487000 +CVE-2025-2356,0,1,1e0b707cbe0601859cc5dc73601a96fda9689356cad1a7a7b1ae084650518ff8,2025-03-17T01:15:37.487000 CVE-2025-23560,0,0,19b166e58f91145a20070e52b1a91deda6a79a11328a651eb2f155e7b5e396b0,2025-01-16T20:15:39.797000 CVE-2025-23561,0,0,dab2762c1dcf37050b4bf31dc30aa603b8a241d893f00d9a37f79c0f4ffda778,2025-02-03T15:15:20.957000 CVE-2025-23562,0,0,6516913ed80f1c2cc88fcb4ddf0a4ad7854ee1cade6aaf482ce8507c93182fe7,2025-01-22T15:15:17.557000 @@ -285189,7 +285189,7 @@ CVE-2025-23990,0,0,3b14756c2a5e2580f3d53f182741871e044b9563595708c516f3ceb7d63d2 CVE-2025-23991,0,0,00b21609cf8c00f14859b194275f8503f421372e8beb343f97801aa62c09f0a1,2025-01-24T16:15:38.723000 CVE-2025-23992,0,0,a5b41e5ca3917804ec009c03a93a1a858a9983a55932b8512bd6fdc1226697a1,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000 -CVE-2025-23995,0,0,f35293f87c61d35d8462b53a959048e7d57a19ad372ec6b7139da8d3b2bde6c3,2025-04-01T20:26:30.593000 +CVE-2025-23995,0,1,fc33427766934e6ec798a3acad36041ca77888d3bd75447ef8556d65238e116d,2025-04-01T20:26:30.593000 CVE-2025-23996,0,0,044a631ccc7b953428bed6ca4f1e78634642ba7fb893e1284d5301e8ce6e28fa,2025-01-21T18:15:17.503000 CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb0b4,2025-01-21T14:15:13.230000 CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000 @@ -285210,7 +285210,7 @@ CVE-2025-24023,0,0,5804610dbc6510deb543cff5835e882094a01f7412f58c2aa22d0e854e84b CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000 CVE-2025-24025,0,0,d0deb6cc735d18f2d50160ca3518f33216e8d39f408db984acc4bbc8bf3a9a39,2025-01-24T21:15:11.600000 CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000 -CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22c8e,2025-02-10T18:15:35.563000 +CVE-2025-24028,0,1,081588ffbe87d60a7eb6a1485f9c439ca0b5b9f97b42b04f21e1b75d974dd441,2025-02-10T18:15:35.563000 CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000 CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000 CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8dc14,2025-02-10T16:15:38.990000 @@ -285245,7 +285245,7 @@ CVE-2025-24067,0,0,aa73fd19f10afa521de3cf2b4792d2be73d56b2986f2ec937d30f318fcb22 CVE-2025-24070,0,0,b6bc3e3a54c94f29a6c44e2db055b426248044109eaf535e38be0b94634462b8,2025-03-11T17:16:29.680000 CVE-2025-24071,0,0,b373bffdd46d8f33af306b3087c59ead51ca2709820305f6f569bfd2c231fc41,2025-04-03T22:15:18.470000 CVE-2025-24072,0,0,ff866ef25ff8b4b04c0047326b73042c2b63916962841c2130bf0f0eac64effd,2025-03-11T17:16:30.070000 -CVE-2025-24073,0,0,ac87c367938f46820db1345e116c8ffd519746a908e4923273b7daf3c92233d6,2025-04-09T20:03:01.577000 +CVE-2025-24073,0,1,3c40e074907acac047519aa2655708b7f72eaa99bea41c52a1d84e1b8613e546,2025-04-09T20:03:01.577000 CVE-2025-24074,0,0,b3e947d67a9186891d294f57e167f0e79db99dbb4e9ae2ce396aa91fe915ad9c,2025-04-09T20:03:01.577000 CVE-2025-24075,0,0,1937fe3a6045711fff750df57bc19b60d8487548289224ff047afdc503678158,2025-03-11T17:16:30.270000 CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3dfd1c,2025-03-11T17:16:30.480000 @@ -285273,7 +285273,7 @@ CVE-2025-24101,0,0,5de59a541b049a07cf4cf8647eb22085e2d572c64eef6b5bd856ddba14047 CVE-2025-24102,0,0,86fe3a024a8685ce177a618a9e8bc07780273d2a12e90bd350ab5729f0c00d86,2025-04-04T18:19:45.700000 CVE-2025-24103,0,0,9d77a1391acd11970f5b83f9a3163a0cc44f6475e53e33ea770a58444256625e,2025-03-18T15:15:59.120000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 -CVE-2025-24106,0,0,d9d80e6c8cc4fe0e348a76df60dfbe5150ed37d25dbc9a6981f8a36eab26875d,2025-03-19T21:15:38.327000 +CVE-2025-24106,0,1,19ce8686f3640ed3746765eb080cb22ffc73aee6158e0b30f6fa4a456a027198,2025-03-19T21:15:38.327000 CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000 CVE-2025-24109,0,0,8eb130cf27592d50192927f1b19c4211e2d1fcf396c33ec739b688659623e038,2025-03-19T14:15:38.700000 @@ -285287,13 +285287,13 @@ CVE-2025-24118,0,0,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad4 CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 CVE-2025-24121,0,0,7cb90eb2848b84336d4a2258271f458e62ac9b727b33d8fab49eeaa4abb15d7b,2025-03-24T15:03:21.043000 CVE-2025-24122,0,0,85693c1836650ff62c7b13e695889918d7b4bd355d87238a1a14b1f10ec2addf,2025-03-24T17:15:20.513000 -CVE-2025-24123,0,0,f151d1ba886f1980de255ffb27f17311f839ac035993761299fd7f3578a77b9e,2025-03-18T15:15:59.307000 -CVE-2025-24124,0,0,37f80ea9270e99050922f68bc9b12227b3498b69e58621eb42abc546fb697492,2025-03-19T18:15:24.787000 +CVE-2025-24123,0,1,3aa57c07a62a734aef56c367f327547ce70276a7887636aad0a3dbe60ef75e39,2025-03-18T15:15:59.307000 +CVE-2025-24124,0,1,0ccb2af0d17488658284a9a43ecd1981f1a87847ade374768e7b5b8813c4985e,2025-03-19T18:15:24.787000 CVE-2025-24126,0,0,93626dca5a2efcd9402a6fa0ef63a8a1935cafd987992c392cd02dfb12247155,2025-03-17T16:15:25.117000 CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 CVE-2025-24128,0,0,b692dd6c3705d2f67ed46ab7eedb7af0c180ec823dc1f4569da7249148d6fcf7,2025-01-31T22:15:13.607000 CVE-2025-24129,0,0,f1e90fe08a69d64c55e11da92a9b3bc28db0dd31ae84f052c11f85bf5bf81c15,2025-01-31T22:15:13.773000 -CVE-2025-24130,0,0,384a88a260917bb751e4469f9934ffe6157561048ae6a61b6433fe2d0b4730be,2025-03-18T19:15:48.507000 +CVE-2025-24130,0,1,c0417dda3c60c267bf41c692bb7a961aa28ec4fcf975164b42040f0eac6aadbc,2025-03-18T19:15:48.507000 CVE-2025-24131,0,0,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 CVE-2025-24134,0,0,fda516d606ad65995b42b7ab165a21b96f17b14a8998f4a9dc5169cf0d4f2ca0,2025-03-13T19:15:51.817000 CVE-2025-24135,0,0,400de855e8d59054ada2fe318e85fccb8d1818189e69497bec00e803785b95ce,2025-03-25T14:15:28.597000 @@ -285320,7 +285320,7 @@ CVE-2025-24159,0,0,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6 CVE-2025-24160,0,0,9577104d73a48a82862c835290773879e433d1252391c5319468de6564c9b9b6,2025-03-24T15:01:07.757000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000 -CVE-2025-24163,0,0,e5dfd7fc25470d49a4e1465851f83d31b328f7f38425488eccdc7978762eee10,2025-03-18T20:15:25.850000 +CVE-2025-24163,0,1,eafc9effe67787764f30af3846d453f443d05e142091df24288e192cedd42da7,2025-03-18T20:15:25.850000 CVE-2025-24164,0,0,18ff63bcef2e710cd5861ec3ce09837d673e49d5a6fc2749b67ae13ee7f4d732,2025-04-04T18:19:00.317000 CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24167,0,0,2af757ad1502f1b482dbbf1d0b33ee499f55dcd497e15dc2f655bdde0e0a7d48,2025-04-04T18:18:54.320000 @@ -285442,8 +285442,8 @@ CVE-2025-24363,0,0,e5280365e8798c3d50dec901fd082ab2d29cb61ba3ca73c44ff38bee5500b CVE-2025-24364,0,0,a66718071611b4c5bae8243cb0fb69ff42bed53bfb4d9e391dd0ea1f1905ca71,2025-01-27T18:15:41.690000 CVE-2025-24365,0,0,bb71464e8d0a0e412e7a77dc3188cffac46c5287ce4a03629456d8e9fa3bb7a8,2025-01-27T18:15:41.847000 CVE-2025-24366,0,0,a88cb92e03d021067fd1839391fed795387671856d75f4ac962c9c9d5f9dab0f,2025-02-07T22:15:14.463000 -CVE-2025-24367,0,0,a83004b73bdc0b061316c117f1ce2bb36d493f1194ef2c04927c8db3f858c34e,2025-01-27T19:15:29.440000 -CVE-2025-24368,0,0,cb193fd795c6d6dc5e0c3db7bc9cdab001176c5cfbe51cb931d12b23217ede1d,2025-01-27T19:15:29.540000 +CVE-2025-24367,0,1,d4be83d848453603ccb3cb8847ddbf3e30d47dfb16c1e68ff51a6a418f54a965,2025-01-27T19:15:29.440000 +CVE-2025-24368,0,1,712bf3a3c241d7b3324665604e169b686598ef5312ec5752b0c88390c455996f,2025-01-27T19:15:29.540000 CVE-2025-24369,0,0,28e95105480bd3d578e1306fcb577e127510f1e256452fc6d100d8b7ef0bb0a3,2025-01-27T23:15:11.310000 CVE-2025-24370,0,0,de0bf1ebf68bd78c6b3a9eb33992f78a379b8ed8ac6a489affa87304bc2ac6c5,2025-02-03T21:15:15.547000 CVE-2025-24371,0,0,bd5ae748ff968ec1ecb0ae052adede0e88577cbbf919172c8cf39cf6a80b9ed2,2025-02-03T22:15:28.460000 @@ -285452,31 +285452,31 @@ CVE-2025-24373,0,0,828a96e86ff08b742aa150355f229fc88d281347208da05d776aed1971972 CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000 CVE-2025-24375,0,0,5ca3bd1e3bfa2431518df1b0b7c0fd06f22038a7c9bea86d0e35b64aee6db821,2025-04-11T15:40:10.277000 CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000 -CVE-2025-24377,0,0,456b9ba715a2bdddde0eff1b85eb0b88c8ad4cec6903d573da669bff6a1c52f9,2025-03-28T18:11:40.180000 -CVE-2025-24378,0,0,bb41eabe446096ac00620e03bfc5377eb8192801dca8e450fd144490d08871e8,2025-03-28T18:11:40.180000 -CVE-2025-24379,0,0,ab128709d63f520aa5551cdd29f6e70eb2bd073a7724b963b738e8b7e24d9b8b,2025-03-28T18:11:40.180000 -CVE-2025-24380,0,0,c798991448c4e964b66bc29979e4e44ddc36d8384d0e2a10e9de02ab3f7a4266,2025-03-28T18:11:40.180000 -CVE-2025-24381,0,0,6b5f87069efa5d8e6485194b468750f5403837ae2d62d87d5ba0af2961f7f8fb,2025-03-28T18:11:40.180000 -CVE-2025-24382,0,0,daaaa5868a8f034080fe50ee3ea83f0c43f34a9bdab3c636618a9d7b417fa535,2025-03-28T18:11:40.180000 -CVE-2025-24383,0,0,76c422b5ad58871a557f35caea7fd51df0f887e773a6c1444d5a806528bcdbf8,2025-03-28T18:11:40.180000 -CVE-2025-24385,0,0,d772b0aad3e9905071c7176177b1a972029f47d879cf7e3ccab9ad202a1f5ed7,2025-03-28T18:11:40.180000 -CVE-2025-24386,0,0,fad09a631722a43e2cae9619a41707171ec72a90c48a1113e3a48ae534acaffb,2025-03-28T18:11:40.180000 +CVE-2025-24377,0,1,60e4ce2e56434b3296605212889b3e81c040e4e5ed8d0211488cfd264eefd654,2025-03-28T18:11:40.180000 +CVE-2025-24378,0,1,050465f24e507a346117ecf91ab8b2f87cb7513a13b90a54a886bae6c7b03377,2025-03-28T18:11:40.180000 +CVE-2025-24379,0,1,92c11050d01e556d80d9a50e0ec958e82659e77278e73dcfbeeb2e3c44618e26,2025-03-28T18:11:40.180000 +CVE-2025-24380,0,1,831fdd127739c7fe46709916e61697631d8f77c5e7bd1092433d27993fdde1ea,2025-03-28T18:11:40.180000 +CVE-2025-24381,0,1,098e8368aca62b566ab152a1ac8a91a4fb02d12cbb94741795672290ff91f8d3,2025-03-28T18:11:40.180000 +CVE-2025-24382,0,1,b9b899dbb432fcf707a12ce552fa974839f5c7e3535c8e5e85505b60813ae34a,2025-03-28T18:11:40.180000 +CVE-2025-24383,0,1,8a00be3f6ae35f4f4679d41ab0f505713ccc45cdd937542a531090e4371ea947,2025-03-28T18:11:40.180000 +CVE-2025-24385,0,1,930e89287bc45199246df8a8a043cd3eee589dd78f62d42845187d0b0b9690f1,2025-03-28T18:11:40.180000 +CVE-2025-24386,0,1,58408b073a8e5c10ec25f524139cf62fc0a38dbc113290666798c38651f8adf4,2025-03-28T18:11:40.180000 CVE-2025-24387,0,0,a1fdb446384ec34d7bd22f11041c6c4796cab0ef1e55e8ba9e452979dedd7e7f,2025-03-24T14:11:20.387000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,ee9da22a13b3c2a05aba47928897e56493040057408f7bc7be29fd032a4fd24c,2025-01-23T16:15:40.920000 CVE-2025-24399,0,0,9e2b8368d79470df64393e92711907111b86a093d0c5d40914c6d8eac10d8a6a,2025-03-18T15:15:59.850000 -CVE-2025-2440,0,0,b9233182f01c0d5f9eb72bac366776afd7e7588557a16cfdbfd8cd7e6b815354,2025-04-09T20:02:41.860000 +CVE-2025-2440,0,1,9973e33ae7b8cb4fad92594e7eb9978c7b1876d29a24f8d5a34f22d80f2c2bb6,2025-04-09T20:02:41.860000 CVE-2025-24400,0,0,688f55c8434b6d75b2a47eeaaca4c2596bd1613b0ce146b7759d1b11639da277,2025-03-20T14:15:23.903000 CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 -CVE-2025-24406,0,0,068a48e4f1572adc74de0ff57643978f6e37a88fcdea693efe50c23161ecdab8,2025-03-17T21:15:13.493000 -CVE-2025-24407,0,0,f9e2d5d922a79d1dcafa9e5c3e375349573d6ab49bfe76abb4de02b1a32f8e74,2025-03-17T21:15:13.677000 +CVE-2025-24406,0,1,43a537765b1b35f99016af34dc21ef25efe5f10a237190905c9086e583349f9a,2025-03-17T21:15:13.493000 +CVE-2025-24407,0,1,b93abb451c42b73a88aed78b057f1f75faa880f6f55fb0ef9dfb04c31187d48f,2025-03-17T21:15:13.677000 CVE-2025-24408,0,0,71a175d541d32cdbc570ab7f6d7c743997d1db2eb1cbb0ffc69c37b66d235758,2025-03-05T17:43:13.783000 CVE-2025-24409,0,0,76b2ba4649d51a3ba2afcc0c195fa01785d377e4f86af6c65862f9ad9d78f36d,2025-03-17T21:15:13.810000 -CVE-2025-2441,0,0,7b60a15597431aa358b47dbf8817ad0c1928d4d0b74ac4355c7304e60cbc2f55,2025-04-09T20:02:41.860000 +CVE-2025-2441,0,1,5874f129d20d3caf391f52de4e0ec266f5a15c6421cbfd9962c732d41118539f,2025-04-09T20:02:41.860000 CVE-2025-24410,0,0,77499aebbea770086aee3ad99a9d2ecf8c5de6e787c8d3793da4565952e1ef20,2025-03-05T17:52:47.247000 CVE-2025-24411,0,0,e25c4bce409382405396375d83e0e9c53c66f8c6ce69692ec9a84ba1ad59d214,2025-03-04T15:15:10.630000 CVE-2025-24412,0,0,c4565d9ce55656c7f149853c2a4e4e84c6bb83c88f824906603571fdf53c1637,2025-03-04T14:54:17.900000 @@ -285487,7 +285487,7 @@ CVE-2025-24416,0,0,ce608cc5041223a17b920362aa141a43f0d3fe2e5e8a01a1a2d4f56bbaa82 CVE-2025-24417,0,0,c78be8277a9889ea7b602475b2454ca1936ebe7ba8fe9c3772f12e9a5c5f89ca,2025-03-05T18:35:12.310000 CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa909,2025-03-05T18:34:52.020000 CVE-2025-24419,0,0,c900c86ac9d8a5bac8313f5fb6dd1f23075c40c7bacdd38ef2f1761d27015b61,2025-03-05T18:34:29.317000 -CVE-2025-2442,0,0,08d150b08a8da3015802ed1a9bc75b4fea8093b1165b1fb3d915e8c8b779270c,2025-04-09T20:02:41.860000 +CVE-2025-2442,0,1,4190cd9f490d0cbc14aa7b27b97f63f4216090124f0a62ddf28f2664d24ac2c5,2025-04-09T20:02:41.860000 CVE-2025-24420,0,0,77ebd9638b163fbf17914118e9caeb384d5d1989e269613e437d9e3884629953,2025-03-05T18:34:06.223000 CVE-2025-24421,0,0,db5c4ec715cc202bb9a867c32d751b77d145b26c9064b0e2a0b64916fdccf681,2025-03-05T18:33:47.400000 CVE-2025-24422,0,0,03d49f26c6718cd06567b56ec7e055261ff940e94e609a27949c6dd6ad6357d4,2025-03-05T18:33:16.477000 @@ -285499,9 +285499,9 @@ CVE-2025-24427,0,0,3d984c00654da70ac44a49677bc00ad06333463872ecff8264dc9184d988c CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000 CVE-2025-24429,0,0,5745be1752efb32051d862779d59cc59ee8eac608233679e5235f06efce03a01,2025-03-03T15:51:04.690000 CVE-2025-24430,0,0,99a1674e6b87329ab6f9cb32c02c352dca86d9c440376c7d1dfb1203edf0bb35,2025-03-03T15:44:23.273000 -CVE-2025-24431,0,0,0ddeb8027733db10ad72ae689d79b2e9d96a715a7d1931e99dd66f211a188542,2025-03-11T18:15:30.277000 +CVE-2025-24431,0,1,c3cb69d459388144b798c5ea8d7506f3b4866058b96ea71bcbe1c6ae1118208e,2025-03-11T18:15:30.277000 CVE-2025-24432,0,0,6f2a2bc0516e7fc7c409c8da4192fb168b2bbba2303155f3bd7815ad8b3b6e84,2025-03-03T15:42:50.067000 -CVE-2025-24434,0,0,4b85cc90622b23e78ea22a8ee5f0ed08b571af80c2e9854d362caa3eb5b44296,2025-03-17T21:15:14 +CVE-2025-24434,0,1,27cb06d52fb790b80a9f5e1a89c1f35cb53053f07cb55af12e17ac1925942ad8,2025-03-17T21:15:14 CVE-2025-24435,0,0,fbd4461ab584dc083848b332c94675aebd739d47ed1e4e1cbab7f6b1eca07214,2025-02-27T21:15:41.437000 CVE-2025-24436,0,0,fa6e1028e6b05751859f5712ef24bba808cb1ae0a39dca5196099fca50ecb47a,2025-02-27T21:15:41.553000 CVE-2025-24437,0,0,972c47e05b6f52dc6e19f4c1285b87e9410af4d32e9f6ebd4dac4600d3f09d2c,2025-02-27T21:15:41.673000 @@ -285513,14 +285513,14 @@ CVE-2025-24442,0,0,a8f66209dff397fff7f7fdf29f96f82075d9a60307fa72b99b6f3e7ee385a CVE-2025-24443,0,0,9b387e062ed566e1e08bfc55742fe23d0bd36f63e01c70993f03b9eaee489c81,2025-04-01T19:23:33.860000 CVE-2025-24444,0,0,647636ffe7ff72b15983b0abc2a3e4aab7b2deed062acf0eb294c895b2d1ae65,2025-04-01T19:23:15.063000 CVE-2025-24445,0,0,642582fb1e4e4925eb11b91795bfa62bd7866c6426ae815f76e6742aab043e8a,2025-04-01T19:23:11.093000 -CVE-2025-24446,0,0,891eef20810b20f4edf6f11eb5a5ade3e7fe66a2c08e79956072f7fb358b100d,2025-04-09T20:02:41.860000 -CVE-2025-24447,0,0,6166c23a6fe1b9cd0f9c5b0c18795d98231d2fa904fd0f57e25e648388e39d8d,2025-04-09T20:02:41.860000 -CVE-2025-24448,0,0,c9894e607c6af25c0a5223320edd9e364c24ced37c0a23472c8fb04e74e9c04c,2025-03-11T18:15:31.543000 -CVE-2025-24449,0,0,763563f0e38ea864937173e74d87c4634bc9bc37fd9d5fccd451b509bd062a72,2025-03-11T18:15:31.700000 -CVE-2025-24450,0,0,4e26fad750a72776c09947c2e64c63d7ff3746d1ed9fa038dba7553b9b78f01a,2025-03-11T18:15:31.840000 -CVE-2025-24451,0,0,d4248326cde54aaee88275deae0917385fe200e5a5e47f13b32d17ac8c667774,2025-03-11T18:15:31.993000 -CVE-2025-24452,0,0,8a85196b0d47cc774bd975e6bdd25eaf4b94279a4e0380b80da87908e7b1c84f,2025-03-11T18:15:32.140000 -CVE-2025-24453,0,0,58fab66976b0046c9de5494be2b7bf7dfaa6f2bc346043b4061e5c5902fed767,2025-03-11T18:15:32.297000 +CVE-2025-24446,0,1,9a7e5264913018025cc207a901c72d6be0c4b553a5ffedb25f5129b4dedf8bdc,2025-04-09T20:02:41.860000 +CVE-2025-24447,0,1,356c28410f019a6b0d776a5c3655bbf62db0e1a4d4e2bb3a68b32ec93d103e33,2025-04-09T20:02:41.860000 +CVE-2025-24448,0,1,92fe73012e725b49bd396375c68a68d8b9ed29c7a5ac564ca7f989860080ec5e,2025-03-11T18:15:31.543000 +CVE-2025-24449,0,1,ec7bf425be00a5e3f888baa83e1ed5df8dbc232fae8233f3f93c333265e574e9,2025-03-11T18:15:31.700000 +CVE-2025-24450,0,1,be475c533b5d82c0cfc7cd393e78dbaf6ec979429cc8b937e14bfc7a1410a13b,2025-03-11T18:15:31.840000 +CVE-2025-24451,0,1,e92692c1ba4e2a1f604f0b8fdc30b374013a3bad4ad74e09914e8670d14a4df4,2025-03-11T18:15:31.993000 +CVE-2025-24452,0,1,d04337215fd46e2552aeb46f8de70cebc9307ba152c6e8c3bf9802badf45edb6,2025-03-11T18:15:32.140000 +CVE-2025-24453,0,1,ea5ecdf639fa86511ad3263368759ff9ffa2685c9e14a55836c3a16600c97393,2025-03-11T18:15:32.297000 CVE-2025-24456,0,0,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 CVE-2025-24457,0,0,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 CVE-2025-24458,0,0,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 @@ -285537,7 +285537,7 @@ CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd2 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 CVE-2025-2449,0,0,0dbd069203a80b660cdb63a2610dc85f23643235633ff15eeaf11d0c77ab186d,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 -CVE-2025-24494,0,0,6cea07cccfd63e3e21e6431433f0fa67be526715b4452d5100ebbf4b4cf3063a,2025-03-05T16:15:38.937000 +CVE-2025-24494,0,1,43ac2d60a286060ae572ec37f3d35d579c4245be449efae1f59958937f264e22,2025-03-05T16:15:38.937000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000 CVE-2025-2450,0,0,b8ef9ca2d09b5c1f8011f7f5ca446abbcd72e45fedaa954ec8c57fedc4b2e3c5,2025-03-18T14:15:45.850000 @@ -285766,8 +285766,8 @@ CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35 CVE-2025-24756,0,0,00090c21b036cb18f500635475c1d0d07432c00656603d0706e690db1dac0d4c,2025-01-24T18:15:49.307000 CVE-2025-24758,0,0,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023627,2025-03-03T14:15:49.300000 CVE-2025-2476,0,0,a4d5699a1cea5e33d610cb5573a2b8aefbad7996025bef58e44f47c1feee320a,2025-04-01T20:37:56.963000 -CVE-2025-2477,0,0,0915a1a4ec51d0093b5f801e88bc6041e672268ca60ab13dfc8d194c22ab0afe,2025-03-22T07:15:24.780000 -CVE-2025-2478,0,0,28dba3055c7363ee793712cb2331cfef81b63607ddb1e6447611bced941b0a9f,2025-03-22T07:15:24.963000 +CVE-2025-2477,0,1,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000 +CVE-2025-2478,0,1,1f250b1c3a01cc2aeb8f8a30a3c88313a7c6df2af4f8c1676f1452abfadd344c,2025-03-22T07:15:24.963000 CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000 CVE-2025-24782,0,0,8c372ce8320f821beaf5305dedc64260459e1c67813cc3a8d8e478a94bd72f81,2025-03-10T18:30:35.687000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 @@ -285776,7 +285776,7 @@ CVE-2025-24786,0,0,77ab7857e7df965a91018da6faa2da651f03edbb1f269937c349ededa9d42 CVE-2025-24787,0,0,e02153150cbd3db9e7d5009c4adf836d0e562c18ddf7fe6b6e9bc18dadeb11d4,2025-02-06T20:15:40.840000 CVE-2025-24788,0,0,692078e7d8a90cb76be73f872a0791bca35086d5144a5c501380237ff9693d88,2025-01-29T21:15:21.140000 CVE-2025-24789,0,0,2903e8d3640baba1cea7168189fb34346b805911ec3309248f883ad5d96f0bee,2025-01-29T18:15:47.030000 -CVE-2025-2479,0,0,526a387472df81946fe88b6e091ed8008d613658c163f9849129ca89385b1162,2025-03-22T07:15:25.123000 +CVE-2025-2479,0,1,01a791131204c3311f76deea1fb54184e863dff545a8f923f0c5d8442d5b5a1d,2025-03-22T07:15:25.123000 CVE-2025-24790,0,0,62665cdf922334a94c8e505b94140708d06dec51f68ef9ecb4628035d75320a4,2025-01-29T18:15:47.207000 CVE-2025-24791,0,0,fbc126c1bd8fa03a247eabb79b6b1acb5ead565083f122285bac181ac9cea60f,2025-01-29T17:15:30.020000 CVE-2025-24792,0,0,815c00b91fe0508a6ac1ee7b62f401c19482a17315a51f6f7a6adbc3c30a555a,2025-01-29T16:15:44.273000 @@ -285801,23 +285801,23 @@ CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb870 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 CVE-2025-24813,0,0,c981c31a1c6748cce620d9b8e455047da0daf87f5aa23163f9beb8eaa3df0d7b,2025-04-03T20:59:51.680000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 -CVE-2025-2482,0,0,be7a8d723327735044c6ecc1944caac7a739318f0bdbfa562a15b7f5a44fe782,2025-03-22T07:15:25.307000 +CVE-2025-2482,0,1,13e04c36e9d9620c8f99c8187c0daf7048ec08de8db27a61dd4fede0b1090515,2025-03-22T07:15:25.307000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 CVE-2025-24828,0,0,d6c7252c68dc48223ad23e8fe02a63238ede39167f9cb9fd8d861384db181317,2025-01-31T13:15:27.727000 CVE-2025-24829,0,0,7efc0c94ae292054ed83b5517e6eda6a14703f283b7f8ef2e7ee76b6d97d388f,2025-02-18T19:15:27.723000 -CVE-2025-2483,0,0,99bceb7a7b0010db900364ba6792b0c7e3f729d27820971e81dc90f17ab3277d,2025-04-02T14:58:07.527000 +CVE-2025-2483,0,1,929c158bd9729893e1a3054c1d090ee7edc3196405084e3c6ebce8a5af11c3b6,2025-04-02T14:58:07.527000 CVE-2025-24830,0,0,149ce554396e6f6a2d01866c124b61e24002e40c9d6d50b44720c1d2e3007d9d,2025-02-18T19:15:27.847000 CVE-2025-24831,0,0,c92da556f0147b9019570da06039147ae8945532d2deb083de9ea344daaf5414,2025-02-18T19:15:27.963000 CVE-2025-24832,0,0,6323ca18fbb7b250ae25bd8a26128cc938f8c40313999a5eb50edb4a58e57eec,2025-02-27T23:15:37.310000 -CVE-2025-24836,0,0,5588ca94131c46244e8539a791daf1e4d822f1331c844bc8a05b1352617301a0,2025-02-13T22:15:12.270000 -CVE-2025-2484,0,0,d10325dc2940e5e278866a036b8620f38e61a561dc67457eb22f4c4d6916d0aa,2025-03-22T07:15:25.470000 +CVE-2025-24836,0,1,2105a2b27eb3ab727652655fd6687e9c6f3ddb37ef353b640f3771eb913e5f22,2025-02-13T22:15:12.270000 +CVE-2025-2484,0,1,db81dd224fb04a4b222ed8145c9034a222c25b121346c742360e791dd95045f7,2025-03-22T07:15:25.470000 CVE-2025-24841,0,0,a2bfe696c59d71d61006c3347b2512e90c01384ccb7467de18b9531d5dd49072,2025-02-19T06:15:21.853000 CVE-2025-24843,0,0,fb4d0afee0c2783ca1631e4031059d2c08004431e384816d6d85a2fa124d2f4b,2025-02-28T17:15:17.103000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 CVE-2025-24846,0,0,395a1c47127c2c7ef37d1800a5094c8ea72456277181e4a623939a06fd6c82a4,2025-03-03T09:15:39.817000 CVE-2025-24849,0,0,8e5985d51102085b2b29506fc161cb28ee1a0b2a33328ea438367fccd6fa114a,2025-02-28T17:15:17.253000 -CVE-2025-2485,0,0,bec0bc87ef80d5681ca0207b35a807ec5b25f8aa9955a26545915324703deba5,2025-03-28T18:11:40.180000 +CVE-2025-2485,0,1,28280741d2586daa7011be6c2bc771f4e8d5510e3e2e86f21ab0adf9ef4d2a1d,2025-03-28T18:11:40.180000 CVE-2025-24852,0,0,e5207d00131e6702a9295a9bdc1c6895f578dee210a994787ecb0c10a6489004,2025-04-01T20:26:30.593000 CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdfcf5,2025-03-14T02:15:15.717000 CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000 @@ -285863,7 +285863,7 @@ CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d82 CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000 CVE-2025-2491,0,0,a0733df35b55730cd2b5dbe4143a0c5c885964cd78e8115aea22f767407fa474,2025-03-18T15:16:01.707000 CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000 -CVE-2025-24915,0,0,dd121f72c9839183784e86bbae6206759214c0e214b29aa3e21c1ba59100b516,2025-03-21T15:15:42.020000 +CVE-2025-24915,0,1,24c26ca53ef1e2928a50350b0dbd455453bdc6581f1752ca8926cd09252dcb45,2025-03-21T15:15:42.020000 CVE-2025-24920,0,0,f7f8f763bf4982c0df509bbeae99871e92e5c9a0b38af941d8b9c06be0af01ab,2025-03-27T14:10:53.500000 CVE-2025-24924,0,0,3cb1f58ac0f82a4a651fd56ef4a80a8ba6f8902630bb63eebac1edae30e9552a,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,176e4c709da81a2a28364d8e64063109e6e998df91f7562f9106d1a203c5524e,2025-03-21T18:15:34.860000 @@ -285911,16 +285911,16 @@ CVE-2025-24995,0,0,bb79edc40370416fadbeef79bb99cbf826843e88974657326e0d594c0f48f CVE-2025-24996,0,0,5e01ef73e370a4a2117dd1b707933e940e2d4a54bfa021edb0969c9dc677a02c,2025-03-11T17:16:36.803000 CVE-2025-24997,0,0,b80490d4098a0688d9be5ae2794984498208bc9fe48ed009a78a58ec5b3c38cc,2025-03-11T17:16:37.103000 CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000 -CVE-2025-25000,0,0,f13ce058a093981dda2f50ac04ecc528a9285e0dfa6260a521abdf4c46e1bfcd,2025-04-07T14:18:34.453000 +CVE-2025-25000,0,1,d5ec8035d195406518f39319cbcf905fba8c6f7fd5b0c53e90332d3f680df9f2,2025-04-07T14:18:34.453000 CVE-2025-25001,0,0,c45cc763a1547fefda7795f8d11522125ff7003c83cf07f197d3b95e585aaa2a,2025-04-07T14:18:34.453000 CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499917,2025-04-09T20:03:01.577000 CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 -CVE-2025-25023,0,0,f103fff258200673be4181a5f1b77ee09a9a9c82c095e77a0b73003dc6341fc9,2025-04-09T20:02:41.860000 -CVE-2025-25035,0,0,65d203ab52d157361ed6d15e38d869af4da7ba9ec629455229aa56dc97f969ef,2025-03-21T19:15:45.437000 -CVE-2025-25036,0,0,78fea41d7c513f964231eb9c0626e245c6bb048d564771a720806cf86a8f2b60,2025-03-21T20:15:15.293000 +CVE-2025-25023,0,1,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000 +CVE-2025-25035,0,1,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000 +CVE-2025-25036,0,1,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000 CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000 CVE-2025-25040,0,0,eef52afdc1e0cd691e9f8e58be6a79eb181268f995aedb195ab63cb8f64cab8c,2025-03-18T20:15:26.030000 CVE-2025-25041,0,0,38e8fa4df2cdb6a93ddc945573bdc68d8f211c9cdac3d09670f4b0b980fef07e,2025-04-03T18:15:44.960000 @@ -285931,14 +285931,14 @@ CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868a CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000 CVE-2025-25056,0,0,2442be758ebb20af39870ce02215019e1d15b2a21bc8cfcaa6fde055126de74a,2025-04-09T20:02:41.860000 CVE-2025-25057,0,0,0f4259d66cd4a62551f5fdab8531df6e6db104a18c592bc5fdaecadf9bbe27b1,2025-04-07T14:17:50.220000 -CVE-2025-25060,0,0,0a8c2b6524932cd2aa3b427f8f4980261a4c0e66f4c81723c7a600e1d7bc04fa,2025-04-02T14:58:07.527000 +CVE-2025-25060,0,1,8a64f3b5cfdbdb117dcf174c4cfa43f7826a569058296285ed9b2285a162d8a7,2025-04-02T14:58:07.527000 CVE-2025-25061,0,0,c6aafff32d7dd92169622d3756fd8e14fdd083a787d0cacea4fc235406d00f2c,2025-04-07T14:18:15.560000 CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000 CVE-2025-25064,0,0,9e84cd685c2899ba87d91b60e716dae82288b1f59c39c2c263fed050bcca5916,2025-03-14T18:15:31.637000 CVE-2025-25065,0,0,671f71d66434f8717d0462c1f30a666ef5db46391fb66851d226f8e409f57117,2025-03-13T21:15:43.613000 CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000 -CVE-2025-25067,0,0,9d00bf5a9668da7da5bd0eb0c0ce5a41d502f824b475bc741f0d140c29611069,2025-03-04T21:05:57.430000 +CVE-2025-25067,0,1,009a4d4eff1197329abf13871d59f5e31f7ef26d040f9f1c334223b23fdede24,2025-03-04T21:05:57.430000 CVE-2025-25068,0,0,c8a4ab8093e5452190afc86804a8c92cea760c78a2641b1b2a360c829f12284e,2025-03-27T14:03:38.970000 CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000 CVE-2025-25070,0,0,ddd6d0a8598a596c1d208b2e275c0bbf80bbb7d9feedc6a11fcc7ee87391bf86,2025-03-03T14:15:49.490000 @@ -285957,7 +285957,7 @@ CVE-2025-25082,0,0,8fbcb284df10f74ea677343321a609e9989fdcc51f391e47c600626a4578b CVE-2025-25083,0,0,8fc863a6afa201dbcffcfc1dfd93bef240d092bb5961c8af03bf3e13d5f34008,2025-03-03T14:15:49.633000 CVE-2025-25084,0,0,49e2f3daba3aab05ae8497db4c773f2fabff3f0af3736a98a68cad883ea5abed,2025-03-03T14:15:49.777000 CVE-2025-25085,0,0,48e8d3fd3144ff3e43021324e6671af7f1230fba8a05033bc5b135fd7d20d9ce,2025-02-07T10:15:13.980000 -CVE-2025-25086,0,0,c1cac3f356feecb6a6b36d43551e624ac117157f7ca105b6f965983881e6f9d5,2025-03-27T16:45:12.210000 +CVE-2025-25086,0,1,7c1ce35e6de2f5baec518af2b81dadd84af2cb6cd833f4e01bd06da4ef664dc0,2025-03-27T16:45:12.210000 CVE-2025-25087,0,0,873e858ca23aaa5e1381db85e3add8f072c79d735cf6e2fb2ffe5251d33c8a8a,2025-03-03T14:15:49.920000 CVE-2025-25088,0,0,19b513c75a563bafc3fa8ff6ccee8059f648de42a915840688d58d3b8fa92301,2025-02-07T10:15:14.260000 CVE-2025-25089,0,0,6ea1d167120c5a9c744497a359ef14c47d0c50c9a7012883c33b3c843e89652b,2025-03-03T14:15:50.053000 @@ -285972,7 +285972,7 @@ CVE-2025-25097,0,0,e516102cedda1395b6abdb8786b776f94af95ec136f76e62dc90cc8ba0925 CVE-2025-25098,0,0,d51cf54051461684fbfbca4232445e97f072cd7fa5f46b19018d123dcd09d044,2025-02-07T10:15:15.500000 CVE-2025-25099,0,0,9f4d5bc16129f8aeab3ce15b15ca359e827725b5005628a8e16e352d8cb393f7,2025-03-03T14:15:50.490000 CVE-2025-2510,0,0,0eefa1d3389800f12681aa3d3c96d9fe10410c3daad89adeccc904c04a9cd392,2025-03-27T16:45:46.410000 -CVE-2025-25100,0,0,c959883fe39a86cef1af500b8522ee47aabc4d6b7057972327b3d37973501cc3,2025-03-27T16:45:12.210000 +CVE-2025-25100,0,1,0900b97ce7529d3f4bf6a244990c042bc152244cdb1ee5c43fa5ddd232a1cd54,2025-03-27T16:45:12.210000 CVE-2025-25101,0,0,b55978e51ad28a269a135a73512b84912bf7da148b6e45135907e1256d3b35de,2025-02-07T10:15:15.670000 CVE-2025-25102,0,0,5f9e7463562618c549bf2e4d3e5dd8db7fee9ab199f55b3f6ce01b6dcabdde0f,2025-03-03T14:15:50.630000 CVE-2025-25103,0,0,8f0bbbc68659bdd6583cb7a4bc5992aad3b30e946386462de20a44c10a02c12a,2025-02-07T10:15:15.850000 @@ -286004,7 +286004,7 @@ CVE-2025-25126,0,0,8d61804086754e48af89e8567f3989101452037c2ce395ff80341319a100b CVE-2025-25127,0,0,810a3624b90b1b18c4d6e2986693fd2e429b349687ae9da46aa54076b8f770a1,2025-03-03T14:15:52.320000 CVE-2025-25128,0,0,a1be1b60af41d9f59ae264bf030c7f9da67afc0036052f5ee24681007473a137,2025-02-07T10:15:18.140000 CVE-2025-25129,0,0,225e474e508a15133127b7cc91a7a320235ffd7073489b67d13c6da872d4fa68,2025-03-03T14:15:52.460000 -CVE-2025-2513,0,0,99150dfce2c45450cd2448487566fb2c23af6404b32c908ed7d01c682dd291ba,2025-04-02T14:58:07.527000 +CVE-2025-2513,0,1,9b4490a3208cdc3d49cbf92c32b7bf07e6f68db0a018fe915bc93a4e151f7da3,2025-04-02T14:58:07.527000 CVE-2025-25130,0,0,fd90066c05794bf8a80f9a4a86278162cbcceaff0a4b0e424f0a8a94fffbec01,2025-03-03T14:15:52.613000 CVE-2025-25131,0,0,3de1761f5748603061958b384600ceb9ed047e5b8428dfde2abe96a44a7079f2,2025-03-03T14:15:52.777000 CVE-2025-25132,0,0,edd5f2fbc08e2b3bad0873af9a761d855e2808023b51db2d3982aeb907f20c7a,2025-03-03T14:15:52.917000 @@ -286035,7 +286035,7 @@ CVE-2025-25156,0,0,392795b0610ac1fd5d03e67dde364abfeac5df7cd4b13d93620eb6cc4404d CVE-2025-25157,0,0,bc3278739cef8c7a51b2597da17dc27ccf1bc71b22ba875d5a6fb84021185b6d,2025-03-03T14:15:53.617000 CVE-2025-25158,0,0,dfce69d2026d343bbd8dd188e5771a571b217d56844ea43cdc54885f5885bd53,2025-03-03T14:15:53.760000 CVE-2025-25159,0,0,025a2bd3e6b558bdfff1d7d43ed8378b0ae9f5037837ff20f11b16e15e74370a,2025-02-07T10:15:21.627000 -CVE-2025-2516,0,0,b78da4d02a4897b9d37373263ca9f8130d02f82fefe8478d5ca76b679d121f9e,2025-03-27T16:45:12.210000 +CVE-2025-2516,0,1,bb61ba14c042eb627742100ab1bd39fbafce6ce44e27d08f45f223d46ed75fe7,2025-03-27T16:45:12.210000 CVE-2025-25160,0,0,c867ea52ba2964998bd24138dfba1ca85a51e3af0334809fe322a505256dec50,2025-02-11T19:28:40.520000 CVE-2025-25161,0,0,35f233b22fce2a42862e1eb3468fdab066050a527f864984377f1259992cc461,2025-03-03T14:15:53.900000 CVE-2025-25162,0,0,f29cddcd6fc3fc656e41d2741a224ae4b5abffbb6e18709136fca2b0af35934b,2025-03-03T14:15:54.040000 @@ -286061,7 +286061,7 @@ CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aa CVE-2025-2519,0,0,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8da,2025-04-08T18:13:53.347000 CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000 -CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000 +CVE-2025-25192,0,1,8f8a8795be4e5ba356dcf3ed51503cda0a34f98b4ea219ba9095b8b89a7fbe9a,2025-03-18T17:15:45.720000 CVE-2025-25193,0,0,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e690105ec,2025-03-26T13:14:32.087000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000 @@ -286085,7 +286085,7 @@ CVE-2025-25223,0,0,a49bb693ef5024209af2cdf099d01934d199df8e6379e744ca5e733fcd788 CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09e30,2025-02-18T01:15:09.473000 CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561cfd3,2025-04-09T15:16:01.923000 -CVE-2025-25227,0,0,8ae9b6b987883d9e27471c412364bc0045976ee9401090ef55f9686624be196b,2025-04-08T19:15:47.290000 +CVE-2025-25227,0,1,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -286094,7 +286094,7 @@ CVE-2025-25245,0,0,9553bdb2bbba17800d10d6fb307dc38303cc249115fd509a4ca397b2ef8f3 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-2525,0,0,6681512816c86a4dc20141a0c3ff6e8c54c015b41d7df5f29fc6bf7816448bbc,2025-04-08T18:13:53.347000 -CVE-2025-25254,0,0,9ebb3ce119a7da98468fe8ab8e8f92efecddf2ee8f41c4719df4f556e2753a51,2025-04-08T18:13:53.347000 +CVE-2025-25254,0,1,c4f21e6036ba144ab43461c15a785205542371d6b8f941619552468f7ca5bf0a,2025-04-08T18:13:53.347000 CVE-2025-2526,0,0,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000 CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000 CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000 @@ -286219,7 +286219,7 @@ CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec431 CVE-2025-2553,0,0,af3e66a94c0a1eb2f58bd07af7923c614534c92598d21248cf78812a55d79604,2025-03-20T18:15:19.973000 CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 CVE-2025-25535,0,0,ec416c0380904d179b04cd0faddd71c14944eccc42543d7d92536e31b010f2af,2025-03-27T16:45:27.850000 -CVE-2025-2555,0,0,b41b970d693c08da48ab45392dfe71f0373d1845ab090adfa19e942323d1e655,2025-03-20T18:15:20.197000 +CVE-2025-2555,0,1,7c5c125f0319adaab4869de1119d6af51e624ca2d89d4c1a04e403b1b2d744a9,2025-03-20T18:15:20.197000 CVE-2025-2556,0,0,6410d0d71d88c0622ab126e3f8355190b11c0adc2a784ede90e4c66eb839e87d,2025-03-20T18:15:20.400000 CVE-2025-25565,0,0,7b356774ef891aa22c78e2f98d2e25a12bb1d66504c943cea14aed63c8fadf4c,2025-04-02T20:36:58.390000 CVE-2025-25566,0,0,78d8ded4bf69128c08aee76d5d6a080c6c845f10e6cb9738e027ebf2a2386fb3,2025-04-02T20:36:47.923000 @@ -286254,7 +286254,7 @@ CVE-2025-25625,0,0,d35a53456bc87fc30424277ce00ed28d6dd49da4bed527e81b7815b977770 CVE-2025-25632,0,0,63a9daf8d062287fb49c86902495e07de54d2264559e40d7c6a1a7888562d43b,2025-04-09T20:56:55.750000 CVE-2025-25634,0,0,d0b51d7c1db69276cd41b2edd1346abe98f6557183fb728a8205e284d548820a,2025-04-10T18:17:11.187000 CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd8754b,2025-04-03T15:37:36.397000 -CVE-2025-2565,0,0,f277f18a1d6b4f6fdad91ac7c8998a1356a20612866a1379743ae4d6e0fa80e1,2025-03-20T17:15:39.450000 +CVE-2025-2565,0,1,d818b817202e54e9a5012e130505725e396db90172452c9fc8295f5a728db99c,2025-03-20T17:15:39.450000 CVE-2025-25650,0,0,70ecf06880b4929e5c513a2918fa826b8f349cb5d8c6a838be654946b1198891,2025-03-19T19:15:45.910000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6bbb,2025-03-17T15:10:12.850000 @@ -286266,7 +286266,7 @@ CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c CVE-2025-25676,0,0,2caeac199d92898771cb61a1f50bc4e997a82341fb0b8426f50c92948f273cc4,2025-04-10T13:37:42.663000 CVE-2025-25678,0,0,85648d779984c5744ca9f1df5048118dd1e49b98a4ab2d697b06bfdee7ecda30,2025-04-10T13:37:33.913000 CVE-2025-25679,0,0,e5998fa821177dc2d0587e60d5b4d9ad2f548fdc771316a73f33198e8c181ee0,2025-04-10T13:37:24.763000 -CVE-2025-2568,0,0,022c86ea4873b7192b1f44a6eb946050d85be07ef6e58bb492571e06c8bb2724,2025-04-08T18:13:53.347000 +CVE-2025-2568,0,1,5870572d8910157f2bc716545fd593d6aa46810f7998947ec159b26f0a37e97a,2025-04-08T18:13:53.347000 CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000 CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000 CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000 @@ -286306,11 +286306,11 @@ CVE-2025-25766,0,0,86ae21303cb31636d55dd718fcde7383667a9937c3f5476439f2258b67520 CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000 CVE-2025-25768,0,0,144de6a82436863c4ea31bb6abbbc08daf5c7c5f8f3b7d077640959e2f240ece,2025-04-04T15:26:56.353000 CVE-2025-25769,0,0,fe50ca46f9d7f1df8c92164ff5c574fd0b6420f9452c06e3d38d027c3dde7d66,2025-03-28T20:08:22.980000 -CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000 +CVE-2025-2577,0,1,b42cdd709191575ce088ec06e1554e25be2db50148fe53b9714dad89d20df02b,2025-03-22T12:15:27.013000 CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72dba7,2025-03-28T20:07:33.183000 CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000 -CVE-2025-2578,0,0,856a4ae75a60e9926fe03244f3bce77ffd3f2aeb77e031d5e5f82f6fb6052bf5,2025-03-28T18:11:40.180000 +CVE-2025-2578,0,1,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000 CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000 CVE-2025-25784,0,0,0ad0989845f8e30f12e455449de911107ffaede0d9733a72f1c0bd4468008319,2025-04-10T17:42:20.670000 CVE-2025-25785,0,0,6267e9b9a8e397817e2030d405315b8269946623475246ca055a8f52dba3a89e,2025-04-10T17:38:56.293000 @@ -286333,9 +286333,9 @@ CVE-2025-25823,0,0,176bcb7f80214c397d014bf2a43c50764d06568d7d37b2a33e2666678a483 CVE-2025-25825,0,0,901c1ade9d04ce3b6dbd9707933599e99dd32566b9419f8728a1c443988c728f,2025-04-07T18:52:38.387000 CVE-2025-25827,0,0,c515f01a42f743458072c88710dfbd5db738cb3e3f4b88b746248bde9a65ff65,2025-04-07T18:52:32.653000 CVE-2025-2583,0,0,e56249999003fa41d84db27bc5c94a2f34b712603397c15057dea01bd9c82b32,2025-03-24T14:27:53.530000 -CVE-2025-2584,0,0,c1657b43012c8d09c45dd44f9a25fe024e886e6aabee713305db57005beb4b2a,2025-03-24T14:02:56.053000 +CVE-2025-2584,0,1,d8783f561281e159cb2b009fe9f31c69b6e91790ca6e053d786a850e1902c0b1,2025-03-24T14:02:56.053000 CVE-2025-2585,0,0,090dade5152106dd6130007ac8edb53ce6a59e87736c5215aed7beee13811d44,2025-03-21T02:15:12.073000 -CVE-2025-2586,0,0,12e2d8d4a8d92eb1e16766a9db953961df396a42eb4390edb5da8fcdd91cae97,2025-04-01T20:26:30.593000 +CVE-2025-2586,0,1,90d99765650cf31c144297f89864c65ede6ca7111f51ba2a04d7d4fa3cd4e1c4,2025-04-01T20:26:30.593000 CVE-2025-2587,0,0,e54c60711e1a9dc050de9870ee9a5045dc90a276edd5f28aa4d34be3538a4c74,2025-04-01T20:24:51.570000 CVE-2025-25871,0,0,4b595516a6606fec8116168154ef2cf232358da31b9c387d38f5de1ddc2b1ee7,2025-04-03T15:36:00.937000 CVE-2025-25872,0,0,a1ce986ae169baff711c70ebbd9e97b8c0823edac8b237dcc222449ee1faff7c,2025-04-03T15:35:07.663000 @@ -286359,12 +286359,12 @@ CVE-2025-2590,0,0,031eeae3c758701586aae3459445f0dcf455000f11d324d61deb93c4f391d6 CVE-2025-25900,0,0,c19958e46a5c7601d0a2f6f81f8761b82e188d6b471104e0d3a3030c6717cdee,2025-03-13T14:15:36.057000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25907,0,0,042fa44ae3449a91128a4cfdb3781e1176518918252daa0010b67c1143785aa9,2025-03-11T03:15:39.160000 -CVE-2025-25908,0,0,fe355032e83d1fcac48ab80d23790fbbd6e28bd9d81eb2d8242e10204ea981e4,2025-03-11T03:15:39.350000 -CVE-2025-2591,0,0,a1e4a67e01889d41f47571b6e9a1809cdf5b6c98f2756860cfcf5e05b47f2705,2025-03-21T14:15:16.853000 +CVE-2025-25908,0,1,987339eb0875d89e420a1a58f2b73dd67bac14b8c8cb51aae54988a55163392a,2025-03-11T03:15:39.350000 +CVE-2025-2591,0,1,ee87141e12ee943e529b8bb384fb8bdb2408b45f9dddbdaf93fe6f79882786ad,2025-03-21T14:15:16.853000 CVE-2025-25914,0,0,5f56c66d8de9bee616cb1da5ef251af605f05e5d5c498321787e18b7ebe1d356,2025-04-08T13:41:36.747000 CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 -CVE-2025-2592,0,0,802101c6825ef87ca411ff48e867fc157f089d6dc8c2b07fbcff6e162493f0c0,2025-03-21T14:15:17.037000 -CVE-2025-25925,0,0,992a4d92cdd1ca6c67a633afcfd4f776b6fb4440a7e0f0b6613ea419786bbe59,2025-03-12T16:15:23.337000 +CVE-2025-2592,0,1,d124ac5754c70fe2abbb856d73095eaa12aea924adec30dffbc20dc6b8f65990,2025-03-21T14:15:17.037000 +CVE-2025-25925,0,1,b20168a3d50cf88edd84a566a9242d44f21536b05ff2eb09eadb24dfec7d4ec1,2025-03-12T16:15:23.337000 CVE-2025-25927,0,0,83d098307bb1434929b2c3eb986aaebca3bd185b63f2298cf5cea0f24c66cbeb,2025-03-12T16:15:23.480000 CVE-2025-25928,0,0,4d0126a70ece07e33b30b79d6fb0071d9ae75a48eb252843c096446d3c2cb53c,2025-03-17T19:15:26.397000 CVE-2025-25929,0,0,6bf2d742d037270fd862a805d51ec3ddd6ef1eaaac8534caa6d76c7b5e4ebb4d,2025-03-12T16:15:23.767000 @@ -286378,7 +286378,7 @@ CVE-2025-25945,0,0,a135cb8b6e7bd92832108ad425fd681184321fd3911817b0fa3751ad82620 CVE-2025-25946,0,0,dd68555679ad8b07f36b669fbde20639acf7f7115a512ba533c880a157808efa,2025-02-20T15:15:15.227000 CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c736,2025-02-20T15:15:15.530000 CVE-2025-25948,0,0,c0d45d53d910d217a44b76bcd89bc887e2d47f813f59d9123c9c4e5044437d07,2025-03-05T17:15:15.487000 -CVE-2025-25949,0,0,29482f12ffd0f2b6fd752f7c5eba6fa6abde4b17a1f82f01edef5f8dee7003ca,2025-03-04T17:15:17.890000 +CVE-2025-25949,0,1,c5d2a7799504706447ad876747154cee60b8e1c87dc6f14fc94167a54492f20b,2025-03-04T17:15:17.890000 CVE-2025-25950,0,0,ffd1d8dacd21df5a4530e7d8d066d195d430124e5eed2d4b6c0925ea1b40533c,2025-03-05T17:15:15.647000 CVE-2025-25951,0,0,db8b0e1dd6f4e9fc11d938b0110ae2cb606ddf2c5d30cabb88033ad3680ab6fe,2025-03-05T15:15:18.463000 CVE-2025-25952,0,0,733f7d41a569ab0086bde2648edacf6a1480bd27bad80edec358adfce1ddda98,2025-03-05T18:15:38.050000 @@ -286393,7 +286393,7 @@ CVE-2025-2597,0,0,8a0cbd8d0652062d16855875dcb2e41c8d1851bedcf685074602b342e91bb3 CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000 CVE-2025-25975,0,0,c7ae5024d7c1da6f92e210675a350a113c52c6740e0703a23a707910f48a357b,2025-04-02T20:34:36.553000 CVE-2025-25977,0,0,4702968f0c1b258952258a9aa143e03d32db9d11b787479cd28f012b8795d2ac,2025-03-25T16:53:13.960000 -CVE-2025-2598,0,0,4e957f252459f03ba311f77d275be6d482423b8454d399d8ca7cf8bedc146e48,2025-03-21T17:15:40.090000 +CVE-2025-2598,0,1,b50cbb174f8d7ed196c7f8d3676b5ce8db1caf23ae4aa36ac51430d384cef471,2025-03-21T17:15:40.090000 CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,8b2b3adef615c73806983235252325f570b2dccda1b7c0643592bd465b468928,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,5e1156693b620548738bd3f03c659034c8fa7558a7d1a0f45f9ae1ea86e44f07,2025-02-14T20:15:37.210000 @@ -286411,23 +286411,23 @@ CVE-2025-26006,0,0,4f44a33d0dd049f8c9f5f98cec4d4ab71ecf25c451410b50b8805316b4db4 CVE-2025-26007,0,0,feb239b3cdabb7499b7e656f7a0322c7c6c97a73fd9d86dd5c025d5b62fbd918,2025-04-01T16:34:03.793000 CVE-2025-26008,0,0,386a7425bed1c69a10fec78cd15c828ad9feb851440cc903c12f10ae79361579,2025-04-01T16:33:57.050000 CVE-2025-26009,0,0,8f7f210f0d6391dc793746a507475487d34df96ad5f97137cea8c79aa3fd6b15,2025-04-01T16:33:47.413000 -CVE-2025-2601,0,0,08c0ade364a7593f064c0461b86dac7f0bc55063b212316a45671f72b4aedf5a,2025-03-21T20:15:15.683000 +CVE-2025-2601,0,1,bb4ab67a180a6e1341b2b88a558c82b8f32cf6c25aace2c02315e518aec78676,2025-03-21T20:15:15.683000 CVE-2025-26010,0,0,cf5a04d9860ec5e77e2e34e26dd6be3079064fe7b613efd3b5c093d4f0e21516,2025-04-01T16:33:40.410000 CVE-2025-26011,0,0,7d295bbc36362f782172277753f7e055d256a1db3b7bed76509ca8e09eca8473,2025-04-01T15:42:54.437000 CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127fa8e,2025-02-21T21:15:24.470000 CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922eccf1,2025-02-21T17:15:14.680000 -CVE-2025-2602,0,0,2fee36989b1548d724c00b42027f821f332c0209c90ae3d5f633017fd122b42a,2025-03-21T20:15:15.863000 +CVE-2025-2602,0,1,f21f7a13afb87817a81932c2f26ab3138383049280693ea8598e02fc6dc0ffdc,2025-03-21T20:15:15.863000 CVE-2025-2603,0,0,a0feb4bca9b6519be46ecbe149f7a5ee127179d1f75da77a10aae8aaa23b5249,2025-04-01T20:28:42.917000 CVE-2025-2604,0,0,e75cd0b194a020065e4073d6e30a4bfdc2dcd331c1b113d864b29601f6499c1d,2025-04-01T20:26:24.393000 CVE-2025-26042,0,0,85a28b259be921f0181d0669d9f2dc35f0096c1bd80ef77e40d4ac92a2f60a88,2025-03-19T19:15:46.587000 CVE-2025-26047,0,0,e5f969b85e25d20e576d529c079698dda076726cc7fa9835a0c501d496a29bb3,2025-03-06T21:15:15.623000 -CVE-2025-26054,0,0,7725a310a089802ed23f79224261b3255351f2e0b42a5632c2e36d62a3c79cb8,2025-04-02T15:15:58.170000 -CVE-2025-26055,0,0,bc51e25c741f5001b87515fc0e4660604f9c0cb9feec568d12ed7ce572eecbd3,2025-04-01T20:26:01.990000 -CVE-2025-26056,0,0,254462bc99ddfed832940030e2defc95f4662116962d34421e2351cd591e0141,2025-04-01T20:26:01.990000 +CVE-2025-26054,0,1,7af97027ebd841f2944a0f16c23d07f8150f5fc7449aca0f5ece9086fab14196,2025-04-02T15:15:58.170000 +CVE-2025-26055,0,1,6ba3a5ff1603a03a721f91e76d70ff6cb191be28dd3d26a30f1f49a87df4a3b9,2025-04-01T20:26:01.990000 +CVE-2025-26056,0,1,879e3f7b4ce5e0934b97900be46e4bfeac459c8ad0fa09ac5afb4cfdc507fe37,2025-04-01T20:26:01.990000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 CVE-2025-2606,0,0,443cc3352092d2b10fc06d9cda463fed58074d11c52e405e87198504ec291bc0,2025-04-01T20:23:34.950000 CVE-2025-2607,0,0,1597ffd2cb1ffa35e1e76acba708a8bd026607d0f9e02bb3e06ecbbccfee78bd,2025-04-01T20:15:25.810000 -CVE-2025-2608,0,0,6154f4c95ab9ab878289179a091133b4bdb0b1f5a3bb16758adefdabb865f57c,2025-03-21T22:15:26.250000 +CVE-2025-2608,0,1,b65f02a48a1dbced8c862dbd26eac7589e03570f811113a58b4f5ed21564fa65,2025-03-21T22:15:26.250000 CVE-2025-2609,0,0,98f4e2ddc30f3944fa89ec225fed012beb586ca920ba0b78ac92c5cce135928b,2025-04-01T20:28:29.337000 CVE-2025-26091,0,0,4549d77d1d345075f3140cb5e1ddc83fb523b2320c67bf1bce4f2fbf839cd155,2025-04-09T19:15:47.703000 CVE-2025-2610,0,0,d9535a1c139910205321aca35370cfc0b0260764ca92a5dd60f7ed3f175deffb,2025-04-01T20:28:16.643000 @@ -286439,10 +286439,10 @@ CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 -CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000 +CVE-2025-2616,0,1,2f2b88794fbbb9efdd58fa5d5c325450c0adad88bc639add77ab6b1ee88ac735,2025-03-22T10:15:16.533000 CVE-2025-26163,0,0,4ffd8c87a5a86411342dba92069be8d16487d70a2e7d1aa79a834090be3e95d6,2025-04-03T16:18:02.457000 CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000 -CVE-2025-2617,0,0,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000 +CVE-2025-2617,0,1,3ff42673f0e6d021619b516602185d0115ca3b59b536d1bbc7871ea5669e9d47,2025-03-22T13:15:35.837000 CVE-2025-2618,0,0,172843adec7d6f956a5f5eeed13e519bb51bc23027eb50bbef2b7ba1f423f7dd,2025-03-26T18:48:51.253000 CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000 CVE-2025-2619,0,0,a03c14a339a47cd92a77074a03c44c3e32df7b6333f1ee6a09baad41282f28a5,2025-03-26T18:46:06.633000 @@ -286467,8 +286467,8 @@ CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35 CVE-2025-26265,0,0,dc6169524b361ca35185d09a9fee076e263bc06d923c2410d4d58b5ca82c49d7,2025-04-11T17:24:17.313000 CVE-2025-2627,0,0,2f3ad81f65de29cf1c1820e848f840cadf0a85c3d953dd25546251d732981bcd,2025-04-02T15:46:50.193000 CVE-2025-2628,0,0,05d1547b9a4ba25743b9dcb0b6bd681f5330882c7d106990b2f631bde4178f60,2025-04-02T15:44:41.567000 -CVE-2025-2629,0,0,c910d2eaf141acbcb34a1527dcbb7382cccd5675ca993fe0deaf004b466e699f,2025-04-09T20:02:41.860000 -CVE-2025-2630,0,0,be18d255795398ca987e7a48f89c629ca98a7ecb5c006b7297521c18c8e985d5,2025-04-09T20:02:41.860000 +CVE-2025-2629,0,1,92526d6802f82a60577f499f7428e085c5c9a3dc350eda35a33c257d8ff3ba9b,2025-04-09T20:02:41.860000 +CVE-2025-2630,0,1,80b040beb7036e11c891371aafd2dfff8366fc5de7832ad4f7f7e7481376cd0f,2025-04-09T20:02:41.860000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 @@ -286519,17 +286519,17 @@ CVE-2025-26363,0,0,88de4b738054d81b50fbc63f019ba6c5ca3994c19879d01a6ec8b97a38a00 CVE-2025-26364,0,0,cad3ad8549b1f8959c696141548488c58bf9c1bb1c933f0ca4bc69b1966f877c,2025-02-12T14:15:37.123000 CVE-2025-26365,0,0,48652c3299634957c004062f087c5baa530f27f58870661c91c04d5d14c97015,2025-02-12T14:15:37.267000 CVE-2025-26366,0,0,791459512be83b7fc0ade0a1c646586bc122ab878822f19fa4a4996b21043d24,2025-02-12T14:15:37.397000 -CVE-2025-26367,0,0,f57a379b607c3e2ffa929306f0d3ea2e53e9ab2d6ac3093ae42f92e177aa0826,2025-04-10T19:54:17.250000 +CVE-2025-26367,0,1,1a99d625d052d4bb3c3f9340129b0571199a42b122dca82e2954ea7f9ec1675c,2025-04-10T19:54:17.250000 CVE-2025-26368,0,0,139f23f9856926836cbf55ce4d9a1e686648ccb025ac2269bb7011c210b65e81,2025-04-10T18:55:33.947000 -CVE-2025-26369,0,0,409cccb6d85f0d0e89130b7b1bb9fadf3b9dcae0a6ed481d428a29d672802669,2025-03-03T22:11:42.140000 +CVE-2025-26369,0,1,c9c949ca87a0081c8a977a1891f1efc9de4f1d276263b64e950a3d9f7caf24d7,2025-03-03T22:11:42.140000 CVE-2025-2637,0,0,d781b4ca83dfc8156cc8637398587c48dfc7d889ab11d6fb4b0de92938bdddab,2025-04-02T15:37:24.170000 CVE-2025-26370,0,0,bbb2d9fb4c0649126ad0d0a3c98d217a6344733d746a48a9e3d9d92e5e0ecd29,2025-02-12T14:15:37.940000 -CVE-2025-26371,0,0,8b4079a2ff784ec8f19e55ddeec5679d509d0f557a5a68b084bff417c27af40c,2025-04-10T19:54:12.560000 +CVE-2025-26371,0,1,c5f72c8ee71a462af287fc8c2367164284833ae1e28887cf67b69761d8d8f46c,2025-04-10T19:54:12.560000 CVE-2025-26372,0,0,de2a693b58e4aceb43078b6b71ca42b9ef9fc3b5d2d8c334ca012461b3455e72,2025-03-03T22:12:13.660000 CVE-2025-26373,0,0,c798810bbbd6dc67d70a50a3162c488c6729ffdcdc8131fa509dc6e1fec0fdbc,2025-02-12T14:15:38.360000 CVE-2025-26374,0,0,26cceb5b1ca7dc1616c4fb7aca2989fc82c20bdd33bcad16cbe66ea6bd60ac0a,2025-03-03T22:12:48.590000 CVE-2025-26375,0,0,514a1f739e96ab75e4bc9b8426142f3e37ebc91f656e0869313254d50c0ba271,2025-04-10T18:55:29.077000 -CVE-2025-26376,0,0,857fba28aaa43ad8fff7cc0cf4b77f89ce9449209a896adaa97e451f6076ca21,2025-04-10T19:54:07.187000 +CVE-2025-26376,0,1,9cc6ac5c872d4ddcf52b37d00fd84cbb0c53cdb0192d05e6b6409e77618a054a,2025-04-10T19:54:07.187000 CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000 CVE-2025-26378,0,0,eaa65c5e4596fd493ede04c963b2ac4b9b079221bef424271da443fa916cd0d1,2025-04-10T20:25:15.307000 CVE-2025-2638,0,0,cc1cadb7c34750a1375701cb1da4bb47de30a65ba1265bd222b67359b4a3112a,2025-04-02T15:39:07.113000 @@ -286547,7 +286547,7 @@ CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a806 CVE-2025-2644,0,0,6ca4f7abbe58e9b22566e3f05f3eadc09a0b0dd9a1ead419e5c203f89ddafe7c,2025-04-02T13:30:34.347000 CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8fd8,2025-04-02T13:15:10.653000 CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000 -CVE-2025-26465,0,0,10ca81b0503bc2056f51aff42b836da7e13cef94fb05326f3b97cc95851c9520,2025-03-06T17:20:00.520000 +CVE-2025-26465,0,1,305122a43f3140c85a4b4c03468e2fae692c04863ed3f0f25da2f320b5defd84,2025-03-06T17:20:00.520000 CVE-2025-26466,0,0,e28b9442f0c697ea87fb930b9a4fe54153ce4a5f75ba3228289b85a6bb16f832,2025-04-10T19:03:33.203000 CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000 CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000 @@ -286565,16 +286565,16 @@ CVE-2025-26493,0,0,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66b CVE-2025-26494,0,0,9fa7dddcdaa3cd38f994e8d5f44807b1011184fd2f20f9f1171b97bd05f68ad5,2025-02-19T22:15:24.083000 CVE-2025-26495,0,0,983e2fd32f57fd04049b2b771442705c11716769548e3c408ea9243e53d33e3b,2025-03-04T21:15:14.020000 CVE-2025-2650,0,0,3acf1214c27703e048a375abefe4306eacda8eb0bfd0907a80e3c0f929b093e8,2025-03-27T16:29:06.943000 -CVE-2025-26500,0,0,476e36bea575ec0f48bccd9f90b81b0779f14f9f3be6366ed83ebedcdfc30e59,2025-03-21T23:15:21.327000 +CVE-2025-26500,0,1,a53919381358026ee8c6718421d0829260d1c1edc56ff1b7fb7ef49484068585,2025-03-21T23:15:21.327000 CVE-2025-26506,0,0,fbc7fbe48e89907d7f54c9d44bbfddf8def7e8f962f2da16afa56ece7168f990,2025-02-14T17:15:22.747000 CVE-2025-26507,0,0,95b908cc64a72128294640690e70f9b52cb7f86d46bb5d8b6708727a9b7abcf3,2025-02-14T17:15:22.863000 CVE-2025-26508,0,0,d39bd75c34a7083f955ea70add860587db1f6572db6bc11a7a1abfe21efc97ea,2025-02-14T17:15:22.983000 -CVE-2025-2651,0,0,d9b1054ab98174b67980c64949f28fa7d8fe5cf8f88cc487ecefa60439ceb3b0,2025-03-23T15:15:13.523000 +CVE-2025-2651,0,1,bc80f2e6c4f967439ccc35fb8132f56ee3d43a4bcdb674d69b015e7c80ba2c4d,2025-03-23T15:15:13.523000 CVE-2025-26511,0,0,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 CVE-2025-26512,0,0,27e124c5aa10b0f0b92c8ca055b8cbe842cdfbec5e8c61f840784c35c80d5792,2025-03-27T16:45:46.410000 CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000 CVE-2025-2652,0,0,a1cb75b63ddf5989b6fa64191f54ac1403b781340529a95dec9b56887e6bee5d,2025-03-26T15:16:11.270000 -CVE-2025-26520,0,0,ba194be47bd9d3f863191be1fe91614122666503cc65593c3b5d3845ece3a845,2025-03-03T14:52:47.173000 +CVE-2025-26520,0,1,292c9caba6f38831a4be980034f0f7cdde695fdbb1f85a1136d15679c0c9d4ba,2025-03-03T14:52:47.173000 CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000 CVE-2025-26524,0,0,e4675579756d8bf50fc8a11fc92dcb6c0f4393fb284e95c0369d48074177af48,2025-02-14T12:15:29.887000 @@ -286583,7 +286583,7 @@ CVE-2025-26526,0,0,d5de746cdfd0bb43206f2e10c30b378ba8b65e31d27effea2cf88b1280a1b CVE-2025-26527,0,0,9bfba05a32cc243d8532288a1442fb7f439c65789f06840c37a67dc815560fc4,2025-02-24T20:15:33.403000 CVE-2025-26528,0,0,1e375616055ffb8ee19d13c05e8cfca0ff00938c755df847ce52d88081bd2584,2025-02-24T20:15:33.543000 CVE-2025-26529,0,0,125d8a613aa78f0b6269c85fe27a522d8e914b5da207e6e8f2f587e374dbac6b,2025-02-24T20:15:33.677000 -CVE-2025-2653,0,0,57bea34b2b8d2ff84505d4602f695fd08ee88c3690db14fb47eacf53bf564146,2025-03-23T16:15:13.240000 +CVE-2025-2653,0,1,0007083fefb06dded9271229839887ee8e5c5c391355573bc3525eb0c27fd80c,2025-03-23T16:15:13.240000 CVE-2025-26530,0,0,09a0748455bc659d6989e31e327b5989db76ac7924c30a95a554cde861ed364c,2025-02-24T20:15:33.807000 CVE-2025-26531,0,0,fc0f4e77d1c1071bba686eb2017d32fa454189d0419ad72aaf9c7f4e2b6e442f,2025-02-24T20:15:33.933000 CVE-2025-26532,0,0,5e501a7d3709b2aa8c5be9125b3a76235831b0b4b3b67ef6bc1a6c982c27eef2,2025-02-24T20:15:34.053000 @@ -286605,7 +286605,7 @@ CVE-2025-26546,0,0,1d0af08913dfb2f47d25b72541a34bd165d5694c2966997640eced7ac83c9 CVE-2025-26547,0,0,e08dcb76a1a156827a53523cfc389ec01817f240b8063496d38b458c276a6d4a,2025-02-13T14:16:20.347000 CVE-2025-26548,0,0,cd05686a0a50272445a28504e5b38420a263cc63ec3b3405ba9e595bd73a1de1,2025-03-15T22:15:12.933000 CVE-2025-26549,0,0,a91c3170bbcc373aaf39cde5374b44949bf89c60e7eb9052278e26cc0b4c7b8c,2025-02-13T14:16:20.663000 -CVE-2025-2655,0,0,f9aec132e6d58eb910ea48ede46985a830bec713117301c7570038844465c427,2025-03-23T17:15:29.687000 +CVE-2025-2655,0,1,c3a84acbaf7bc2589ffd2e6e693afbb9f35764d2a091d283242f03b033deda91,2025-03-23T17:15:29.687000 CVE-2025-26550,0,0,11ffa180d12636b1f76387bc0c94d3286af647f36111bf953b554aa472cf9302,2025-02-13T14:16:20.993000 CVE-2025-26551,0,0,7dba4004c8c5ac4b8233012e2b2938b33f182bd977f21f4fcded6f08beb26471,2025-02-13T14:16:21.450000 CVE-2025-26552,0,0,16d07aca1b11958070d4074738ec0200053b71a2d60f0b27a550d9209c196d6d,2025-02-13T14:16:21.787000 @@ -286616,7 +286616,7 @@ CVE-2025-26556,0,0,e936c6301d857291f0e6be084ca2e219cca4c6c69b351347c940407d6f241 CVE-2025-26557,0,0,78fcbed318c980adb806849ae60b5051c97a5ad5bb4ce5ea0a885ea6b945f93d,2025-03-03T14:15:55.173000 CVE-2025-26558,0,0,a062ee3114c1fd8a9a3b12a23d155f52de34c21e7fb6b719fabc3bfc4229ad95,2025-02-13T14:16:22.130000 CVE-2025-26559,0,0,cde379897953a9cc9658331ce9e474de9a3277c91995e030368f46e0879cd488,2025-03-27T16:45:27.850000 -CVE-2025-2656,0,0,52108aeffa7d95739dff2c789bc9a29cc2066db2585fc74beea27bb0a23b7e4b,2025-03-23T17:15:29.867000 +CVE-2025-2656,0,1,873738aa3155254e0a6b3e7c37cdbb91a0841571d412ebdc4cc9bc363c8685f7,2025-03-23T17:15:29.867000 CVE-2025-26560,0,0,722b3db19902ea181d91722d3d36690020a25ca66badc232a4ed6803b8b03226,2025-03-27T16:45:27.850000 CVE-2025-26561,0,0,9db6fc955870504ffcf58626e676807e01c595a1a1593cd3c1cecbb59b4da31a,2025-02-13T14:16:22.450000 CVE-2025-26562,0,0,78c3ae54a6c695c17d29fde5c9737279cebca6b65324878f65a4af2921bdd7d5,2025-02-13T14:16:22.607000 @@ -286627,7 +286627,7 @@ CVE-2025-26566,0,0,a4b9c59143b62b3b4bf0414ee6a050d6f9d9bad57dcccce432e6c09aba8f4 CVE-2025-26567,0,0,9c52f3fc1e49f60743513ba1ed12dcbfda98a9640ff0dad0a481c93829413d86,2025-02-13T14:16:22.763000 CVE-2025-26568,0,0,6a192b29369c6b3335433454f2c2e808bd01940f79d2fba0874a491ae58acee8,2025-02-13T14:16:22.910000 CVE-2025-26569,0,0,9a179d6db4962531369c0769d72d435114b34b89fbe8cbd8217294dfd6d060d0,2025-02-13T14:16:23.070000 -CVE-2025-2657,0,0,6059a3586066afefc3ce6837cbae0fd09f969bd39a57bdf4682860f827aceb00,2025-03-23T18:15:13.607000 +CVE-2025-2657,0,1,b53fe12f0b550dec767b6fd1b3ce27111eedc65b8ad4d34739604eae989da88d,2025-03-23T18:15:13.607000 CVE-2025-26570,0,0,133b85e85f99f07d5ae5ecac4283b448b37499dc43ecdd79dc648a2455c0535b,2025-02-13T14:16:23.223000 CVE-2025-26571,0,0,b105d2cdbd20e2d2ded790a7a4b9a9a9137ec6330f85d27581834a218d316787,2025-02-13T14:16:23.360000 CVE-2025-26572,0,0,9140f77702f57a3238ad2beba036e4bc493e3ef2ab92220731d09a747095ca2b,2025-02-13T14:16:23.507000 @@ -286638,7 +286638,7 @@ CVE-2025-26576,0,0,9b9c654f626ef0426d9a24d3fca63932b0515b8379148bf2658ccf6314d1b CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f9a6,2025-02-13T14:16:23.797000 CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26579,0,0,9be72a5b3e8b7518c12fa69bddcbc51ca5a4b971d4bb3a142f26664d486c09bb,2025-03-27T16:45:27.850000 -CVE-2025-2658,0,0,a610f7662b1e2f0956fcf506a78680755e3de43250034fe19f8378ae1e47ba6b,2025-03-23T18:15:14.533000 +CVE-2025-2658,0,1,a98446ac5da4833240c3c6f067f87f64e50df9888cb0da2c631b9197531608f9,2025-03-23T18:15:14.533000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26581,0,0,0eff3542a6879d7d8bd9bd00549a5e18c8a2302882cec686e50fa7939214fa07,2025-03-27T16:45:27.850000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 @@ -286649,14 +286649,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000 CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000 CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000 -CVE-2025-2659,0,0,7b383a3e0af736d51b2499c6fd58559011b90fde0c8fb11388b95347fb518d30,2025-03-23T19:15:14.570000 +CVE-2025-2659,0,1,fbf6b7428f5a2f31e77711a0c7541da7a333822ab93a6dd7f8fe575092acea75,2025-03-23T19:15:14.570000 CVE-2025-26594,0,0,4dd9103acd408ac2b1007a2b35e0fc32589749a878446e7178a4154dc8f576bc,2025-04-10T18:37:55.597000 -CVE-2025-26595,0,0,ebfb2ddac9eabcc8c33342063230d97e91f59f614211c6c3ecd4f229d8f1d180,2025-03-17T05:15:34.563000 +CVE-2025-26595,0,1,b46beb5cbee553dab1b5b781c461c4743a1a6aeea0531f8ff5faa242c1b641c1,2025-03-17T05:15:34.563000 CVE-2025-26596,0,0,34fc583bca10e3da3a712a62a0fc74466472cdff861b561985a98a373c156e76,2025-04-10T20:19:41.853000 CVE-2025-26597,0,0,166c65d278084f0c5b6a7d35abf0e8f3528bf06fb2bf5455b17ca63ac6c6d452,2025-04-10T18:13:16.983000 CVE-2025-26598,0,0,2907ad86a1bab355bb52a75a97fdfcfc1079bebe47c85f972422e6ccc2746187,2025-04-10T19:03:28.523000 CVE-2025-26599,0,0,d9c655f4f4694302ce1ffa0f2d98c265bb317c3d7ef99b4adbba17191102524c,2025-04-10T18:54:30.820000 -CVE-2025-2660,0,0,25138055ba5274e64b209d04c7cdfeb0b8be547aa21267438908455887644c5f,2025-03-23T19:15:14.770000 +CVE-2025-2660,0,1,2c42197968a1776f0de1d02d3e93937e35f83459e766c077a95db777f634c778,2025-03-23T19:15:14.770000 CVE-2025-26600,0,0,f9120da9e824cf607ee5cd8b55e0b80acd0edf3328d3253251edf7e2eeee8be9,2025-04-10T20:24:22.573000 CVE-2025-26601,0,0,a393fb0504dffdae547b6fe4aae0defeb4dff8cfb6ded0e6c644a571d680db85,2025-04-10T19:19:28.097000 CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000 @@ -286666,7 +286666,7 @@ CVE-2025-26606,0,0,01b5af963c67cf408a7951cd9b8b98d50967cbdbf454c26b5e90910449876 CVE-2025-26607,0,0,291c1923e751d4f4b2a1644be45e9e7de1e7e6cd3c80ee373b6c6da95438cfb9,2025-02-28T19:25:20.823000 CVE-2025-26608,0,0,23e0ed9709bbd76c2a02d0e08e94126650c3b9f7bc8cfa9e50bb0f088161261c,2025-02-28T19:25:47.290000 CVE-2025-26609,0,0,a15d6f9150fb06397c49462a6d14349c4a0c15d83ea9cebe5d5b3bc06bcc936b,2025-02-28T19:27:11.960000 -CVE-2025-2661,0,0,0e2075081ed9a781972c1291a625703e56c8cf9d55e2eaef4f4c61d3d48298bb,2025-03-23T20:15:12.500000 +CVE-2025-2661,0,1,266b0b857c2ab458ae2478a9d56942921fd9d152c0e83435a086e1bda92eb9d0,2025-03-23T20:15:12.500000 CVE-2025-26610,0,0,a635cfdf379113812d8417729841fe07a56767b8db5cfd84dfe2c9339e92f367,2025-02-28T19:27:50.273000 CVE-2025-26611,0,0,4f1872977266673de20f7d49d73cb250f90a3084950ab2f9f19fb182dcc1ee64,2025-02-28T19:34:38.980000 CVE-2025-26612,0,0,2fd6788f00d4bfc2e196128f804aebb62824bbc70dbfa4343d95c794928d2734,2025-02-28T19:33:50.090000 @@ -286677,7 +286677,7 @@ CVE-2025-26616,0,0,aa8b06322884233bdec741ce3560375b4bc669c4a149407dc3d32b4c97ff0 CVE-2025-26617,0,0,3b7176f26db08538bdf0440350a3e948ab8223fd8f5e23f2dd98ab621e31f49e,2025-02-28T19:29:04.117000 CVE-2025-26618,0,0,e55d43c709a7be4f17ec37ae02e94300ec9dca0033ae04b455b3167cc26c9a52,2025-02-20T21:15:26.073000 CVE-2025-26619,0,0,83f8f828c2c5be9675c2be4d5f154843fdb81c2b20ad7a991bcfb91187b1ddfa,2025-04-11T16:12:33.110000 -CVE-2025-2662,0,0,08ed33d7789cac4b8d140dc030b0e0ca481097e25eaebf4376c01470d04c7d0c,2025-03-23T20:15:12.697000 +CVE-2025-2662,0,1,198a6341c2a165dc85d135e7292714331f9924ebca3fefa86edae79af9279b41,2025-03-23T20:15:12.697000 CVE-2025-26620,0,0,67bb16c31832fa279abf82fbaaa24277d7470c8a03c406771fcdd9b2a51688a5,2025-02-18T18:15:36.767000 CVE-2025-26622,0,0,c297f9725cf2e7fc18943b0198c1b5f52cfc595c8df11ef8a0b53474761d107d,2025-03-28T20:06:00.130000 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 @@ -286686,25 +286686,25 @@ CVE-2025-26626,0,0,832135365afe9b165e627d6f2e660894eac8d147d041aabc91e7f8de0d91e CVE-2025-26627,0,0,4f3d1d8e79c6467c58c4d783e1debde01a13c4c8b3f1ff7ec91bf1fb4fe28399,2025-03-11T17:16:38.930000 CVE-2025-26628,0,0,3ef9d34b1a957a131ae438f9c81a203cc837d937275f2ab779c58380b1f3f3c1,2025-04-09T20:03:01.577000 CVE-2025-26629,0,0,119651142d226de4e69d999f757c4da3db257145ca25f65863f6aa1fd4a5300b,2025-03-11T17:16:39.537000 -CVE-2025-2663,0,0,aa164ffc717e67c23ae467b3f456c05b23907944ead8fb826b0b784b736528e0,2025-03-23T21:15:14.603000 +CVE-2025-2663,0,1,fed2879738490ea8a87fdbf7e21e283787cc3eb2a4d4cab6db0ce00967f64d4a,2025-03-23T21:15:14.603000 CVE-2025-26630,0,0,af7d7e5fa840c887baf50d5c1735f7aa1619e17d1764c67afb65d807890e6865,2025-03-11T17:16:42.820000 CVE-2025-26631,0,0,59a2f45a7814bc8caf629a43c5f1ff123b906077fc8e25801290af954c09035d,2025-03-11T17:16:43.110000 CVE-2025-26633,0,0,5f33cb21fce2f0bb3c6b3d8a478731b982f566391108f0ab4112eea241a8777e,2025-03-13T14:27:50.300000 CVE-2025-26634,0,0,e4fd2b42e6c3227da4eabfeb027c93f3600e5512159933298b96dc2c0e6ab9dd,2025-03-11T17:16:43.743000 CVE-2025-26635,0,0,249a6a463578d8256625ed375ca12cf728f4607564d7c2e772655a051d563e2b,2025-04-09T20:03:01.577000 -CVE-2025-26637,0,0,9b5deebae24909e3943d3a6ed60afd670322f84254f9d959fa6e9784dbd57a98,2025-04-09T20:03:01.577000 +CVE-2025-26637,0,1,facb86eb6dc56d63e108cb97f115aad5d62cbcee321419d10e76d6c3d9c8a438,2025-04-09T20:03:01.577000 CVE-2025-26639,0,0,17fe8fa1eb116865f44428dc20c783ff77e5db660c58d29dc713260eb4501625,2025-04-09T20:03:01.577000 -CVE-2025-2664,0,0,6ff0ffc262e2befcd6bc6d4bc7b0cfbc02687b745501f8524d04b60b044f64e1,2025-03-23T21:15:14.790000 +CVE-2025-2664,0,1,f75e6cf736ac187790ce117b9c0097367fbbb23ed80dc2e7f8670f8b784c18b1,2025-03-23T21:15:14.790000 CVE-2025-26640,0,0,7b91eaf051a6e04878ac0f2f1513373a110835dde2872db996d2852035c38142,2025-04-09T20:03:01.577000 -CVE-2025-26641,0,0,84f768b8aa2d0888717d02fb84dfc42af40135aaff78cd9d12ccbc609c2032b9,2025-04-09T20:03:01.577000 +CVE-2025-26641,0,1,6663f8a26f594a769c537befb4f3e590fbe0e63bee66eee30beccbdb4ee126fc,2025-04-09T20:03:01.577000 CVE-2025-26642,0,0,5e07a7f3f0d7f59f4e8c3ebaba862bbbdc274682741fc9b4dea1af99cbd3f3d6,2025-04-09T20:03:01.577000 CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000 CVE-2025-26644,0,0,d546b9cd8d76e65a2da3522c0f23294e576c82b7978f0e7b900a75777d3c3ce5,2025-04-09T20:03:01.577000 CVE-2025-26645,0,0,c81d070a14a19f5aa832e5ee1c6a2271fc8ee18e21d17ccbca0820999b902cec,2025-03-11T17:16:44.200000 CVE-2025-26647,0,0,a969aeac86e0d83877e3a4e36488cecea8d6224c9ae4896f9c62c674b8b77632,2025-04-11T20:15:17.143000 -CVE-2025-26648,0,0,7a7377ef9f275ce530cd7def9c3a65d6410252ceeffaba3ff68a21c329843654,2025-04-09T20:03:01.577000 +CVE-2025-26648,0,1,4c8f1364eeec372ec3785132724f6c81f19e51062ad9cb62b69c48e35e3b2924,2025-04-09T20:03:01.577000 CVE-2025-26649,0,0,04595695627b5120538ce950e07f092f10ab794cc9d968513110bb2ba2652af8,2025-04-09T20:03:01.577000 -CVE-2025-2665,0,0,374db404c8969e7c1a917201d9c10b42061053e18c1f29851f060f01a96376d4,2025-03-23T22:15:13.340000 +CVE-2025-2665,0,1,2cf05c075b0504d84954fa0539c47b52b6ee9edd431f9cc412d2f4d6e8fd8954,2025-03-23T22:15:13.340000 CVE-2025-26651,0,0,0aff72fc7857936a319c01605e6981b0a9d56744f3722838a05c42a6953cbc18,2025-04-09T20:03:01.577000 CVE-2025-26652,0,0,5ccdf8abfb98e9bfe37b209dfbe047f5206f6cad471854e7d1edb7024ad65e21,2025-04-09T20:03:01.577000 CVE-2025-26653,0,0,3d6c5ba690f95d5864e1a1e14cc21341e0ed47cac4c9c669fb0f1a40adb6989a,2025-04-08T18:13:53.347000 @@ -286716,29 +286716,29 @@ CVE-2025-26658,0,0,aedc4d0eb67f4f5f0b6a3ffda635a52c1b05624552df9e00a6801f2a11a2a CVE-2025-26659,0,0,e49bb37eae4d802d08529be287a8ee45c0a41d1e6476deffc54020440698032b,2025-03-11T01:15:35.683000 CVE-2025-26660,0,0,b711a00f5dfa32959fd3c766aaf7ba4ea22e4bae0e839f8f050152da069fcd60,2025-03-11T01:15:35.837000 CVE-2025-26661,0,0,6b07aa7e41ed32b21c57e51684aeb9e36856ccd243be242f1a25b61ed08c5995,2025-03-11T01:15:35.993000 -CVE-2025-26663,0,0,6086e7733590eab72286ca8352780a1169cd1bc8ed84c48aad17700971c29cec,2025-04-09T20:03:01.577000 +CVE-2025-26663,0,1,bf21aa2fd39287702af517fc067cc9da2bb48bc07cb10441954475cf0e44146f,2025-04-09T20:03:01.577000 CVE-2025-26664,0,0,e59d925a63747e28c577080750c0334dd4608ade75462ecd58490599230166d7,2025-04-09T20:03:01.577000 -CVE-2025-26665,0,0,a99bbbfa0350eff178d267d3c711679cbae399d5a5ff7a94f6d9359fcb81034f,2025-04-09T20:03:01.577000 +CVE-2025-26665,0,1,123a12792ccf61194cf801e64ff7a22b89479af5d98e03bd9c9bfbe327100009,2025-04-09T20:03:01.577000 CVE-2025-26666,0,0,d164f20eb2ddae7fba2dd669948ec8ccdb7e98fe401e64a1692a5a5423d3a9b4,2025-04-09T20:03:01.577000 CVE-2025-26667,0,0,27bb09ce4d25e4d785a0fee31f43121f18bb34ee68c6af581f626daa91b0022e,2025-04-09T20:03:01.577000 -CVE-2025-26668,0,0,8173330f11baf8e0da2e8e0be743488eb0aef9cec349cf99b63ec56f464edf49,2025-04-09T20:03:01.577000 -CVE-2025-26669,0,0,ff545d9484c40e4e1f7b143bbfbd9ad745394fef94f085c724dd54b535846d30,2025-04-09T20:03:01.577000 -CVE-2025-26670,0,0,e4f6979dcbc0027cb4d3cd1023cf67710c384014ca9e235f85a82bba968c9e7d,2025-04-09T20:03:01.577000 +CVE-2025-26668,0,1,26c7f1c76f8574a994e6415dda9d0488d39522939bfc44008fd7ed95d6509b6c,2025-04-09T20:03:01.577000 +CVE-2025-26669,0,1,29f106c26c00b9df06bb0540dd8818959298d69de2dc1eb004e263bef7cc73e4,2025-04-09T20:03:01.577000 +CVE-2025-26670,0,1,434df3bbba639230e0fa445e1a82bbf8bb2a6b53074d5c58db40441cb360d577,2025-04-09T20:03:01.577000 CVE-2025-26671,0,0,5b48b5ff67c99cdbf691d132ac1c5e98d6aa477df0b5e702843b0d4987690cae,2025-04-09T20:03:01.577000 -CVE-2025-26672,0,0,05566af805fa02c52bef221190dae71d8ffb69bad4b7db0a049c722a5fa71fe4,2025-04-09T20:03:01.577000 -CVE-2025-26673,0,0,523296a64ab46050153766e118165204b118bd5c6a2a44779969a0647d709650,2025-04-09T20:03:01.577000 +CVE-2025-26672,0,1,a7fe757a6e71a1f0cce9ea8ef7b38053e7345134800af8835450db0b67b311e0,2025-04-09T20:03:01.577000 +CVE-2025-26673,0,1,16c770c968d2bb8744d1e56a63cadca8973effd2f67bf7fe9fc22a5c23763c1e,2025-04-09T20:03:01.577000 CVE-2025-26674,0,0,32c323ba5107a8e5799b20f66e4d6e446ff93ba78a5942787045c6486aefaf70,2025-04-09T20:03:01.577000 CVE-2025-26675,0,0,c1f6b56daa2f6eabf53a9ce93de5eada3ae979f1c7b361477e087600dd51912a,2025-04-09T20:03:01.577000 CVE-2025-26676,0,0,9057b4f1931427751b8f383f66b1a69a1a51d8f66d86462814c582b5d1175c7b,2025-04-09T20:03:01.577000 CVE-2025-26678,0,0,e82891ddb9f5632e37c934f539168e9c53f795b4772f0e0e54aadf2baad572a5,2025-04-09T20:03:01.577000 -CVE-2025-26679,0,0,8dcbca78b35ea6388d9786cdaf7401952f46f80d1d96c8b646aa348274f10a3d,2025-04-09T20:03:01.577000 +CVE-2025-26679,0,1,bb046e51f42ba563921775e24ebfd6e8191af5acc8fe07671759bd946be3d92b,2025-04-09T20:03:01.577000 CVE-2025-26680,0,0,b58cea787042a9e61c39dbdb49c0088acf2de0e39f8163066c5b69f7e09d269f,2025-04-09T20:03:01.577000 CVE-2025-26681,0,0,db7179c6ffacbe99bef0b7955f4cac68d92416cfa71ad531d829e479ac675377,2025-04-09T20:03:01.577000 -CVE-2025-26682,0,0,82c4d8ffb27ac1e0d45a1c0acd96745461f6293a94fe8e414c72c4abf4c09d26,2025-04-09T20:03:01.577000 -CVE-2025-26683,0,0,87988a6d4c6dbe800d3c42a8efc2bd51a6c5fb95b5257787759fe32f886bbf37,2025-04-01T20:26:22.890000 -CVE-2025-26686,0,0,59aaa15d9582056d83d912ee51590159a552e7f9969347f7bf417d2eacd26d1a,2025-04-09T20:03:01.577000 -CVE-2025-26687,0,0,42a13ddd8a8903bb02de8b2c4aada5094989d1d8fb32137da1955201d1274b81,2025-04-09T20:03:01.577000 -CVE-2025-26688,0,0,2b1c644c41e4dc82994a1456ac5a95785c6ccdf710791b8434576fc8762da819,2025-04-09T20:03:01.577000 +CVE-2025-26682,0,1,b3f4b3fb6bacb74301a9bd5c56e2e7d2b8bc479bd39f74530ab11428a4fa15cc,2025-04-09T20:03:01.577000 +CVE-2025-26683,0,1,8a9a801ae1e39e00d47a52f3ea15e280dd63b9062cff8249f258e673b4fd01ba,2025-04-01T20:26:22.890000 +CVE-2025-26686,0,1,875d6e2e2335e247eb60c92fd966d311965d4dfa5b2e37254f2e9c381e740729,2025-04-09T20:03:01.577000 +CVE-2025-26687,0,1,3e22551589e4ec527d753d1d500a0d81debbda8185553b19774b1c6aad2170f5,2025-04-09T20:03:01.577000 +CVE-2025-26688,0,1,21b07cd2440210e182a8d6b8137627939ef3f62b96f51db277c59d6502d24206,2025-04-09T20:03:01.577000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 @@ -286753,21 +286753,21 @@ CVE-2025-26705,0,0,60ec52a3a37b8a1198549fd1a80bc727c4794d468b4358c4011967c60a257 CVE-2025-26706,0,0,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e749e2,2025-03-19T14:15:36.417000 CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000 CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000 -CVE-2025-2671,0,0,ff323274946feee978f3035f65d2b13b8471bd80748e845b932a8fcd6a7349f8,2025-03-23T22:15:13.513000 +CVE-2025-2671,0,1,0ff196173808667dc01bbb7f848ba87ce3a33521fef4f72eb6fcd71f1f2d1a5f,2025-03-23T22:15:13.513000 CVE-2025-2672,0,0,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b322,2025-03-26T14:37:30.087000 CVE-2025-2673,0,0,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000 -CVE-2025-26731,0,0,f67730d1a62b21fe079b1f62dc56a1a46976a3111d95604fc1c76a197974aaca,2025-03-27T16:45:12.210000 -CVE-2025-26732,0,0,18092d406c37e4a30c9ae075a22eb6aae01ecce04566cb69f72a098963162b7c,2025-03-27T16:45:12.210000 -CVE-2025-26733,0,0,db1fca9a2513866c9769cc0d7b8be5b8f271123aaa663aa03c6d6d0a52c89c7d,2025-03-28T18:11:40.180000 -CVE-2025-26734,0,0,51f70d1ee626286138ffb8787db02211365b7911510348e4749574e2cb0dd1cd,2025-03-27T16:45:12.210000 -CVE-2025-26736,0,0,13dbfe77eb0e0384e05f3b46e4d9a063fe7550a0611589936e9364a96c62f4be,2025-03-27T16:45:12.210000 -CVE-2025-26737,0,0,0011f80f568732a76bf0e41589180a4b80fdd2947b1363241733ff8a89deb66c,2025-03-27T16:45:12.210000 -CVE-2025-26738,0,0,00959f4b5466a97f69f73ef503ecf0de0641666550ab49a82f2c74672c85ad83,2025-03-27T16:45:12.210000 +CVE-2025-26731,0,1,c7817b389dd8e48ba9c23176ffc47a4513dc1c156d334d1e290101d6e70fcb91,2025-03-27T16:45:12.210000 +CVE-2025-26732,0,1,9a4756d06e1f47486acc1d11e63e6358084f69cf8afe62886573bfd227906b42,2025-03-27T16:45:12.210000 +CVE-2025-26733,0,1,3af17c2e611e2f31c28ce83c0cc80d8af616c2dd2717ffdf11fcc8663127ca59,2025-03-28T18:11:40.180000 +CVE-2025-26734,0,1,8bf312e5e03976e6be8c9ab6a48c8c98473c91f8f4b6a8388f162607b97f4189,2025-03-27T16:45:12.210000 +CVE-2025-26736,0,1,1b2130058a97219edc06053c7d7ad7cfa169839720e348dfd6a3899f8075d7fe,2025-03-27T16:45:12.210000 +CVE-2025-26737,0,1,ef70e0172c0763982b4f704c98436f4e8fa7d9222206609f397682c2bb7a435a,2025-03-27T16:45:12.210000 +CVE-2025-26738,0,1,fe74511d18daa7f8c822f7c00f478c77ab9fe05590b455ccad4998d15c474085,2025-03-27T16:45:12.210000 CVE-2025-26739,0,0,2514d7567fdad9bf988b03c827c3cf9332db7eb4aaa61ffce3b49cc72d1bf133,2025-03-27T16:45:27.850000 CVE-2025-2674,0,0,b17ff2a840d43872ce8941660011244ce317e8241898334fca92f2c7e2d2df13,2025-03-27T18:21:20.710000 CVE-2025-26742,0,0,d1c1ef0a2d3414bdd8fc0829685f2cb4bdc30a516dc3a80c709e135b1569fc7e,2025-03-27T16:45:46.410000 CVE-2025-26747,0,0,f799dbfce90467344ad4aaf43405a0c5bb92178129ef15a39374277528ecf159,2025-03-27T16:45:27.850000 -CVE-2025-2675,0,0,a44c23b3c6eb403feede7f07b62a3195c75d0aaf189d379810936f38997636fe,2025-03-26T14:03:31.380000 +CVE-2025-2675,0,1,e49840b3a5ca3e77744a146445fa06f116b5cc16d89bcce736017749e482f04f,2025-03-26T14:03:31.380000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000 CVE-2025-26752,0,0,de5f26c0c725b106ce7f39cb1c013f91e7db3ad53711569dd4e04f93f6febcc6,2025-02-25T15:15:23.597000 @@ -286778,10 +286778,10 @@ CVE-2025-26756,0,0,a7d018e1af803d931a8df90ebdc612d9159f81541f17aec331fcf30be95f9 CVE-2025-26757,0,0,80d208c1ae63305798dd96e121d883ba1652b7f9f061f31e63f086130d7d717b,2025-02-22T16:15:31.493000 CVE-2025-26758,0,0,25b40533aee409aa2cd331b2ce18cbaf3edeb379df8662b725fd0ff6cbb28f34,2025-02-17T12:15:28.407000 CVE-2025-26759,0,0,711cfe1a3f1e64585c04ae86c12c769c732825e1fb249553e9081d3ae4e51992,2025-02-16T23:15:10.777000 -CVE-2025-2676,0,0,f651abf35c4fd02355a5eedd8dc46ad5582fdbba97477491fd397ab68e7704ef,2025-03-26T13:55:26.630000 +CVE-2025-2676,0,1,664f8dc3657ee1dccd6cd138d80905678a0dee78be6becaca66581096942081a,2025-03-26T13:55:26.630000 CVE-2025-26760,0,0,6ce75bdb24ca7f76541cf2fd588811a129a1da7e93670a47e5e982b0f015f1a0,2025-02-22T16:15:31.633000 CVE-2025-26761,0,0,00fb3a7da1af944660d71a3efffc99fa612b6b6a3bd94f13b9ebbbe6b2a8b567,2025-02-16T23:15:10.920000 -CVE-2025-26762,0,0,9951c91ab12a3bdb1996299a82ef07f0bde0d6744e403129afb8c6072fc856e5,2025-03-27T16:45:12.210000 +CVE-2025-26762,0,1,d814d8391a3ac8838c15d0bdd9e395183c037967f2b5c3e0401487da0f42a419,2025-03-27T16:45:12.210000 CVE-2025-26763,0,0,51c2f2b0f162ff62e0ae405c36d1c1d4c6cd19c1cec4a143ce94453f0be82b6c,2025-02-22T16:15:31.773000 CVE-2025-26764,0,0,f9fc5ae0b03df30611efaf89910753ad7292c8e07a0bac94dc9a82b85fb68378,2025-02-22T16:15:31.910000 CVE-2025-26765,0,0,2456c01ed33ba610de780c6b9eecd2f71567106634178c2e806087aaf6a69853,2025-02-16T23:15:11.063000 @@ -286789,7 +286789,7 @@ CVE-2025-26766,0,0,6fee40560b10bf615ff77815533156ec331161a872ec1edc4de985dac44c7 CVE-2025-26767,0,0,a90bd9c7131cd1561c4ae5dbfe01302d49d2ae2d85536054fa888129574ed5cd,2025-02-16T23:15:11.350000 CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a05b,2025-02-16T23:15:11.487000 CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000 -CVE-2025-2677,0,0,38d8cf48265c9b7e92bbc3a46f3b767ff2a93a7fc7e35c0cd70297734f40d657,2025-03-26T13:48:38.670000 +CVE-2025-2677,0,1,47c45cf6dc1f12bf59b307dee6451d94ba9290480121fda60ef6dd2e312f27cb,2025-03-26T13:48:38.670000 CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000 CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000 CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000 @@ -286799,30 +286799,30 @@ CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c04 CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000 CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000 -CVE-2025-2678,0,0,7e1a91aed29821d8f3580fde3c82f83b41d6d7459dd9f3cbdc7289217ba1ab54,2025-03-26T13:42:31.437000 +CVE-2025-2678,0,1,8448d4c1831574778d148af831b21e87b2480ccf9c6ebd5726d4a7e79637b0d7,2025-03-26T13:42:31.437000 CVE-2025-26788,0,0,5fac6b93304aa80bc7a573b7eaa3933fb509b5a737cf70fd7551789f71a19205,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2c79,2025-02-14T08:15:31.357000 -CVE-2025-2679,0,0,fc23340601b0242e345b387da555239ec620056960eb96b4e1c5fddfa9cab616,2025-03-26T13:35:46.297000 +CVE-2025-2679,0,1,ff860b212f91f621fde46a76333fb0f744bea36dc6bff7740e5bcdeff43c50c2,2025-03-26T13:35:46.297000 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26796,0,0,24b722f9fdd0036785d8d66e8d4daa5f3cfb88aa828e1dd0b10f15b253daf671,2025-04-01T20:27:46.867000 -CVE-2025-2680,0,0,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040da0,2025-03-26T13:23:41.867000 -CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 +CVE-2025-2680,0,1,b5ab5be4e13fbc4e4460a1037afcc530f3607c07b6a8e55e4451b98265dce53a,2025-03-26T13:23:41.867000 +CVE-2025-26803,0,1,f34b060535881535036774e78c94752baf5db5d8ee7ebda53997889e53c0646c,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,5aff080ddb50ed462d991796421705fb9c2ad0cbecf1825de612f6f23588439d,2025-03-27T18:14:32.930000 CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000 -CVE-2025-26817,0,0,05983da452d91ddcd5d3158b732ab35d02f0510a6ec6071b5fa947d42a985241,2025-04-07T14:18:34.453000 +CVE-2025-26817,0,1,4111878982607595f386d8762163fc90569cdb50bbdf7c1ad224cc15f1f93936,2025-04-07T14:18:34.453000 CVE-2025-26818,0,0,285ebcf35eac188bc58be4808ddaa59aea0894e24201263c96e807c5caa256b5,2025-04-08T20:10:49.653000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 -CVE-2025-2682,0,0,1f6afc395b3a492c46c222208c54c66658c9b287b6a7e8da79cfea7bd2f45373,2025-03-25T15:16:47.100000 +CVE-2025-2682,0,1,849352cd9f798994ca9e74fad55d121de3e298a7e41a16e1a7d7b753a14ca964,2025-03-27T18:14:29.287000 CVE-2025-2683,0,0,35e10dbc0adb60b558fed104e703a40b41ef7d99c44deb60462ff8d8416b21ca,2025-03-27T18:14:24.227000 -CVE-2025-2684,0,0,ef7fe32b633d58e8842d7273a41eaa92267e238e2f87fb8a09c71c6bcb6395c6,2025-03-24T17:18:54.283000 +CVE-2025-2684,0,1,bda21372c9d6a54dee6ff2254c4e0dde758fbda023ab98b636e784708ca97e24,2025-03-24T17:18:54.283000 CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000 CVE-2025-2685,0,0,e47390d79e6358f0707017a49a80b868500d2e61df885503f5f07ed00adc5d2f,2025-03-27T16:45:27.850000 CVE-2025-26852,0,0,d72cd5d5e66b523b3c44dc3da5e235d0fd5febe59bde3155dcf917e418fe0241,2025-04-03T21:15:39.520000 CVE-2025-26853,0,0,9f63dbde1c4d35ee441f522b0a7fd7f1506fe9cfc205ea0689cbba8371dda7a6,2025-04-03T21:15:39.683000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 -CVE-2025-2686,0,0,a76c164685b9183ddc211fba13468fcb67d255bf9600859ed63ab700bebcf6b6,2025-03-24T06:15:13.127000 +CVE-2025-2686,0,1,eb80a0c8f7b31a5582d2e1c5cc77c14ca573ee9db201a3a963e2f24b2e246438,2025-03-24T06:15:13.127000 CVE-2025-26865,0,0,392cafa9196f9e16f10dbe623eb410cd729a2dc1013d61e7dc7061610b7c87ad,2025-03-11T20:15:17.917000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 CVE-2025-26869,0,0,a478c5658e508ed802536bcbcd20e5908ef4279d4bf22775ffd2201f754d48ea,2025-03-27T16:45:27.850000 @@ -286835,7 +286835,7 @@ CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03 CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000 CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000 CVE-2025-26879,0,0,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000 -CVE-2025-2688,0,0,b42c9b4a50806d07064eaf59e50fdaec52a4a94edd9eae74c06e16ea7770c8c7,2025-03-24T07:15:12.760000 +CVE-2025-2688,0,1,3db76f6c7ae6bd47c67a7955d3d43773d55b0ddfc445a5d95eadf558dec95819,2025-03-24T07:15:12.760000 CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000 CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000 CVE-2025-26883,0,0,922ad8d066f9e08d920e6020bb5edb414ef495b7a7f4fba5c400a5b716452883,2025-02-24T15:15:14.007000 @@ -286844,23 +286844,23 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 CVE-2025-26888,0,0,88340f4d9fa5152f8d2baf93269a38c0f6caaecf7620d64ac415d48780f03414,2025-04-11T15:40:10.277000 -CVE-2025-2689,0,0,7def21fc4f9af6929592c74150fdb16a7f32a04a61b4c9679449b0c0f3db1408,2025-03-24T17:17:26.607000 +CVE-2025-2689,0,1,a0a16f7e7cbfe138500325b64261c6e20c16741d6a695a680e6c214018b4891c,2025-03-24T17:17:26.607000 CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000 CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000 CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000 CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000 -CVE-2025-26898,0,0,de5d6e76dc39902681c090ab731297bdb43aadaf64b5598bb195e3a06ac8535c,2025-03-28T18:11:40.180000 +CVE-2025-26898,0,1,3e217c55303e897f97fd2f5b9372d5d14cb68d267742a4cc3ec4cf099c0839cf,2025-03-28T18:11:40.180000 CVE-2025-26899,0,0,95b084e2f68809ccb6891be9923c60028fc93cee3b6a691436d8301682c70fa6,2025-03-15T22:15:14.250000 -CVE-2025-2690,0,0,ba0a819c9af2cc9ef6be5031e2f922b414ad3e85f830bda091f0f98a651b600e,2025-03-24T17:15:40.917000 +CVE-2025-2690,0,1,75f1203ac5b34c88acc73b68e6ba0da2d7e1bf821a23d04642fb589976fd2520,2025-03-24T17:15:40.917000 CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702ad8,2025-02-25T15:15:25.853000 CVE-2025-26901,0,0,275fcd1724f1e09cf5b312f35af7c97f9731ba6ce5fcb10bb28c3ad70715e042,2025-04-11T15:40:10.277000 CVE-2025-26902,0,0,a352d49522ef9a8ce292a40d2fcf63e3c78f10a3db52281b2745c9cfedfb5d40,2025-04-11T15:40:10.277000 CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000 CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 -CVE-2025-26909,0,0,2db4bde87856f2e1edacee00a377d4b65bc7edee48bdbaa4e71e83e5570db68e,2025-03-27T16:45:12.210000 +CVE-2025-26909,0,1,5d0fcbc30b621c07fe2a4f5cb7d6b6729dad21266cc3a2453124baa5b9596a45,2025-03-27T16:45:12.210000 CVE-2025-2691,0,0,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000 CVE-2025-26910,0,0,ca74ac486aa989f6f999598f8bf14014c34c48339b6905c0296af8a29556b3ef,2025-03-10T15:15:37.660000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 @@ -286926,7 +286926,7 @@ CVE-2025-26986,0,0,d5056d448002b82d591d040ffb1fd805efa70c00aff8e0d38217c91141bbc CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d560be,2025-02-25T15:15:31.313000 CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000 CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000 -CVE-2025-2699,0,0,99542a6eef0546e162a93fe2a2c0e77a63fb158b4ffcf3cc7e83460b60f35726,2025-03-24T17:33:00.020000 +CVE-2025-2699,0,1,6396e1b9f8444bd1d0105b607426e0438fae6c8e1cad3a588c50e09924ca055e,2025-03-24T17:33:00.020000 CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000 CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000 CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000 @@ -286934,8 +286934,8 @@ CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be CVE-2025-26999,0,0,cdacabf1a660ac6dee9a5685fa630f6b1572dbc44af9dd2498823746cb2cfe2c,2025-03-03T14:15:57.830000 CVE-2025-2700,0,0,5071cd8329bcbe3e4081f465d8ee368358c8db967df119c33d261aceab1236e6,2025-04-01T20:47:42.813000 CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcfb4d,2025-02-25T15:15:31.853000 -CVE-2025-27001,0,0,187bec4159ed366e05ab245c9472c5c857c5c2c6aba0e7b0c38c19bb721a82d9,2025-03-28T18:11:40.180000 -CVE-2025-2701,0,0,f52af690ae241a70e2d868aa2a2c224f9b58c7f9bca32767e7f0be53336d72b3,2025-03-24T09:15:13.950000 +CVE-2025-27001,0,1,9549fdac37d52ebf8e1c75331c3601de8f03a77a6f35cd82e54896fef08473b7,2025-03-28T18:11:40.180000 +CVE-2025-2701,0,1,4a00a8c87ae1a8f8d8996e5497fbf475b3761e12c82cf113f0ba83ecc0864e95,2025-03-24T09:15:13.950000 CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b34a,2025-02-22T16:15:32.497000 CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 CVE-2025-27014,0,0,bdb4bb53ed32c8910a3d15ff13e2e53e881921db613d28fde5d34dee78b2e31e,2025-03-27T16:45:27.850000 @@ -286943,17 +286943,17 @@ CVE-2025-27015,0,0,3a1fea70edcc0b329be91273a27e4d84e5c055f66cd95d6f9e0b98b637ece CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,94651ace51e56fbcc25f172f4073521c7860458186a53a829906ba80fd471017,2025-03-25T18:15:34.683000 -CVE-2025-2702,0,0,df0262a5fd2d1f68476b97b0668292b58d225a530ead46671532bfafd32c27b5,2025-03-24T10:15:12.943000 +CVE-2025-2702,0,1,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 CVE-2025-2704,0,0,f50441ffd3f3109d4071899808281b529314ab4de08ae18179b1bf16c0996e68,2025-04-07T18:15:45.560000 CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 CVE-2025-2707,0,0,f3d66cc3dc4dc05eca1164cc031bb281faa912ba2aa015da55a5b17439ea5a04,2025-03-27T16:45:46.410000 -CVE-2025-27078,0,0,87218f7b63b7b41fffa6b2514a4f915ef2872294e97c4c90284d03940c5b9680,2025-04-08T18:13:53.347000 -CVE-2025-27079,0,0,0b052eb5620ef6c2a33f5074d0cda212573793a5998bf08dec9ab464e47ff414,2025-04-08T18:13:53.347000 +CVE-2025-27078,0,1,d965af916f92d2db1a98213768345ac86ccaa481e270cc65e36339f5a02ca0fe,2025-04-08T18:13:53.347000 +CVE-2025-27079,0,1,2e6807eb9db0ff0cab73307a945a3f280ecd9d2483ae144485c2a82083b449a4,2025-04-08T18:13:53.347000 CVE-2025-2708,0,0,035f6de4f231540df9d0a6b0f6672e128ae938a5bee1f8e3912f75b08cd18d96,2025-03-27T16:45:46.410000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 CVE-2025-27081,0,0,8593bea3f6e04dd79dcdb89b954788bba5e7424bd9baf03a721e3eba77e74da0,2025-04-11T15:39:52.920000 -CVE-2025-27082,0,0,bc94d7aa1707776f0018420de9eca8ff83f2f275182e2df214e9bcb4f130ccf7,2025-04-08T21:15:50.273000 +CVE-2025-27082,0,1,ffb20ffa027c4bd1d4d43e108dc1329f65254792bdc60837334e2fed50c76691,2025-04-08T21:15:50.273000 CVE-2025-27083,0,0,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000 CVE-2025-27084,0,0,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000 CVE-2025-27085,0,0,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000 @@ -286964,7 +286964,7 @@ CVE-2025-27090,0,0,d649018651979639a7b1c8acf0eda3f6b93b0e44c8b2420240cdfb846024f CVE-2025-27091,0,0,76930f38a3a2f053bdab75441f1f504cf886ff8b7358adb8f0d250a110f1e7f3,2025-02-27T20:28:14.007000 CVE-2025-27092,0,0,9aed7fdfc4c9e1280fc67359d9f3b896d01b5eabc18d15f22f08d950559385bb,2025-02-27T20:28:50.730000 CVE-2025-27094,0,0,912ebcbf7addc06d338a9df39021fc14862a3f9eff1e3429510bfe78c00688b7,2025-03-03T17:15:15.433000 -CVE-2025-27095,0,0,cd911db3f9ed556f3099bd0d67f2e94028f5101036142a82277a4febc12e8bb6,2025-04-01T20:26:22.890000 +CVE-2025-27095,0,1,1838782be8311721f12c52eaf955647c3d4c15acbe3d766fee0183ae4ae9a5d5,2025-04-01T20:26:22.890000 CVE-2025-27096,0,0,b035fc053249cd7e8871d424805bbce3d771ae3f64c764848dba544b572355f7,2025-02-28T19:28:44.283000 CVE-2025-27097,0,0,e199953469681b5e92cc2168d6b4e4da9b471d9694c80dd2a45e6436dbabbaba,2025-02-27T20:27:24.720000 CVE-2025-27098,0,0,873fcb90264f4e04a047cee2cfc6d823db0b6142c91033a12829dbc6dd942122,2025-02-27T20:27:05.270000 @@ -286984,12 +286984,12 @@ CVE-2025-2711,0,0,9328a14d0b377d35916514eaf7b1c90ba25b31b37c90a87892bae682364cab CVE-2025-27110,0,0,94c21b54338fd64c1140d4cb28fcddebaff47e20a24ceda30c37b569c00a7737,2025-02-28T14:36:15.510000 CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3de1,2025-03-04T16:15:40.487000 CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000 -CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 +CVE-2025-27113,0,1,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf603,2025-03-07T01:15:12.823000 CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e195d,2025-03-27T16:45:46.410000 -CVE-2025-2713,0,0,33dd32563e6e72304dbed5649d36dd4b9303b3b1c9fdc5f4a7ebf849b633dfa8,2025-03-28T18:11:40.180000 -CVE-2025-27130,0,0,c4490445065b7236306d8e5dd6f2fab958cf07a25f60c7fbd1dbe30e4aa3f289,2025-04-01T20:26:11.547000 +CVE-2025-2713,0,1,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000 +CVE-2025-27130,0,1,a1dc5070cb706965f29565e1845bf948cc8ae12d305309227937d0f3062f821a,2025-04-01T20:26:11.547000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 -CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000 +CVE-2025-27135,0,1,18b756b185db8f6a3e686ba04233bef4575e5f6eea741bf969f9ab7ce5b7c6e4,2025-02-25T19:15:15.677000 CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27138,0,0,f93a81e98c7f0619090bb60c8631ae4325675fe349d6a0f2cc3e5a5561612019,2025-03-21T15:22:28.790000 @@ -287004,7 +287004,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75 CVE-2025-27146,0,0,c51f91ac720f699534057bee0b51fc55efae6c1d6306e8587f645f59e515f2c0,2025-03-04T20:43:22.367000 CVE-2025-27147,0,0,cc15abe63c8009f5954cdd7886ec7fb9c369870bd55cc8f200641b24b9796a6f,2025-03-27T16:45:46.410000 CVE-2025-27148,0,0,a02be6d0e91bf8eda3626965312087a36b8be8d291da209d00439f9926ccce17,2025-02-25T21:15:18.073000 -CVE-2025-27149,0,0,1be97c7e15784877e2bef668a914f3d4ac675e62094629e1303f6eea61028ee8,2025-04-01T20:26:22.890000 +CVE-2025-27149,0,1,35e8d664c459a8935f76aaca698b432e24375a15caf94501d1688ba43e19f71d,2025-04-01T20:26:22.890000 CVE-2025-2715,0,0,9b86d209899e100764be1390e15dd32c759d3c6ac90bee191f2f3abd07adc820,2025-03-27T16:45:46.410000 CVE-2025-27150,0,0,84e05225efa8e3530bf3e9b4d6d8cc0590f0913d7edd820f58c7a162101240ec,2025-03-04T17:15:18.663000 CVE-2025-27152,0,0,0648b2f50e1454bf7df312f45bec2e233def1fe7ff128aed2d0f80c1402a5bdd,2025-03-07T20:15:38.560000 @@ -287012,64 +287012,64 @@ CVE-2025-27154,0,0,59a4a086ef1258ece0b910e1577e4b7987c7956e7f1b00fe71f4c0cc12178 CVE-2025-27155,0,0,fe50098f1c1a4fccdc1685634a60bb1b96134199c7cebbbfad4a6dd5f2e55f84,2025-03-04T17:15:18.833000 CVE-2025-27156,0,0,33b6d9723415e694fa28b1d8626d7c8b8845f954a5d4bd5c78c2f38f267b7027,2025-03-04T17:15:18.997000 CVE-2025-27157,0,0,82eb8d36063536d774ee636a24e368a87d8a8dd12b6203e709015057d075f7b0,2025-02-27T17:15:16.867000 -CVE-2025-27158,0,0,d1cd1a509e4380ac053575a440fbded03978bb2bd5b3edb2236033d95baf1a19,2025-03-12T14:15:16.323000 -CVE-2025-27159,0,0,8217ebe12ea2c3dbd8bab2582584a688ba7b3015368442dcd8cf66336a91bb6c,2025-03-11T18:15:33.687000 +CVE-2025-27158,0,1,2daf76ea7143ce9001085757fd59198493288bb37595bf85a5e7bb6d4fe84b78,2025-03-12T14:15:16.323000 +CVE-2025-27159,0,1,3db0e4c3fea36d4fa0ef2ffb7fb2d91b899dcb7609c7b0f56f1a4ee8fd2a6c40,2025-03-11T18:15:33.687000 CVE-2025-2716,0,0,f8c9f0ebbf6d0ac30b41eddd3d7a725be3cb0aececcdcaa7340ba42ad349a071,2025-03-27T16:45:46.410000 -CVE-2025-27160,0,0,e37b68c31776e0f8712479d97b16910fd728f24c1478eb91327855ab6a2f35a4,2025-03-11T18:15:33.840000 -CVE-2025-27161,0,0,a60eb19ed2f6b60f78dfbab1422935ea6ece4313f76de265e43e2b0642961508,2025-03-11T18:15:33.993000 -CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e4992144181a,2025-03-11T18:15:34.150000 -CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000 -CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000 -CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000 +CVE-2025-27160,0,1,84305a86164264fceb1038c928fafdc7bf8351a49af860596c035ecb81762dac,2025-03-11T18:15:33.840000 +CVE-2025-27161,0,1,f7505a760a062033744e7f91be1ba50a283b25fbb89db6d6c16686f31048c066,2025-03-11T18:15:33.993000 +CVE-2025-27162,0,1,245925fcef8c38dbd546669f6506b868b3103bc30d3a27ffc3a2bd056f3d731d,2025-03-11T18:15:34.150000 +CVE-2025-27163,0,1,24a38a21285cea3feef97a96713cf54c32008a9b547be2d90db38786bb09fe58,2025-03-12T14:15:16.447000 +CVE-2025-27164,0,1,d5ec5e5e42f16214b7d177452cf1f4f95272e66f2f639d769bcf9818b26d51c9,2025-03-12T14:15:16.557000 +CVE-2025-27166,0,1,a77d97ca83ff5b7652b04b662ebc500d798985bb571f2c2d1fd55240ade5a9ec,2025-03-11T18:15:34.580000 CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 CVE-2025-27168,0,0,c854660c04ae74863042de804529bb7219f13c8265d2faffac9e2184be17e3fe,2025-03-31T20:06:08.030000 -CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000 +CVE-2025-27169,0,1,434a5f77144dfc1833eb8c9a6884bfbadc68cff15424ee166f5057c9c61a793e,2025-03-11T18:15:35.077000 CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000 CVE-2025-27170,0,0,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000 -CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000 -CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000 -CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000 -CVE-2025-27174,0,0,a5ca0cab754c0db03968c80c85555569331696fb9690c6f45e338d6094521e61,2025-03-11T18:15:35.600000 -CVE-2025-27175,0,0,8259fd83320beb279b4fa387360e71a437fb192c4a74c473bdfb61f939230b88,2025-03-11T18:15:35.743000 -CVE-2025-27176,0,0,afbd37cbba177da70d95d467762f8d9174914afec3408acc296cce19d812a90b,2025-03-11T18:15:35.897000 -CVE-2025-27177,0,0,e0a827a0ca79c792278c714ffc9ef1a88a58787c8247bf44eada3c8f5530d975,2025-03-11T18:15:36.047000 -CVE-2025-27178,0,0,c0d88664738e20e92964f976914afee130c9a89aa0dbea09624f6f217ab108b4,2025-03-11T18:15:36.200000 -CVE-2025-27179,0,0,e658b366f7a3b06f1476082709f4a4e62efd35013484c2cf080c38676d042480,2025-03-11T18:15:36.353000 -CVE-2025-27180,0,0,b19084cbc983aa321eeb856e49b47a1e72dbe787bf6a8284a3874ff61419d220,2025-03-11T21:15:42.463000 -CVE-2025-27181,0,0,a6a9ce63b284d6ceeb21e9a4def4af91dd2ed31fd65fd783300575a45140db01,2025-03-11T21:15:42.613000 -CVE-2025-27182,0,0,9a0018a7c401d663847bab9f724eb9d94471e314e9a4e7cd8c4a002a6104d94d,2025-04-09T20:03:01.577000 -CVE-2025-27183,0,0,156529aa2d2408dae4d14c301f1f92b62510b7daf0a62b75a4fd401ca8f1206f,2025-04-09T20:03:01.577000 -CVE-2025-27184,0,0,0357a627f83b2cb53b237ef03be46a7bbd5756699fe0977095210526a04ae341,2025-04-09T20:03:01.577000 -CVE-2025-27185,0,0,757d8348acc6bf33fce2a45006312bfe5c9cb5d5e50dd2d4cdd3b046754ad909,2025-04-09T20:03:01.577000 -CVE-2025-27186,0,0,d6a7c36938fb0ec4547234bdf8014d1fb8e1b54a259eba5484aa67f02804784f,2025-04-09T20:03:01.577000 -CVE-2025-27187,0,0,2f2178a3ade147e716c21308d74312136a08dde9070b126b8be0d8e574002614,2025-04-09T20:03:01.577000 +CVE-2025-27171,0,1,c7cddc4600c8f7700a3b1290b96266106553920da50b623fc04dd64f8761bba1,2025-03-11T18:15:35.377000 +CVE-2025-27172,0,1,01bf953941621cac77f2041b0421fcceb11552687cbcf857082ae028a23af4aa,2025-03-11T17:16:44.420000 +CVE-2025-27173,0,1,c9e2993309e45fd14ee6be40d8e01bb17a54e6eb4477b5bdf7f506d704ba7a78,2025-03-11T21:15:42.307000 +CVE-2025-27174,0,1,7ee5439b80bea2be02d60665a8a6f02e6182e2d8233d20944e112423989b3b1d,2025-03-11T18:15:35.600000 +CVE-2025-27175,0,1,2ed420f979005c7cd4792714feaee343d769a86fced5860fd76d1f42eeb6a18f,2025-03-11T18:15:35.743000 +CVE-2025-27176,0,1,d1712a1e0bca0af1abae109951a83cc1173640e77c80ac54d511eb9d80d87103,2025-03-11T18:15:35.897000 +CVE-2025-27177,0,1,15cf059776be9ea8e9e76708f75d13ff1357b63c3eedb7a3f0acc3f5e9a46ff3,2025-03-11T18:15:36.047000 +CVE-2025-27178,0,1,4bc8009459c3f894a5d755c0253f508e64a5069912e1df02303532b791e0c208,2025-03-11T18:15:36.200000 +CVE-2025-27179,0,1,41d17946ed77b2ce4cbbdfb5344570ad40435516e750f79f8794c0c913ccc3f4,2025-03-11T18:15:36.353000 +CVE-2025-27180,0,1,a01617ae3a62f07e2d8732a626240eb9ebf587e5b99b46b7e0e2b79f46184c4c,2025-03-11T21:15:42.463000 +CVE-2025-27181,0,1,b8435bb9301d543aa4406b3079b9eb8e218c3a7fdfaba6aa1976d352c0657b66,2025-03-11T21:15:42.613000 +CVE-2025-27182,0,1,0f73d4eb979126d966418d5d6edaee3be94fc1205e71b47e2495b3f6cb02e690,2025-04-09T20:03:01.577000 +CVE-2025-27183,0,1,b74c95e5fa419c39a9cceea3c18d27cebd300cdfb9534a70ac2fe614d651975c,2025-04-09T20:03:01.577000 +CVE-2025-27184,0,1,346ace0140594945de7a8bfba21fac15b1dab00aa4674bddcced36c030cba927,2025-04-09T20:03:01.577000 +CVE-2025-27185,0,1,036c792bfe7959bfd76bb840bb0e15c51720fd7476ea5a264a9ca9d13c58d234,2025-04-09T20:03:01.577000 +CVE-2025-27186,0,1,6f228265b5f135a725b23f9da9960f8947c5143ffa5a0546fc446632d07b0eb7,2025-04-09T20:03:01.577000 +CVE-2025-27187,0,1,fe66b417152b454fda4607dd59601789dc64804837f1704f0ee024ec129545f6,2025-04-09T20:03:01.577000 CVE-2025-27188,0,0,baa6d648ba130d0422b128128ac53208274c7a4970470bcc5c21647e49f01681,2025-04-09T20:02:41.860000 CVE-2025-27189,0,0,7eec0359c6679ce6079037456ad2495fd960bf0ce3f801d85bafe5fc2dfe17a7,2025-04-09T20:02:41.860000 CVE-2025-2719,0,0,aab61dbd321f094053bdc03116bddf17d81ea49d4be45c3ea7db49b33c86fb71,2025-04-11T15:39:52.920000 CVE-2025-27190,0,0,f6f93c1a2aea709128307aab4dd8f7522a1d7f29cb3bdc0326949ea46ad2467a,2025-04-09T20:02:41.860000 CVE-2025-27191,0,0,4f5df9b8c88675a85a7e789e6b2d5ccdb0b9a9567f661f6a44fa4181c1411c1b,2025-04-09T20:02:41.860000 CVE-2025-27192,0,0,1b90b1b7a7ab4ed5119a3d35c794c4de9f8c839b7d2d708b8887e2e334fefdec,2025-04-09T20:02:41.860000 -CVE-2025-27193,0,0,1c6467db70afee0ba0b1c16935cbba3ef88a48465cb8e4a7489a8eecadb821d9,2025-04-09T20:03:01.577000 -CVE-2025-27194,0,0,86819959362a66ee53ebc7ad045568aeb6167d45c02eacba6eb4c16ffb78445e,2025-04-09T20:03:01.577000 -CVE-2025-27195,0,0,df8dfa03cce0522ebfd67bfb4a9d97c208f09c37ca77ad0fd4de691c33143d9e,2025-04-09T20:03:01.577000 -CVE-2025-27196,0,0,b846178b4e60bbb6013c32a4ad63c39e6c33b6564064379338f554d5e8a5a686,2025-04-09T20:03:01.577000 -CVE-2025-27198,0,0,ca73baf97a9b98bbe2527eb71d2355d7b51c443371d672042021cf35626dce22,2025-04-09T20:03:01.577000 -CVE-2025-27199,0,0,85b84a9fa90465e2fc71b13db246a28a071583a25d0a669599e2332978852461,2025-04-09T20:03:01.577000 +CVE-2025-27193,0,1,e69363d5186759218bf6c5f6919e32fbfcb07d148c03d2ef80830b89aacdcacf,2025-04-09T20:03:01.577000 +CVE-2025-27194,0,1,918eaefa92c0b94016ebc0d940932ac8cb3482b0a503e90f4b0ff010ce2a974c,2025-04-09T20:03:01.577000 +CVE-2025-27195,0,1,4549478bc6432f9095282d42652535f9bbfb354b15bd5c75967eb55df6fc972c,2025-04-09T20:03:01.577000 +CVE-2025-27196,0,1,e14843dd06ca24ca1a983fe1d4a83cece79a6288f65cb2d09fcbe44893e0cbe3,2025-04-09T20:03:01.577000 +CVE-2025-27198,0,1,9a5d2357770f80005d36abe26d2cc6d5bc888484faf8cdfc049abf6065f82799,2025-04-09T20:03:01.577000 +CVE-2025-27199,0,1,dc1eae193bcecf1ff669540b48c6b48023b42e344facb3a7094db2db815d8443,2025-04-09T20:03:01.577000 CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12cab,2025-03-27T06:15:29.720000 -CVE-2025-27200,0,0,085b07f58fcc3e1216958b3f62bed1ea807a373abda05fac0395e43392c885b1,2025-04-09T20:03:01.577000 -CVE-2025-27201,0,0,ffec04546aa387918ee8c08545976c44acb3d07f9ca4daf3c12dc56f6c9cf4e5,2025-04-09T20:03:01.577000 -CVE-2025-27202,0,0,15e42be57076f0c1c9e404b9d3e1eb44e57b9a0731ae2e7b76d325140409e3fd,2025-04-09T20:03:01.577000 -CVE-2025-27204,0,0,230cdca7659c7add4aa1499d41b0ba309b9657b79a6741a35671dae997a9f3aa,2025-04-09T20:03:01.577000 -CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 +CVE-2025-27200,0,1,da512c28854d13b5d1c87ef0331923ee9d98d56b30ef9634b0c3b1b6fdcd6d2c,2025-04-09T20:03:01.577000 +CVE-2025-27201,0,1,8e3fb4d1eb4312acf7eabf89845524f192d5daf8b495231adf9deb1f2b27c1f1,2025-04-09T20:03:01.577000 +CVE-2025-27202,0,1,3afe864ef4ea2b1a40d8c76a51773e2db54db4c49199c421d1f598f2ce15ffcb,2025-04-09T20:03:01.577000 +CVE-2025-27204,0,1,7e1c1cebec36883e6260052d92a94bff71f11da81fb3f501354230151d6a74e0,2025-04-09T20:03:01.577000 +CVE-2025-27205,0,1,622fc600a5f2cc0012bd82d989d2a6b6005bac37857e576b9cccf13c1f678ff5,2025-04-09T20:03:01.577000 CVE-2025-2721,0,0,0ea4b131912f1c1068f18b233bf30f3ee27e9289a3b0d0502eb3374bc8db710c,2025-03-27T16:45:46.410000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 -CVE-2025-27219,0,0,daf263bc5dc335c24b10a63de4b30bc2cd803d7c7b13164f0156e1db3a4313a5,2025-03-05T14:08:20.493000 +CVE-2025-27219,0,1,461867c9c6ad1aeffed9a753c37dda365d03d66745eecef158a52cad45739e4c,2025-03-05T14:08:20.493000 CVE-2025-2722,0,0,0f942aa071c60c05bd38382b50dbeab8161f377c2e00676934f8c9ec9faae5d0,2025-03-27T16:45:46.410000 -CVE-2025-27220,0,0,e5fae4b98ca62e096f6d20d7f99647f190b45376624f11e0f6dbd661df523352,2025-03-05T14:58:14.463000 -CVE-2025-27221,0,0,bd575e135810e32dc670f036e8c3abfa23275c9e4b932c5ac7961776f844fa1e,2025-03-05T14:58:05.300000 +CVE-2025-27220,0,1,50b11b5fd40edf0e7c742f21d8cc3faaa1a9293941d08bd7591ca6c39e27baac,2025-03-05T14:58:14.463000 +CVE-2025-27221,0,1,49e7be9560dc9cc77f297711484d4ecb5ba5b672bef56754e4d2d3990afad938,2025-03-05T14:58:05.300000 CVE-2025-2723,0,0,33219c456b6b543ae3e06cc1d92a1fbf673804c48ab14f5fe326a9768e4e03ae,2025-03-27T16:45:46.410000 CVE-2025-2724,0,0,a1e858381d122e680ca5e3a58ec5dd1478b56716ff45316fb532144f509919a7,2025-03-27T16:45:46.410000 -CVE-2025-27244,0,0,4873cd4e6e99981686c6769d52c2425f4f8eaea9674a2855c6aaae272af1de80,2025-04-02T14:58:07.527000 +CVE-2025-27244,0,1,86fab9c76c6855c3f65d6fe655fad17ea7f4d78587bc5a57db26b5cf4b92bc76,2025-04-02T14:58:07.527000 CVE-2025-2725,0,0,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 CVE-2025-27254,0,0,1326449cb688d3d742c54aa7c26671bc1a30e863cdbd3bd942083e3395c678b9,2025-03-12T12:15:14.767000 @@ -287158,7 +287158,7 @@ CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 CVE-2025-2738,0,0,e698101b4b8baa5b6d74722f9a5a2fd56a7a9ed4b926613e8c3fa693afa80c00,2025-03-27T16:45:46.410000 CVE-2025-2739,0,0,f4fbf6446ec2451df539fdc2165d89cda075d9eb4f1c2bfad7a40ecffa8d5b9b,2025-03-27T16:45:46.410000 -CVE-2025-27391,0,0,51ec893078ad96b2765d588201010c9c9109efe11c8b8e02a7e4455cccf4d677,2025-04-09T20:02:41.860000 +CVE-2025-27391,0,1,c782f9b884022f97c5a60c69190305dd5a13fa0bd9d3036dcc826fa9cec725bc,2025-04-09T20:02:41.860000 CVE-2025-27392,0,0,cc38f618c321afe34df80e0445ec795fd7a44f59e46f89b97dcd3422fa99fedc,2025-03-11T10:15:18.203000 CVE-2025-27393,0,0,9aa4954cdfb55771c6329747743598efb01c901ba627d142c3f74e9781c72c00,2025-03-11T10:15:18.367000 CVE-2025-27394,0,0,9ab042095b67e26d5f13118419be8527351f12f98ad54081c1d99788c408220c,2025-03-11T10:15:18.530000 @@ -287177,10 +287177,10 @@ CVE-2025-27405,0,0,663163c6c073b18f53346712329739a975081e88ca8125075a565c094735c CVE-2025-27406,0,0,16d66ed71bcc122eca2801ed1c57d9068f62c5d5532697159291cafa7e5c3495,2025-03-27T16:45:27.850000 CVE-2025-27407,0,0,1d15654ef204c91cd32beae5fe1b20af01b3f98dc702fb1b2edea51c8a7ee1cf,2025-03-12T21:15:42.560000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 -CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 +CVE-2025-27410,0,1,b0303a9d6ae285d344bd4b183e09e6249db13662c4d6a0c2adf257bc94d8b72c,2025-03-04T21:15:14.197000 CVE-2025-27411,0,0,0a8c61754ca17a315a8d6c0a67146f15c92b522c31bf75cc818698eafa246ea6,2025-03-05T16:15:40.310000 CVE-2025-27412,0,0,d9bbfd830ce3a327538dfaf425c1c45f17af21af968a5c50b137821ea628ebef,2025-03-05T16:15:40.457000 -CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000 +CVE-2025-27413,0,1,3c6df10a4b674de018ae1676213c837633b3564b1055cc75094dfe9454f1a444,2025-03-04T21:15:14.303000 CVE-2025-27414,0,0,929fb75122881174d77a5f272353ca474f8f31f3e2150b8f4eb15693c5e1bce0,2025-02-28T21:15:27.957000 CVE-2025-27415,0,0,5c13e45a51ec2cff72537e412ce1ec86fb678a4cb1991d54966cfc60572ae3df,2025-03-19T19:15:47.257000 CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193dd23,2025-03-01T01:15:28.857000 @@ -287211,36 +287211,36 @@ CVE-2025-27438,0,0,aa271b66950b27900a45ff14fb7ffa30a34f109c554f6e3ef42a2a6604aa6 CVE-2025-27439,0,0,0adb16bdd8175e50b2012f79d28e4b0f799da16ee6499b9aa741287f255e0365,2025-03-11T18:15:36.510000 CVE-2025-2744,0,0,70019c1a1354272236c9eec45caf986c8b60cd8d3eddcfb250ce564a0fe4e958,2025-03-27T16:45:46.410000 CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b7ff,2025-03-11T18:15:36.653000 -CVE-2025-27441,0,0,e155e14530b453f75d9ce639c083535c2bb462e7677c02675b54cdb7ec5e7718,2025-04-08T18:13:53.347000 -CVE-2025-27442,0,0,590a31d2a85410cb452a92fc071cc7f6866652e66bdb0d80e7251943914c9c3a,2025-04-08T18:13:53.347000 -CVE-2025-27443,0,0,7a8323fcf0a74c428934ea50aee57123e3ecf5387592ae2d2dd2c1570929e5e1,2025-04-08T18:13:53.347000 +CVE-2025-27441,0,1,79018b3b06a9e1f169848e8cfe5684a88b8ec611e0eecb9ae49cfed5e1cd7b23,2025-04-08T18:13:53.347000 +CVE-2025-27442,0,1,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501ed9,2025-04-08T18:13:53.347000 +CVE-2025-27443,0,1,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 CVE-2025-27467,0,0,0c83d15f349a0c2ee4cd72c18303288b3acc7a4b4d1a795b62e6a6399b0170d9,2025-04-09T20:03:01.577000 -CVE-2025-27469,0,0,bed20682aee07ef1b7310c6dcffff7cc5f1e3058869f1609d535c9a192c72a66,2025-04-09T20:03:01.577000 +CVE-2025-27469,0,1,d1791d98ff61ccd8817317ee4f085d2157d176aee03e5478506034a9cd36c6cd,2025-04-09T20:03:01.577000 CVE-2025-2747,0,0,893662fb5676d31ead9a58cd136c261bd2570bf64bfceca741f28b6354fadd24,2025-03-27T16:45:46.410000 CVE-2025-27470,0,0,3800bbe10c96b480c90080e79a37b2229e291f5eb4bce8a97b80e5b13f9a0963,2025-04-09T20:03:01.577000 -CVE-2025-27471,0,0,13072022a547229c3b677139d51e391ce1b949ccd931da8e4b15e19e9c7c970a,2025-04-09T20:03:01.577000 -CVE-2025-27472,0,0,d559df44c44a28ba90971f35753e49e8f7a519082e101f64fcc43c66453a1da0,2025-04-09T20:03:01.577000 -CVE-2025-27473,0,0,42f9462fe686194aca78a5852ebded71702545e7a0d8673a5d185bdb28af5dc4,2025-04-09T20:03:01.577000 +CVE-2025-27471,0,1,28fe5f64a711690e15089c807c9550677b501bc0e61e9b4cd7ce6c953f368c4c,2025-04-09T20:03:01.577000 +CVE-2025-27472,0,1,2002324e5149345027687866c507ded8554757848a98f83b4d130b7d4c85a3b8,2025-04-09T20:03:01.577000 +CVE-2025-27473,0,1,33a6721b524bfef93bb35d73e4d6226005c4421e86ba2cdfdad0b698e7f68811,2025-04-09T20:03:01.577000 CVE-2025-27474,0,0,2833f6b89f965b4bcd9da5e49fe97abc2b431bf0e9a6e40d5561ec37f340b5d6,2025-04-09T20:03:01.577000 CVE-2025-27475,0,0,d16ede5877fb26d619fea7813bc64130a43e57631002878595ca841636a1f17e,2025-04-09T20:03:01.577000 CVE-2025-27476,0,0,454068016f0873c4cca41e8b5d04e83044924845cc514c34594f75338e99d436,2025-04-09T20:03:01.577000 -CVE-2025-27477,0,0,70c26b14c509efa3136635d966613a0d21a26c7dc40726fd73ab6c80f40b7e57,2025-04-09T20:03:01.577000 -CVE-2025-27478,0,0,e58f71fa57a5c99eaa6fe567f305e37a93cf63b8ca60b0c8f3482cb2647528ab,2025-04-09T20:03:01.577000 +CVE-2025-27477,0,1,23bf8942cc7cc01df5ba1f14ae73cb3688b358ae32a41c91fbbec5ee354ac27a,2025-04-09T20:03:01.577000 +CVE-2025-27478,0,1,0dd7c610dadea8bb93d079e81c3f9f3c8ee5bd7a7c541ed90797bd6b84ef3808,2025-04-09T20:03:01.577000 CVE-2025-27479,0,0,3e6e52ce7e3d7c72cca1e8ac895770374d39acfa95f8e568191933f853eef11f,2025-04-09T20:03:01.577000 CVE-2025-2748,0,0,ebc7389a6b5f06bc936b869752f476de54bd76de60953f756ced1aea5c0e21b8,2025-03-27T16:45:46.410000 CVE-2025-27480,0,0,3093c5335e72e9e4458eb72ac17c60113d2e73a474a683fea8d7c7ebec2fc321,2025-04-09T20:03:01.577000 -CVE-2025-27481,0,0,ab40f24b2abf208c093f5ed2bc53497fa191d7740eb13343ef2311459f137934,2025-04-09T20:03:01.577000 +CVE-2025-27481,0,1,118797980076a42803281d69e86459a8b752d9f0308022ee10276f4109105186,2025-04-09T20:03:01.577000 CVE-2025-27482,0,0,eeadc8f44d6900c1c196e62ed08751291bde337d7b628582bfb1c86d07f701f1,2025-04-09T20:03:01.577000 -CVE-2025-27483,0,0,445caf10e469d992e30a4241855f5d7061296494b9c30a9352a2bccdd5a4c604,2025-04-09T20:03:01.577000 -CVE-2025-27484,0,0,b254e6a442655570c8fde991a4de00a7961c5fcb6dd3c4c1136d72ccb6665198,2025-04-09T20:03:01.577000 +CVE-2025-27483,0,1,04c995ffbd013c045a288b4b09e37803a82290935b3950580083fbf43e23ff8a,2025-04-09T20:03:01.577000 +CVE-2025-27484,0,1,a8bf6a25cecb5577f37a2059addcbea2f2e0705b413f48d577422c3867193d5a,2025-04-09T20:03:01.577000 CVE-2025-27485,0,0,044826a19f762371123a08406ad54036aaf892c48732a1963bfbde0681d9a976,2025-04-09T20:03:01.577000 CVE-2025-27486,0,0,1263aa156e67c1d79b6e587e7524ab2caf3a3397b80cc47b927307575fecf665,2025-04-09T20:03:01.577000 -CVE-2025-27487,0,0,d83e11e05698db1fe4d133b74a1e7fdc677087eeb3e9c79dbd527cbddf59f368,2025-04-09T20:03:01.577000 +CVE-2025-27487,0,1,827c957c592a16708b41207d011770e8ba33f577f5e1cb94d87982488a6ab408,2025-04-09T20:03:01.577000 CVE-2025-27489,0,0,28dda0e4c6352bd72172506c3087a8017f1e9fba98fa4abf48f4b96de0376b08,2025-04-09T20:03:01.577000 CVE-2025-2749,0,0,d5c23d9cde9d80aa1fbed3bbb517b5bdbcccd79985234132ec9559d4ffa36ca1,2025-03-27T16:45:46.410000 CVE-2025-27490,0,0,c9b6c6781302f2a316899f9d8c404e7c1e1a420eb4491862c0d80f8cb89106fe,2025-04-09T20:03:01.577000 -CVE-2025-27491,0,0,42207f08b9f43730a3ba68d7245ccb1e519073a6528b5235828ca72f52b41fb2,2025-04-09T20:03:01.577000 +CVE-2025-27491,0,1,3749b4d88a6f392e6062249a115d9dcbc07d3cbf28ad2e55478d593438836fc2,2025-04-09T20:03:01.577000 CVE-2025-27492,0,0,cedcb022f666c23b919557da854f2a160b90ab6b67af51845d3774e6e383059b,2025-04-09T20:03:01.577000 CVE-2025-27493,0,0,5ed706f73f968eaed2a73fc0af7fc79cff24d7e3704ee418b1a94e6ee4caf2fe,2025-03-11T10:15:19.577000 CVE-2025-27494,0,0,629ff8926515d0723828ad76be68973f23d7843531167cb70ca06bf9d4ea120e,2025-03-11T10:15:19.783000 @@ -287250,7 +287250,7 @@ CVE-2025-27498,0,0,7cb66b0e34a52fccf99fcea1075b68d5f7e08d30f7f5bc4fcc53c0689130d CVE-2025-27499,0,0,5f67388884f61cbdff1996d64d628e46709b8560c17359d456ecd050bc05a679,2025-03-06T12:26:32.607000 CVE-2025-2750,0,0,c19d6566d6ac381dc800cb326b33126bef2813593a7d245f0fa739c6c3b30888,2025-03-27T16:45:46.410000 CVE-2025-27500,0,0,86395c642c95ea913b918c9cd4b508655a7fe40b1107839113b18708952581b3,2025-03-05T20:30:38.860000 -CVE-2025-27501,0,0,fe43d553fd2a0bea6e473eff498e72d409b5df6cf90a7412dab8463d58fd0323,2025-03-05T20:24:50.943000 +CVE-2025-27501,0,1,290f5c2ce603a8f2cd0e37cdbd1a8d8029f419e1448b17f8a3ba489c23e1d38b,2025-03-05T20:24:50.943000 CVE-2025-27506,0,0,32b11c29187a961e8c53dd6e270016dcdaaf49f193aef3211b78316072c8bd71,2025-03-06T19:15:27.833000 CVE-2025-27507,0,0,f102904d74ef14427d4091398f7ee4e6c4c616cd5703ded2fd821f8eb925d7b3,2025-03-04T17:15:20.360000 CVE-2025-27508,0,0,f715817c4f100acb64f230b192c6c7e1e45a0a1b5dc8999db4503d2d4c79106a,2025-03-07T18:15:48.033000 @@ -287266,7 +287266,7 @@ CVE-2025-27518,0,0,33c2ec7c1e9790b801dd04e89fd77042adb014555e9a900add53790edfc9f CVE-2025-27519,0,0,ccdb73c39ee93a016094b17abcf363c0c91c0cb8a87d6bd768900a706722d9f7,2025-03-07T16:15:39.623000 CVE-2025-2752,0,0,2f419f61cff45431dc494e5de187ba8801ef12bb80b36cdd91ab6ec55e9d9f14,2025-03-27T16:45:46.410000 CVE-2025-27520,0,0,eb3d510e2ec71b4e6facfc8b91a612963b703d70470ba5885965b0fab915d40f,2025-04-07T14:18:15.560000 -CVE-2025-27521,0,0,238fcbb4ddab85c97db2ebf1a5930f855cf28b2ad902f1b11a70a00fedb1566e,2025-03-05T14:00:54.577000 +CVE-2025-27521,0,1,3b64245e66b6009e2ff156d542cd7e2067920fb3d6a5d36cfbeb94f5872a522c,2025-03-05T14:00:54.577000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 CVE-2025-2754,0,0,f7d4984908c96f676bcc9696fea1364d56b7dcb9a4ef8bc0bc9ea457aff5131e,2025-03-27T16:45:46.410000 @@ -287275,15 +287275,15 @@ CVE-2025-27551,0,0,890a9d15888394805e7115ba9f385ec1edb3ecaa955cb3e5783dec5931afc CVE-2025-27552,0,0,b02fb83f84d6fa40109d8c3d390f81c9ba4746f16b860b0cf70e00d014f22ea4,2025-03-27T16:45:27.850000 CVE-2025-27553,0,0,3fdfc758e50a10792399f2278b5d552e3c4d38453307aaa115f95e5d1b805dd9,2025-04-02T22:15:19.203000 CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000 -CVE-2025-27556,0,0,562811b08adacc42cabb37b762c745fbc71f48d99db4320bc8297b82ed37f470,2025-04-02T22:15:19.367000 +CVE-2025-27556,0,1,4ca86b14fb70d2b656f3535be9cca045a182add78643be3ce819c6025668a902,2025-04-02T22:15:19.367000 CVE-2025-2756,0,0,092a25b42b3189a59251afe4527fb8569dc69374ff038cad349569e68ebf3853,2025-03-27T16:45:46.410000 -CVE-2025-27567,0,0,3a71212458550f49ef384833e198fe185120211480b67c75483eaf87bef0ae86,2025-03-28T18:11:40.180000 +CVE-2025-27567,0,1,8ca9b74c3e219a4d15e6ee8281f7f16769702266f24ed34aea1ada953bbf2d6a,2025-03-28T18:11:40.180000 CVE-2025-2757,0,0,7bd39bef42ca34fb5d12792b895089cd6318ba18d4fbf0374c2916e645d3eab2,2025-03-27T16:45:46.410000 -CVE-2025-27574,0,0,e66d1a4b9be531d10078d725e7a5a8d30b13961529fdc9d0fd6f9093fcb432fb,2025-03-28T18:11:40.180000 +CVE-2025-27574,0,1,93f87063722ae1c1814b2d9c92899de9d571237b060b0430e67ac3aa4baec2c6,2025-03-28T18:11:40.180000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 -CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 -CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 +CVE-2025-27584,0,1,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000 +CVE-2025-27585,0,1,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000 CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000 CVE-2025-27593,0,0,ce5349a8322edbd13db7095e7159b1223dfa0ef4b6ca83b9170ad60af496b2cc,2025-03-14T13:15:40.437000 @@ -287301,7 +287301,7 @@ CVE-2025-27607,0,0,569ba6b4b476b3c7d68fc216386565d746cd386dd59aa4767215c6640faf1 CVE-2025-27608,0,0,2284e96ab28a2f631653047894dfe881a6801fa943e57d0a4e39857d8e1e8e28,2025-04-07T14:18:34.453000 CVE-2025-27609,0,0,f8a792c964f3623d19db6bed142b398280894928269cf7cbef0112f6cf756295,2025-03-27T16:45:27.850000 CVE-2025-27610,0,0,02e5a8eb0528d0cce96068c7b42e3131adc333a34b3a03a8ef67635103e56866,2025-03-10T23:15:35.073000 -CVE-2025-27612,0,0,6362bd3b3f6ec21b5002fffbd2c5ff9cd1b7ba3cf33fe74d420676d033595133,2025-03-21T15:15:42.153000 +CVE-2025-27612,0,1,7f8af3720e3f01212e0dbd3fb764928c090b654fb0bce1534d68d69b3c5c051a,2025-03-21T15:15:42.153000 CVE-2025-27615,0,0,dffb5f3398f09a513420b3be1d64f06c647ff90a89a35bcb5178bc8bdf5ab6a4,2025-03-10T19:15:40.917000 CVE-2025-27616,0,0,aa85adc195b5955511bb21f9cfe98ae7538d310a0fced9a0aeaaa4a683a54ec6,2025-03-10T19:15:41.080000 CVE-2025-27617,0,0,301ffaccadc2ce8c8d5bb86b9b969df111c43a03b8d988cca8ae24179376e48c,2025-03-11T16:15:18.310000 @@ -287362,34 +287362,34 @@ CVE-2025-27682,0,0,acd6c67e664dc1bc9d69e63cd32be98e4f3763093909eddcf0e64bd0029c2 CVE-2025-27683,0,0,7e20c72afe8c88bc84d73e31c2ba29fb18f4a737228bf1bf47c1090223f9e244,2025-04-01T20:45:09.113000 CVE-2025-27684,0,0,240682932b2a460f603a664c7d08c6697d3ad68db39d84d7af33037bb7ea91b8,2025-04-01T20:45:03.630000 CVE-2025-27685,0,0,f1cd2113ab987f8aa8854222629b62161d79f2c62b06433ec39fa30503650db2,2025-04-01T20:44:56.343000 -CVE-2025-27686,0,0,635054223b0053353c230dc9d9e43223ab0f82ff6e550632be15716e5de0310b,2025-04-07T14:17:50.220000 +CVE-2025-27686,0,1,c902be8a38869c709d683c1f6f95437d232f7946bc7c27df15bcad9b25ec1a54,2025-04-07T14:17:50.220000 CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000 CVE-2025-27690,0,0,b55f01e891831f4bb19e229eda29765c67f4ce54604f95f0254b8a0eaf292fe4,2025-04-11T15:40:10.277000 -CVE-2025-27692,0,0,1dbf11e4211dccb6352d5d29bb123fafd55385761259fd27d49ab92a879f0c91,2025-04-02T14:58:07.527000 -CVE-2025-27693,0,0,16d105cbb32fb801d6cf5e5dfc90ae8e01c7128a7f6a55fef4f354062bf75d26,2025-04-02T14:58:07.527000 -CVE-2025-27694,0,0,869d06c60976454eaafaca8c8a4d8339219d8edd8cae5f4fb37b5a87fc50e33e,2025-04-02T14:58:07.527000 +CVE-2025-27692,0,1,f070362bc0ac00ebc50fee353a797d3e513adb7ab533f74c668198fcd82abc8f,2025-04-02T14:58:07.527000 +CVE-2025-27693,0,1,3897b287e81e1817df327f27f7c98ff45a0348a1a3b12089ac7c683686e6b08f,2025-04-02T14:58:07.527000 +CVE-2025-27694,0,1,230d9467fa857b7c7d1d3219879622b4e623efe8af24bf79554787b308e217a1,2025-04-02T14:58:07.527000 CVE-2025-27704,0,0,86d6df9596e1ab01bb839e39075597fb6abcd0e8a7145e06c224ef11d5c72693,2025-03-19T19:15:47.390000 CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c3ea,2025-03-19T20:15:19.727000 CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 -CVE-2025-27716,0,0,684e5dfa71a2b1140f79e97b358f07ed099609c7dc59a57e04c089cfb53857e0,2025-03-28T18:11:40.180000 -CVE-2025-27718,0,0,4ae0e44d09876a5600bf40aeaeaa3445f632ff2369ef793f3100dbaf36c9c477,2025-03-28T18:11:40.180000 +CVE-2025-27716,0,1,65bcc3c5b3482c33d19a88cecf33eda0c46f0e6a542313f4127f96639786d02e,2025-03-28T18:11:40.180000 +CVE-2025-27718,0,1,89353bf3b85d5d2d9beda4c3f569d21a69be548f857d5ad779be46bb63a2d115,2025-03-28T18:11:40.180000 CVE-2025-27722,0,0,f6643ccc8a22899781482acbc064cbbf83bedfd8a0b28b0db307e860db0ae57e,2025-04-09T20:02:41.860000 -CVE-2025-27726,0,0,8759c60319914b023e036c6f48a1b79eaac43e1e5a04e8c34d49c277a3332a2f,2025-03-28T18:11:40.180000 -CVE-2025-27727,0,0,ace0dbfaf7d62ac7114b966d38f259a202ac7d9348cc93b7e5830be1c42d839e,2025-04-09T20:03:01.577000 +CVE-2025-27726,0,1,38a1ac46d0efea1df2b1e49f61f22cd8b30134b3fdb6141c216328e096cf40e0,2025-03-28T18:11:40.180000 +CVE-2025-27727,0,1,789a1c04ba58a25a6855558607527be4357ba246f22824b45c569b071597e135,2025-04-09T20:03:01.577000 CVE-2025-27728,0,0,585d476f3080c8982f04eae65d3c7745d633b97127b70275f888b0823c17edaf,2025-04-09T20:03:01.577000 CVE-2025-27729,0,0,48c86e51194852cc95bab4f1195e7a1e6a0c40c3f65e09109ba84aa16aa26e5d,2025-04-09T20:03:01.577000 CVE-2025-27730,0,0,e35156ed20d3fc0e0cb566da7135be514c1aab293f066aeebbd8d332e0407738,2025-04-09T20:03:01.577000 CVE-2025-27731,0,0,ec6c464a7d6e280cf0255b38b45365cc3d9aa944cc917b5654fa74e9156599ee,2025-04-09T20:03:01.577000 -CVE-2025-27732,0,0,11a4c7424f152e04122a4727dbfc0cc8a454e8b3b05f9bcb3a635b72cd73a93e,2025-04-09T20:03:01.577000 -CVE-2025-27733,0,0,cfae540c4f2210cf8d0c18a49f793db264f2d551ab5f3bbc065d2b6782fce4c3,2025-04-09T20:03:01.577000 -CVE-2025-27735,0,0,804e51d770563f60dff2b5a9d99658f26aa741b1fc549464420d80120b7b211f,2025-04-09T20:03:01.577000 +CVE-2025-27732,0,1,0aaa1ac148b3bb4a6c5552fe243e86b41e2ea98012ab53a2be06868dfe47ec88,2025-04-09T20:03:01.577000 +CVE-2025-27733,0,1,908a3359e067d5d5f9f9a37393d2ad60ad4ae152dd919caeac44fd2964090a81,2025-04-09T20:03:01.577000 +CVE-2025-27735,0,1,5d73b49fb32e0189ee038d45709d87e790d57332a01feab7735998204f9d2f34,2025-04-09T20:03:01.577000 CVE-2025-27736,0,0,08b706df064ba618da614660397b0a68d5806a0f9a7d511d5f5ef50140c8fac8,2025-04-09T20:03:01.577000 -CVE-2025-27737,0,0,24dde5ed60c2a1f6fdb3652ea338ed6523f7547545e3622835dd811b668a7426,2025-04-09T20:03:01.577000 -CVE-2025-27738,0,0,6a2575f520b6cbeed35d52aa3274dd734c9323de6d21664915c30ed4d33bafe9,2025-04-09T20:03:01.577000 +CVE-2025-27737,0,1,afd49b10ed0a913d3ea149b90e49931b7088e9fa28cb7882be2f462ec9328c29,2025-04-09T20:03:01.577000 +CVE-2025-27738,0,1,56dfe08bcb3390d6fd15e3ac8a930b072baa6812cf080aaad43d63e5709fae80,2025-04-09T20:03:01.577000 CVE-2025-27739,0,0,c7188cd4f761d2658b6bc7984a8f4fc5088ec3c350c66fb4deab595a8e3d0dfb,2025-04-09T20:03:01.577000 CVE-2025-27740,0,0,02943d50518cac06f3d2fc3aa3158726a277bbc175a207c510a45edb000c093a,2025-04-09T20:03:01.577000 -CVE-2025-27741,0,0,572272ddee1a66cc15a35c91d7f0f1c758fa616f08526965258c6e01bc9e3ff5,2025-04-09T20:03:01.577000 -CVE-2025-27742,0,0,3546a40b0303f6ae01700fe7e6162aa3ad7d368b43afefb224c08f69771c687c,2025-04-09T20:03:01.577000 +CVE-2025-27741,0,1,2fd6770c01e26887e1dc5c98bc5521d45043f97cdc757266aec6e399e7b4c0dc,2025-04-09T20:03:01.577000 +CVE-2025-27742,0,1,3f9c1034f66eb069df84762613da6dd26c12de6ec631957051b0e1b3a31fd124,2025-04-09T20:03:01.577000 CVE-2025-27743,0,0,bde72064051c30b9a8fc324440ed5b5a7288d247bb00e0a72fc2fbedb20bc74f,2025-04-09T20:03:01.577000 CVE-2025-27744,0,0,c0d800b51d30bb77fa8a69f483920d468590b52dab2ac1044694dd2bbad504ed,2025-04-09T20:03:01.577000 CVE-2025-27745,0,0,6c364298b8ce8f9113300768337f972bf6271badc066cfd4788660c4df54885a,2025-04-09T20:03:01.577000 @@ -287426,9 +287426,9 @@ CVE-2025-27786,0,0,d5fcf6854bf4e051e48ac285297811cb2b1007a0851f10df4fdbb776c79f1 CVE-2025-27787,0,0,155035fe75bae04ee902cac5759b78779c185535cde642fccfdd2b025dec0163,2025-03-19T21:15:40.923000 CVE-2025-27788,0,0,b24a56e317b2a6ab1d22b1dee70e073e47082751d4072c9e5bc5b9f65a1fa097,2025-04-02T12:35:54.383000 CVE-2025-27789,0,0,1d6dffc84798f01608e4f99792545443ae7fe01f00fb8a5ade60b9d3392855a3,2025-03-11T20:15:18.330000 -CVE-2025-2779,0,0,aaa59fdfb40b9c60174c4901686030b851d73b03e3ac8c777cef6adf74bf9058,2025-04-02T14:58:07.527000 +CVE-2025-2779,0,1,f769b50fc7746b0a71d436d1e829f1cd996f030f421eebbc56b6cd3744554c33,2025-04-02T14:58:07.527000 CVE-2025-27792,0,0,b74c7d86509a90375e7b6ae418264a1e46ee3163db3412e248a72d4623f714ea,2025-03-12T14:15:16.930000 -CVE-2025-27793,0,0,8ae5ea10e12dcadd7fbe7d01abf4cd47c8df86334043c5ca8ff67abda3373704,2025-03-27T16:45:12.210000 +CVE-2025-27793,0,1,62455994f5face7dbcfa1a98caad81214c4b0da370d91206c6d21af82a45c6cf,2025-03-27T16:45:12.210000 CVE-2025-27794,0,0,29af72e657ff2464b2a2937c7c4f1f9dbae6fd8fd9c8cc38aa28016fcbce1e25,2025-04-02T12:33:56.437000 CVE-2025-27795,0,0,4ff7b2f77f376cfe6fd93166198dd47ff9402055417a29c3c719e8e028d2917b,2025-03-07T16:15:40.187000 CVE-2025-27796,0,0,896c9fe3f771a2fa3519e20ae6313b458be8f4415e50a669613e7a3928ce34c1,2025-03-07T22:15:37.813000 @@ -287446,7 +287446,7 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000 CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000 CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000 -CVE-2025-27829,0,0,b0b2e4cb78b4a7d699d7473f360c1390e377f9a3184e8e1020a55b448ee16b06,2025-04-01T20:26:01.990000 +CVE-2025-27829,0,1,4fc397294f885b2e6e1939041abb83ec325fb463d987bff0e1de9d8968700828,2025-04-01T20:26:01.990000 CVE-2025-2783,0,0,cac125e06bdfcf5101179da397d83671a8e22970d5207dd362f2ac73d6465a33,2025-03-28T01:00:02.260000 CVE-2025-27830,0,0,da10ce085c8af9893377a339d8c2cf0db7181ab295e76a10e0b8a5e6254179ce,2025-04-01T16:44:47.883000 CVE-2025-27831,0,0,20a09452fdf20ea8bab418fed7140a2da100bb81bab554c4fa024a15bb4ab558,2025-04-01T16:44:41.537000 @@ -287474,17 +287474,17 @@ CVE-2025-27915,0,0,cd099995dd55d9bf47b9910748dbe833f7620d7232f17e750972cd85ba2bc CVE-2025-27924,0,0,4840c809271edb4af189b2d2219c4305e2093cdd10afd54a1be0c296547a863e,2025-03-10T23:15:35.280000 CVE-2025-27925,0,0,20d248e60598e5f95d1fae0ce2e564e286fc723b6dc1ad95ef277e933ed7ce47,2025-03-10T23:15:35.473000 CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a4d9,2025-03-10T23:15:35.670000 -CVE-2025-27932,0,0,036d05ff385938ab4080533cb14ce5447e7754455506217e340766b3e6cee90a,2025-03-28T18:11:40.180000 +CVE-2025-27932,0,1,e89ea3f7bc1f24dc892df481b28cf611425fca497d4d9ab9fafb911d848cbe47,2025-03-28T18:11:40.180000 CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000 CVE-2025-27934,0,0,95b3d1b020dd3defb4f0c3dbb03f408c8cd96475518f9b12ef782500b5b25703,2025-04-09T20:02:41.860000 -CVE-2025-2794,0,0,1a96a5e4fced0b738085ab3d0bfc6f597f8a7a2553b0aa413b0b61c07815e82e,2025-04-01T20:26:22.890000 +CVE-2025-2794,0,1,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 CVE-2025-28010,0,0,716afcbc5cebfe3c684dbf7aa12e99a30e3cb54526d7e93ef8e97f615752b08f,2025-04-03T16:42:46.520000 CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000 -CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000 +CVE-2025-28015,0,1,631137508e8a20a86b77040d3a1f398272eddb26c2d8f5274ce598561c73146c,2025-03-28T19:49:16.520000 CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000 -CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000 +CVE-2025-2804,0,1,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 @@ -287498,22 +287498,23 @@ CVE-2025-28093,0,0,29a5b3080e3cbf963755de2e44da431efef91255ecccdc5fdce85267962b8 CVE-2025-28094,0,0,43b699593b6066edfc5dc99b07a87e6aa9cb43db61462f8282257bc196f89aa1,2025-04-07T14:09:44.973000 CVE-2025-28096,0,0,35d4134d78905af0129462be767cef757b9b22ca399b6d6ee9e18c61774ffdf3,2025-04-07T14:00:57.987000 CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287f26,2025-04-07T13:59:18.590000 -CVE-2025-28131,0,0,653fa13bcc4e8ceeaeec21c6e4d492e3e092a6706cf0197f60166261f5572e18,2025-04-01T20:26:01.990000 -CVE-2025-28132,0,0,7002dcf5e8b4d37f87170403fcafb703439b8eee787188e4d9b9a044f6cdb1b4,2025-04-01T20:26:01.990000 +CVE-2025-28131,0,1,0e6d437e3a9f63309173cfffb683667f8de949bf1baa410130154ac2738212a3,2025-04-01T20:26:01.990000 +CVE-2025-28132,0,1,97b47f11d67eb8801e01a6ba8c51fcb6171d404dc753f2ff5e62dc9c1e96c78b,2025-04-01T20:26:01.990000 CVE-2025-28135,0,0,7449f9051b2ad40e6745f4f6c08227d8fea8f82a860e15e195996f87478458da,2025-04-09T15:02:47.443000 CVE-2025-28138,0,0,8ed5c668c7f04199b0e31f157584391bfd9c3eaae3c411512244bce07afe9a64,2025-04-01T15:41:38.770000 +CVE-2025-2814,1,1,24dd3f850b5037e2f6fb21610bc7e19212e7d5ccf0ce47c53e7fcf5a64e082a6,2025-04-13T00:15:14.997000 CVE-2025-28146,0,0,d143105b99c160ecdaa5df146d2180f0b9f633071a182bc6664e17a9d59ee46e,2025-04-07T15:15:43.200000 -CVE-2025-2815,0,0,18ebd3e5fe66ef46c3243ce93a88f48d5a0b2f6220e3b1e8f55ada09f216664f,2025-03-28T18:11:40.180000 +CVE-2025-2815,0,1,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 -CVE-2025-28219,0,0,9b40f2aa51230f80cfb4c81c1e336bd51973853bc9726944a0498d977c21854d,2025-03-28T18:11:40.180000 -CVE-2025-28220,0,0,609ccc596df6a0c8ee787ac35c989ba3e4c54efd8d91d280096f865a75155a7c,2025-03-28T18:11:40.180000 -CVE-2025-28221,0,0,4f03f6fae6237c7f3678037df83bd178511d1e95b5030e0c360b7044b52c5438,2025-03-28T18:11:40.180000 -CVE-2025-2825,0,0,1348b20aa0e099976065c5f501f6dcf6a498c894986b887d248ad2c9caac70d4,2025-04-02T21:15:33.187000 +CVE-2025-28219,0,1,e1b7ad511688218627fda313274ae55255c2e072edd5fc05ac0a78cadb7afbe1,2025-03-28T18:11:40.180000 +CVE-2025-28220,0,1,e2a4aa55d41a566e121997f5f817f2ed5c08f118dc84aa5a5b7b6f9f16b7a36e,2025-03-28T18:11:40.180000 +CVE-2025-28221,0,1,1cdeba30d62084850cf0d8eff272f185c9ba4c18571670ea23e9f95692731583,2025-03-28T18:11:40.180000 +CVE-2025-2825,0,1,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc722,2025-04-04T20:15:17.507000 CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000 CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 -CVE-2025-28256,0,0,b63d6b95334cfc627eaa3f9ee9948e650cb545bc12e96a49e4c25681e746d651,2025-04-01T20:26:30.593000 -CVE-2025-2829,0,0,3236ac6829fa593b108062dc7ed6dec4d108a816e3369d16a58cafd0a0c630a4,2025-04-08T18:13:53.347000 +CVE-2025-28256,0,1,0d51547a912d87914c8a34740640d1cebd8f6598cd0a44d8ea53d230082c2a6b,2025-04-01T20:26:30.593000 +CVE-2025-2829,0,1,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000 CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000 CVE-2025-2832,0,0,4793b0e61870dc2623c9525ce0b6e978786dc9b055c079ba680182ca85609996,2025-04-11T16:25:55.093000 CVE-2025-2833,0,0,5ee1553047443311af90b172ce83a898e2802ed44b7f8cedda9626fc88ddfee1,2025-04-01T15:43:23.657000 @@ -287522,8 +287523,8 @@ CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f12761 CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000 CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 -CVE-2025-28395,0,0,9b24ada5a8721e13ff9af0b39c2b2df626c65c0a7a509c73561e1e7818a4c2c8,2025-04-01T20:26:11.547000 -CVE-2025-28398,0,0,9e8d60443ba5900bbfd92275cc7544f6fdff9a1aadc815750409231b762f85da,2025-04-01T20:26:11.547000 +CVE-2025-28395,0,1,0b40a416a218e6c01b7cb1ba46e4dc6848bfe477454cb6615391e01d92782937,2025-04-01T20:26:11.547000 +CVE-2025-28398,0,1,c95f80956b5084d07fb2747a442752f0efe561eb31efab8ad7383780b7c9c8aa,2025-04-01T20:26:11.547000 CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000 CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000 CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000 @@ -287545,37 +287546,37 @@ CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e5 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 CVE-2025-2849,0,0,79b2af1c133f6f23f1c70a2bb124fa11686bdf889faf3bcaa3983741e2349b51,2025-04-11T16:09:36.090000 CVE-2025-2852,0,0,46965a2c7d29ead70399935990b3b29d74470a2c6d737a947f8f1351b914d77a,2025-04-01T15:44:08.323000 -CVE-2025-2854,0,0,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000 -CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000 -CVE-2025-2857,0,0,8c7f8ac266f15d25c9af4fc5e517cf8a450da35ae1d4923b3d1c4b2dbd19ab2e,2025-03-28T16:15:30.180000 -CVE-2025-2858,0,0,2e4b5f87bba94151b8774bfb4ece0ee9ed37a427c4372ccf2d59be0c4734d06d,2025-03-28T18:11:40.180000 +CVE-2025-2854,0,1,61a1a0a363b6d457b0e3c52638dc6ae7e2fa609b47ce203d47a3c268ebed477d,2025-03-28T13:15:40.923000 +CVE-2025-2855,0,1,4084d95f609a0847eed16b474beea5ea69671ccab6790be5478fe46b5fc8411e,2025-03-27T16:45:12.210000 +CVE-2025-2857,0,1,e3a56eea7b2206ca5257da5a192ee84a5aaaa3a949ef76cf7051ec14bc52c03b,2025-03-28T16:15:30.180000 +CVE-2025-2858,0,1,0a6c9eae60f33cb248f3119d73fc6162429c11278e6347bea0ce44cf9aef2f3c,2025-03-28T18:11:40.180000 CVE-2025-2859,0,0,e65abd0b60f7827efad318631d07986b97bfd6a357c0604e2e3311a9d74c8481,2025-04-04T13:15:46.493000 -CVE-2025-2860,0,0,2925b9644f166b8592fa371a02cb9c9e8b48780b6a0fbc61a9674b845b1d1e9c,2025-03-28T18:11:40.180000 -CVE-2025-2861,0,0,7dad4c2c440266b98ec3759b932eef5f284ec025d86a17d9bc5b9d07901246c6,2025-03-28T18:11:40.180000 -CVE-2025-2862,0,0,ad3586de27adfb4a89c83bf812f10d08ad110fe40d81b5c935b824380cef3797,2025-03-28T18:11:40.180000 -CVE-2025-2863,0,0,3616ab08a92ee294550c56b96011cf0360251a9b2a2c71ef5a38336a5bb01b7c,2025-03-28T18:11:40.180000 -CVE-2025-2864,0,0,1a7c45ef49119fd70755ca328a42c8214d56082dd6a8afc95231107684b8fd07,2025-03-28T18:11:40.180000 -CVE-2025-2865,0,0,56c55f8510ee39693c4c22a583cee5c7d9858d04e158f7e98926de4cd736bfee,2025-03-28T18:11:40.180000 -CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000 -CVE-2025-2868,0,0,85b9dc17660105c1d52e94e9c61b1a822461960fd4e0c0e93de75ddcee964209,2025-03-28T18:11:40.180000 -CVE-2025-2869,0,0,5066d8ca712c82ee845e66f8b1fc3a6c9e0a4e6b74c2b3263804ec9c98b4e586,2025-03-28T18:11:40.180000 -CVE-2025-2870,0,0,532ce24468347275f11c46ecc24e5d6555c309a32268ad9ae9a421f0ae266a95,2025-03-28T18:11:40.180000 +CVE-2025-2860,0,1,8a82659ce782c704e35b992ab741da8f89550cecff77e53bbcdeb016970ae171,2025-03-28T18:11:40.180000 +CVE-2025-2861,0,1,13a77e4b366b45af7df32fb7b5155dd5717f554a68dc2930e705b7144fef43be,2025-03-28T18:11:40.180000 +CVE-2025-2862,0,1,d42da37ae120383972bca9b3c34491a1998bf94496751edff9d3b8653ccd4e9e,2025-03-28T18:11:40.180000 +CVE-2025-2863,0,1,89f439925468e699ad113743583fdeda2696a66656c397c031b5ea7d3d0ecb34,2025-03-28T18:11:40.180000 +CVE-2025-2864,0,1,1f66654aa924832c01c946b8c047f8723266750dca2c13c7a67536d81d107cad,2025-03-28T18:11:40.180000 +CVE-2025-2865,0,1,ec0c359364e90a26d27d62ffa0653d855c3daf1b4b8f1b737e51327fd1068f74,2025-03-28T18:11:40.180000 +CVE-2025-2867,0,1,64215baabccd6fdf04d8b048452d95e3b2ff4d5237bc2e15b566982b293865f3,2025-03-27T16:45:12.210000 +CVE-2025-2868,0,1,8956298391ba0923e590541b3fae1d38dc061830ea826ef81d09ab51842ff44b,2025-03-28T18:11:40.180000 +CVE-2025-2869,0,1,c096e0a3f8c1567897f984075f9b7eae7e0b2ff1c1febfd4a8d8f0861bac0208,2025-03-28T18:11:40.180000 +CVE-2025-2870,0,1,ca33e2f6e2a6e0703a9540671a46388cc00e335b8b92af1dfdf1002f06620382,2025-03-28T18:11:40.180000 CVE-2025-2871,0,0,c3129e2d10d0a568d107217b47ebe413329b38cf864ca69972ffd3e876f2438e,2025-04-12T04:15:39.283000 CVE-2025-2873,0,0,edeec97aec2b3292b499f5094d0f168ecd8763c5a36659abef4c11888578eb0e,2025-04-10T08:15:14.857000 CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000 -CVE-2025-2876,0,0,93ded195bcbb0b5d9f004109e54f45d215e3de9103bc5d8820997a2888ec6270,2025-04-08T18:13:53.347000 +CVE-2025-2876,0,1,fb0e4b92d84009faee60c62d1ccf1db28c8137bc50cb10bf701561ec9ad0e3a6,2025-04-08T18:13:53.347000 CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000 -CVE-2025-2878,0,0,125728ac281a69ac5ecf14e31ba48aa14b6b6ffc7aef5853980db8dfb30bd674,2025-03-28T18:11:40.180000 +CVE-2025-2878,0,1,91ed70612b37527f5a64720333f3ec88a66eb4235ee494c58d3cdb31eafddc33,2025-03-28T18:11:40.180000 CVE-2025-2881,0,0,5009d8e276d2e6084ade5fe05db20a690557b55bc3550b3012cfb45fa31fb0e1,2025-04-12T03:15:14.430000 CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000 CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000 -CVE-2025-2885,0,0,e2d01fa5043ddafa560e776b063da46f782fa630659191bee2d9e55b0a2acc15,2025-03-28T18:11:40.180000 +CVE-2025-2885,0,1,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 CVE-2025-28856,0,0,49facbda8e3a831c26c726b61bef1fcd0c7982f3fa2f79e25ef260adf4085d93,2025-04-09T14:05:44.960000 CVE-2025-28857,0,0,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000 CVE-2025-28858,0,0,3db3a8e40ef3d230c200938f8448635a5148908ba8a7b5815dce4dd1cdfe317d,2025-03-27T16:45:27.850000 CVE-2025-28859,0,0,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000 -CVE-2025-2886,0,0,42396126b77c472d9463e14a9d6303edd68ae865d14eb8e9f782883f549024bd,2025-03-28T18:11:40.180000 +CVE-2025-2886,0,1,8d6536b0d1fb7cb6f3aa2b882cb8c2bbf8ff9fd1ad767fb28f9e502b166c2f0d,2025-03-28T18:11:40.180000 CVE-2025-28860,0,0,66dc2154f8e6a7d5fe774501386200cf25568fdb5590c8e79b061d6b8471f51a,2025-03-19T14:06:00.333000 CVE-2025-28861,0,0,8f06dd797c877ac540417e774f13db9bcbfcb5efd0679398413b1a7d851d0a33,2025-03-19T14:08:16.920000 CVE-2025-28862,0,0,262a0346545485f6d48b7aaaaae4bfd67403a534df363d75e6b444693b4d15c9,2025-03-19T14:13:16.610000 @@ -287586,7 +287587,7 @@ CVE-2025-28866,0,0,6216179861a4260f9ff8f846c033be3d21e175874bd3a83d400d670ba4d4e CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000 CVE-2025-28868,0,0,ff7436085d2b667e3d4ee6f08d9a645abff66da4d3ac58d61718d8d07e56a857,2025-03-19T15:49:31.903000 CVE-2025-28869,0,0,30cafca530f51ec5c89ebf30f24c3b05b9c14e35b7ea5aabed90bc20401b63d8,2025-03-27T16:45:27.850000 -CVE-2025-2887,0,0,12148654b043eb09d595e1d899f67ff593bdfdc6003eab432f18d843b844e1a5,2025-03-28T18:11:40.180000 +CVE-2025-2887,0,1,400efd81487e6c938eafda734dc3b4a3f307717b42fd90755399eeaf313270f3,2025-03-28T18:11:40.180000 CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000 CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000 CVE-2025-28872,0,0,ee369833861873b1ba0b12c82451f0c1baa2b239a4cfafe9cbece0d18ba1e58e,2025-04-09T14:04:59.747000 @@ -287597,7 +287598,7 @@ CVE-2025-28876,0,0,09fd24a9a01c3eda16fbf90d3423398c315bcbd59fdcbb285362001697f90 CVE-2025-28877,0,0,434e2f5c254dee81ff1f5e6d2f35d405695aa4941c0e46cbf356919a260d45f2,2025-03-27T16:45:27.850000 CVE-2025-28878,0,0,ed32d8829185d12fe2d1f4f1261b83f1526cd1bbcc48fae1da982c47d4414324,2025-04-09T13:11:30.443000 CVE-2025-28879,0,0,5bd953cfa52219aac88bb16a9e09e1510b5bf7a56e150dde8ed47528ce76635c,2025-03-17T17:40:29.660000 -CVE-2025-2888,0,0,f143fc51263cea2d06aa2ee31d9ad2f717064cb0e43c08223b7b2e0b300f942b,2025-03-28T18:11:40.180000 +CVE-2025-2888,0,1,36b019f89df7500702efabceb2e435f6b7bf12493fc0004f0d2ed84a980e94ca,2025-03-28T18:11:40.180000 CVE-2025-28880,0,0,323d89f8525df9d701cd310874ff09c90de80d99b5a967dd64e2f74b7f8e3c25,2025-03-27T16:45:27.850000 CVE-2025-28881,0,0,c868390814b3bfb6893a2dd8d4ebc68e3e97fd80f9964fd17a15484244aa8f6f,2025-03-11T21:15:45.647000 CVE-2025-28882,0,0,4e4f91d50aac7568d05fcf91c8576215d072014dcf66c527dd4824160efd91bd,2025-03-27T16:45:27.850000 @@ -287628,7 +287629,7 @@ CVE-2025-28906,0,0,71d4a45ea57ea31b9c7ff7f1044657ad234dba2e04a5868ce4f234775b1d3 CVE-2025-28907,0,0,61ad82de5710b4f4da58f9f96146922cba286e42f369d7ad156a305fd9593db5,2025-03-11T21:15:48.080000 CVE-2025-28908,0,0,ebd453d34a4b132bab9cfda8de0e96d00b4586a99d7e9c5fe13c9127ceb9e73e,2025-03-11T21:15:48.230000 CVE-2025-28909,0,0,04189e51ced450c8a2084b8e9e55c70ef4c60636074c10364824cc2cfc4bece7,2025-03-11T21:15:48.383000 -CVE-2025-2891,0,0,d31ca42dee34d30734beccddebda8fa3d97f0dc052db4e61e5617f0c439e3b08,2025-04-01T20:26:11.547000 +CVE-2025-2891,0,1,f557633b2b24a27086d9b32222ef517b688dce75ee587650bf2d1f9950361998,2025-04-01T20:26:11.547000 CVE-2025-28910,0,0,5d857d23d0acb81955efc8d871e8e454c5445f6e66a327bacd6f17ba20cea46b,2025-03-11T21:15:48.650000 CVE-2025-28911,0,0,8aba3d73046d5fe4537a784ec128b675d08c765290b5248962c6c341e04eb04e,2025-03-27T16:45:27.850000 CVE-2025-28912,0,0,c02e4a7b437330942683784124a6ff88ddc10066051152f5d889c6e0775cd22a,2025-03-11T21:15:48.833000 @@ -287664,49 +287665,49 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 -CVE-2025-2901,0,0,7f4abd4b51c8613b496d04d0a5b67ccb34d26f5a58b067bb99bc921fba34ee98,2025-03-28T18:11:40.180000 +CVE-2025-2901,0,1,0f9760d041f8cccc36ccbc275a992ee13e955e366948eb261a1d4c80f4291825,2025-03-28T18:11:40.180000 CVE-2025-29017,0,0,91377a5dec7f4c859977641f157a48185a056d6868f195347a73b619d0d865de,2025-04-11T15:39:52.920000 CVE-2025-29018,0,0,bd72c59170866522bd5f75aaac840c425073014b0df106adab360beabfb9c791,2025-04-11T15:40:10.277000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,12b1441dc9358c5c16def012730045c4192ae6bcec0473634ec29643cb1836c3,2025-04-03T15:46:23.280000 -CVE-2025-29033,0,0,7fc46dd00140aee11e78e1b177985c55fc3a06a9a61b454723195843b9a8389d,2025-04-02T14:58:07.527000 -CVE-2025-29036,0,0,7f47c40e7cb1901e3689ee8cc7d5747451e426694c8ce167917549018087b477,2025-04-02T14:58:07.527000 +CVE-2025-29033,0,1,5eca366ad2f6b7bc48c9c10555d9d4de9f98752ea608be3c325a7269b2a18fae,2025-04-04T21:15:44.653000 +CVE-2025-29036,0,1,1cfdba0275e788d67daeea9f29674422f2b95f026fe7bf91e23dbade8cbd52ae,2025-04-04T21:15:44.813000 CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000 -CVE-2025-2906,0,0,3b7145869564fbf6a31a71182dff3ecb51c4e6e5a077f9524e300c06bd42a3be,2025-04-01T20:26:11.547000 +CVE-2025-2906,0,1,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000 CVE-2025-29062,0,0,8b038be77d187e96d12580474b403cb7fa145ff3ea4b7563c5f09cb9c8bff2e3,2025-04-07T14:18:49.830000 CVE-2025-29063,0,0,fb62068ea038ef1ec0c7040dd75d6c08aaabdcd4faa76e872cbcfed9d1021b86,2025-04-07T14:18:34.453000 CVE-2025-29064,0,0,24325230d508ac16e3a1f67a26e4887e15535769a097781d5db57a9c77655fac,2025-04-07T19:15:55.633000 -CVE-2025-29069,0,0,3fc38b256f6920e55af2799f6d4a36a07c56b3270e0c87c9d5d1bb299d0f3d00,2025-04-03T20:15:24.247000 -CVE-2025-29070,0,0,24569788487d0400d538146d963f6020db8a44ab6999b4d9aa33cc87364054d5,2025-04-04T02:15:18.183000 +CVE-2025-29069,0,1,1698d40149a4df33ad01a99a20685ac0b1cd77de5d7edd807b36236e8eb2a643,2025-04-04T21:15:44.987000 +CVE-2025-29070,0,1,01291a5766bf65c1287ee0f6127f3a568879dd8e4b1dbd2e417b1c53e816cdae,2025-04-04T21:15:45.167000 CVE-2025-29072,0,0,fd95fded2fd85d3027eac83af76782f039ae97bbb9711a4bf20a00b195ae0993,2025-04-11T17:20:02.963000 -CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000 +CVE-2025-2908,0,1,79924d3ecfe8650096befc9934447812930496f664f45bff66577cd53948d0ef,2025-03-28T18:11:40.180000 CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000 CVE-2025-29087,0,0,089a9780b1f166bd8c072181912d7d69f969a758f54ce8dafb3cbd6601949045,2025-04-08T18:13:53.347000 CVE-2025-29088,0,0,7d5dacaf56422a7d5f1eb1761cfdbddb4f62a79eceaaf1e73ee2a7a26416b91d,2025-04-11T20:15:21.553000 -CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000 -CVE-2025-2910,0,0,63b1776a3174c1a360045ac9eb5899920566d03dfd18cf1878580a96741c5eb9,2025-03-28T18:11:40.180000 +CVE-2025-2909,0,1,42f5781e40cc939d92fe9597195ba6ab452b710720c9766b4ca6896cfde9e954,2025-03-28T18:11:40.180000 +CVE-2025-2910,0,1,5af52bdcf7582d7e133344b6a01509f55f8b432f92637557c86a5b2988938918,2025-03-28T18:11:40.180000 CVE-2025-29100,0,0,03e4a9cc3df0d3df440cd5953f31e0b258dcc8840a20f25006f01137c8594a87,2025-04-01T20:06:53.017000 CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000 -CVE-2025-2911,0,0,f42d334ba287c27991c01cc582042377c14aecf34aa8ca1898077a1d987eba65,2025-03-28T18:11:40.180000 +CVE-2025-2911,0,1,48bdcbaa68093da30f8003af1dbf14608a30023e34dfe65ead0ff5ed5b424fdd,2025-03-28T18:11:40.180000 CVE-2025-29118,0,0,70b4aae047c759f7e34df40a96cacc60aee9944884d179eaba9d0a8f233e6c20,2025-04-01T20:36:54.203000 -CVE-2025-2912,0,0,fb745af2f3fc708590a5f9220ad7a90220224ae715b6053be0f6262ad260a2d5,2025-03-28T18:11:40.180000 +CVE-2025-2912,0,1,0733aab5fd02a74465670479144233527ca3b3b24825da136b56f7a3446588e3,2025-03-28T18:11:40.180000 CVE-2025-29121,0,0,434c82f016c57d7556d63e2eda422fcf8e77cdebbec7ff8a56364350ed336d9b,2025-03-28T19:34:42.127000 -CVE-2025-2913,0,0,1349525b141a0d29f6f4acddaff964ba151234134fa2b485d05c12789f40a9c9,2025-03-28T18:11:40.180000 +CVE-2025-2913,0,1,3191bb640c41db457801e2656dcce38f670e926d21852ced4872d8c16c640d26,2025-03-28T18:11:40.180000 CVE-2025-29135,0,0,500947b54e2f6360bd88908c4e621c7a101c66a93881bfd5d1d8147aa620860c,2025-04-01T19:58:46.270000 CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179a1b,2025-04-01T20:37:02.110000 -CVE-2025-2914,0,0,d636e733efa14dccc51cbeb1876265c4b7d6b84b426607814f6947811a54ec6d,2025-03-28T18:11:40.180000 +CVE-2025-2914,0,1,f4da3bf15e0a024148c60f5942d8d165e3d668046cbe893c7644ad7b0d6619e0,2025-03-28T18:11:40.180000 CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000 -CVE-2025-2915,0,0,85187e8b22aed42e9eeb1f1a363effb36eaf1a6d3cd252ac65b41686ac04666d,2025-03-28T18:15:17.060000 +CVE-2025-2915,0,1,b9674148271b5d8033b5d0b1e5bb9e0a537801b574c77a65afc34c00e08ad69e,2025-03-28T18:15:17.060000 CVE-2025-29150,0,0,d63dc144134bdd58d64b5a241d38aa93b7976fc0b18bc7b222ca5fad328899e9,2025-04-11T15:39:52.920000 -CVE-2025-2916,0,0,cf1101aece002c9c9f91d9db56eaf563d3f482cee7c458ce96f61775c54ea0ee,2025-03-28T18:11:40.180000 -CVE-2025-2917,0,0,55492aad4b6e7cdb22d01e440ebe8377428ade117453b37726a2766dfd44fecc,2025-04-01T20:26:39.627000 -CVE-2025-29189,0,0,4c6e3a6a45d675b4010e9a1fa1370550525367f0bf3381d5f2c0bd1dd2174fa2,2025-04-09T20:02:41.860000 -CVE-2025-2919,0,0,2ad34c98db4fa64ce17b50938b1437b50b851a1ccb3e30c466fb3925eab3e24f,2025-04-01T20:26:39.627000 +CVE-2025-2916,0,1,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 +CVE-2025-2917,0,1,a7b7ac9e8c865423c1599495aef33a9e11a4456f495e5a95564b965b369f2d10,2025-04-01T20:26:39.627000 +CVE-2025-29189,0,1,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000 +CVE-2025-2919,0,1,b96ce7ce0f34936fb136f2b1ffc6459c07bdc587830fdf6a756fc40e2dfb516f,2025-04-01T20:26:39.627000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 -CVE-2025-29208,0,0,dc693cfefea6bff79128010797c3b39bb99de0fca3a06b4d042b58dfd00764b0,2025-04-01T20:26:01.990000 -CVE-2025-2921,0,0,08def9140b09cddbaab1b2c30fece0440d85010daf0af328533a5776148b0e16,2025-04-01T20:26:39.627000 +CVE-2025-29208,0,1,e7940f17c2424fa5073e8fed86fd8b2314b33d9aaf3f0f884fc7a6e3d0e7a338,2025-04-01T20:26:01.990000 +CVE-2025-2921,0,1,d4bcd9d1bb65075ea7939e905e49c36e22f8a771b8d05601490e3dfa0958d0cf,2025-04-01T20:26:39.627000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 CVE-2025-29215,0,0,96e2f565718ae35623a5dad2291d2bb27d05c2c10bebe7c06ba56599d76124a9,2025-03-25T17:38:20.710000 CVE-2025-29217,0,0,e64e2910b1dc1b0effd2ebba9d04863326d941e1021d8d58ce80e3146dd4312c,2025-03-25T17:38:28.670000 @@ -287717,11 +287718,11 @@ CVE-2025-29226,0,0,2a22bb41c1636f111fba56d4837d1f7d2c1c2827dade39d30847ae9b2258c CVE-2025-29227,0,0,98c6c2a56c36a920ebfda1c9f607bc1ce8140ab24fa775ca0ea0701e2b0db727,2025-04-01T20:28:58.697000 CVE-2025-2923,0,0,0127ed7eb29b6408a9d060a0a3c5fc22e3f1952b120dab3b5645aa8d85c68532,2025-04-01T20:26:39.627000 CVE-2025-29230,0,0,a96d6f25884fce83e2e6e66d008df496713f73ab7711eea3506888e7dec9bf9e,2025-04-01T20:28:51.790000 -CVE-2025-2924,0,0,0a51719791f0ab10c54a74c06f2c45092a7b3779327c9550f7f977058f07f138,2025-04-01T20:26:39.627000 -CVE-2025-2925,0,0,edcc79ad19e68edb1efb0af2420cbc58d02767f7c5e59d12c7f396faa8e7d197,2025-04-01T20:26:39.627000 -CVE-2025-2926,0,0,e3b0f62c6b62045b79e8bbf46a315c156b4dcbdc81526a11236d28d10edd450c,2025-04-01T20:26:39.627000 -CVE-2025-29266,0,0,17b5aa5cdd8140970f9de702a12ef9d63e45d4d2fb234b1adc9d6fd5507fea10,2025-04-01T20:26:30.593000 -CVE-2025-2927,0,0,2abc95e777ab758b9c377c8ea7a814d588dedca0d5e6be323e4967034538a24a,2025-04-01T20:26:30.593000 +CVE-2025-2924,0,1,15ec772a247e663d3b410bf382b3b4282d830baaa171ae147c6377e4ede34991,2025-04-01T20:26:39.627000 +CVE-2025-2925,0,1,57c779cb80b04dea98d1306bb52a4ba039c948f0dfa18686d63a5c924ae12060,2025-04-01T20:26:39.627000 +CVE-2025-2926,0,1,3e72a087e763323bf5856d294592139ea832180777dddbb463811921e15208e3,2025-04-01T20:26:39.627000 +CVE-2025-29266,0,1,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000 +CVE-2025-2927,0,1,f206cbfb703c8b89c0220a373db89f235ca6b965fd10666a0dbf1b9f60f76ad3,2025-04-01T20:26:30.593000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000 CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000 @@ -287744,10 +287745,10 @@ CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000 CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 -CVE-2025-29389,0,0,88283a2b56ae439341fd2624e0fbb13adf07edc309d4c00a31b0ff58955cda4e,2025-04-09T20:02:41.860000 -CVE-2025-29390,0,0,b027115ae3c7b2da63f26890927e10c5d1f1101a17ea7a186d96d5e7a094c1ad,2025-04-09T20:02:41.860000 -CVE-2025-29391,0,0,8fee2cedf1e33999d2fd0eb01d75cd44397e35b050ceae03c2491e48902d817b,2025-04-09T20:02:41.860000 -CVE-2025-29394,0,0,37d5d23a9ed0c1b54730ba12303da3978e4f73005d07218e4414411594476735,2025-04-09T20:02:41.860000 +CVE-2025-29389,0,1,7346acc1fe3e0bce9d89cb45e28f2dcad894f34f4ad9518c187469c5c46854ce,2025-04-09T20:02:41.860000 +CVE-2025-29390,0,1,0d3f1a5443d923cd69474601e81c6ed56d32c74e48f2cfcfad1110a3c886a131,2025-04-09T20:02:41.860000 +CVE-2025-29391,0,1,42d4546ada0a2b49c124dbe88b48d006d7589fb91bb0a018d0dd79fa5a9f12f6,2025-04-09T20:02:41.860000 +CVE-2025-29394,0,1,b33985c121ec23217a26c766fe9bee2b1c6ed057a04b87c5f8c939ce3b37502f,2025-04-09T20:02:41.860000 CVE-2025-29401,0,0,58e28d32bb8e9d05a099b3459d8a1f2140d9f050ebab60871b5c42621e6014f9,2025-03-25T16:15:25.543000 CVE-2025-29405,0,0,b0b5dc47fefba80ac6689c1790abcddffbf12cf547b54f457820a149edabea55,2025-03-24T15:15:16.377000 CVE-2025-2941,0,0,2a30ba06bce9faeb159e65a42eddbce7a23fc7e73f8564bd02faf3032a157758,2025-04-07T14:17:50.220000 @@ -287766,7 +287767,7 @@ CVE-2025-29462,0,0,2dbf51a848bf77ad433e707ac24330b357114ddd7a825b863e5708fee007d CVE-2025-29476,0,0,3010ae735c879d92a342e7748811b3946ae8287c6c80f89374bb498690e8bd18,2025-04-07T19:15:55.790000 CVE-2025-29477,0,0,2b1c163b57b7284c39b710b65fa772d27c2dfad0127610dec2abcbdeeac4b145,2025-04-07T19:15:55.950000 CVE-2025-29478,0,0,95539760950ade4571816f9ae6141a29c105591902e01f13a4661b18fef5d518,2025-04-08T18:13:53.347000 -CVE-2025-29479,0,1,729ebc51cda55a12446526775028ebe3993e9c2eba2c006a3ccde1a3f431c976,2025-04-12T17:15:15.363000 +CVE-2025-29479,0,0,729ebc51cda55a12446526775028ebe3993e9c2eba2c006a3ccde1a3f431c976,2025-04-12T17:15:15.363000 CVE-2025-29480,0,0,f9e87a1f21fc5da9549044ee20fdffa604917728ee598a27e53e5f840fc57beb,2025-04-08T18:13:53.347000 CVE-2025-29481,0,0,5c81f06b1bccf08d5663d5869c7174eff64f4fcdb3978749639bf3e8b8740070,2025-04-09T15:16:02.713000 CVE-2025-29482,0,0,e7669c1298eb173651cedb65768870146754f4738e947cbd5a6f066aa3bb26b4,2025-04-09T15:16:02.980000 @@ -287785,18 +287786,18 @@ CVE-2025-29494,0,0,37dc6ae3cff76e33477c0d21d9e70a2e17e406dc0fef9f8cf0d74528f1edd CVE-2025-29496,0,0,1ab18872c422fd3ad83b844719caba98a63d63be68d84ae73e73abccf7b846be,2025-04-01T15:46:19.427000 CVE-2025-29497,0,0,f8eaaaad66a08f36734d69d9f1541fb908a272f91f31ad8a75e2ab1b4e1231c2,2025-04-01T15:45:58.123000 CVE-2025-29504,0,0,509d78872cdb4e1135eb7746b776c8eb568355cb805a55a3297f7c964bf210eb,2025-04-07T14:18:34.453000 -CVE-2025-2951,0,0,5d509308aa434f11a0f0d3bbee83cb550cd1526f2ac9ed20011f9dfe77eb6393,2025-04-01T20:26:30.593000 -CVE-2025-2952,0,0,ce06420e464231cf7dbbf04b019fa48dd2b74ede06a26175a9f7fb3d81229a78,2025-04-01T20:26:30.593000 -CVE-2025-2953,0,0,55a12a6e28839ed9198d20109be4db37ae417e7825536252a41ecc4cb5173a24,2025-04-01T20:26:30.593000 -CVE-2025-2954,0,0,fc3a2c980bf660a3e34556ee252ec44231dee2947ff8bad355cb86cce2d19341,2025-04-01T20:26:30.593000 +CVE-2025-2951,0,1,4e1e0ee1a7886cdedafa9cb1a4c97df91d5cb07c56b61addea9c7982a4eec3ff,2025-04-01T20:26:30.593000 +CVE-2025-2952,0,1,7a896c19b1b316d682e0b48bfd1bd1b6175093c1df17cdde547c536b795db6e1,2025-04-01T20:26:30.593000 +CVE-2025-2953,0,1,458f670329a60ee717caa05d8c05a4d76e0581f97d425e2a890a38a1005e5c99,2025-04-01T20:26:30.593000 +CVE-2025-2954,0,1,ed2d3b830ff448060af713bc6ba997f82cfb53659b4f18fc8abd0409631aaa9c,2025-04-01T20:26:30.593000 CVE-2025-2955,0,0,f457e82bc0e34816f82e9412a70796d5f7c872fa43e3171fc313f275eba39469,2025-04-01T20:26:30.593000 CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000 CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000 CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000 CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000 -CVE-2025-2959,0,0,1e1c625f609a10be5a0b8a23aebaf67e7ab0d18811ee0ee5bccb17420006f738,2025-04-01T20:26:30.593000 +CVE-2025-2959,0,1,45d12768699cc4d34adaa134d57c356e0a8530ad2adf81ec0724099580c7bbc9,2025-04-01T20:26:30.593000 CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000 -CVE-2025-2960,0,0,c08819bedf646cc171f0258b0a94c3a41e46867e1b14a737b82467d2de4f87fc,2025-04-01T20:26:30.593000 +CVE-2025-2960,0,1,98f4c6ae3faa544213d4dabe849652feadde705cdcb3e849cf33e2d1d3e0de8f,2025-04-01T20:26:30.593000 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000 CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f36a,2025-04-03T17:35:51.163000 @@ -287817,13 +287818,13 @@ CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd9 CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000 -CVE-2025-29766,0,0,65a16707b8729a63f264f0b6d3ee68b10c485cbde8735a3eb7b19a0abb3b57a6,2025-04-01T20:26:22.890000 +CVE-2025-29766,0,1,d0d6c01c0aacc0172ff6cf10187bd4c58c9fb5a0b02e4e65dffc9f50e759cbe7,2025-04-01T20:26:22.890000 CVE-2025-29768,0,0,492de4cf9bc586f0c097ff358f0d6522edec16b3a3700b1c85d835d10d900b1f,2025-03-13T17:15:37.623000 CVE-2025-29769,0,0,0de842b7c7e597ae7633d44140f4fb5c852e9d347c06f8c689707fdd8138a9ec,2025-04-08T18:13:53.347000 CVE-2025-2977,0,0,696e7740dbee2a5350b7ef96c3055a330727eb2106222123bfc4ab0d2a3f5d39,2025-04-01T20:26:30.593000 CVE-2025-29770,0,0,64a7761b4081159cba0465c32543c25f86c7bc3fdca10868943a613198ef8db7,2025-03-19T16:15:31.977000 CVE-2025-29771,0,0,40341ca82018118ee52a3bd3891794f5bfb5824a75c694db796b525153dba5da,2025-03-14T19:15:48.847000 -CVE-2025-29772,0,0,9a6a7be0021dd43e8f582b60a9a44bbc9583944eaede47539ded11b8af730b31,2025-04-01T20:26:22.890000 +CVE-2025-29772,0,1,9a6c23ae3bb5e5edfc3d2501a190b3205b428e8b7a6895b7bb1194a13f4302d4,2025-04-01T20:26:22.890000 CVE-2025-29773,0,0,8f417d8c023f293e2e168852f2d0ced996877b497454aae89c90fe3831bae1ef,2025-04-03T18:25:43.613000 CVE-2025-29774,0,0,132c9dc0cf3d9b063a6d6580e246aefe506de957f88f8f001b6f77f344e9e9b3,2025-03-15T21:15:35.250000 CVE-2025-29775,0,0,f8aff533c0e84344979e5487ebc0d33112cc14196a6b0362233e681fd1ef3332,2025-03-15T21:15:35.367000 @@ -287845,8 +287846,8 @@ CVE-2025-29791,0,0,683ef8de01f05239c3d69b63b73b45a656d8e4ac525540cae7adb4738586b CVE-2025-29792,0,0,e1fefa30e127be13c0e170e6c713c0c0e639cb245913f2cca3c9966212ef5840,2025-04-09T20:03:01.577000 CVE-2025-29793,0,0,5d4a493481424c6f05b63ca9133c70ab30274c0864f01d1edfcf15463f6ab7cb,2025-04-09T20:03:01.577000 CVE-2025-29794,0,0,8d49d2642cb6d78650474b9bd88867e2757b928c706e4e51509a78bb37013142,2025-04-09T20:03:01.577000 -CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000 -CVE-2025-29796,0,0,538594e52732519762324916fba3aaf079adb6c21d546750de86e44f00d4c82d,2025-04-07T14:18:34.453000 +CVE-2025-29795,0,1,3a1380f617fce6710ebabc300b96a06dcefa0c12dec7b15358faf1330e5927a4,2025-03-23T17:15:28.920000 +CVE-2025-29796,0,1,125585943e957d3af90cf56f6009a2b038d5fe359e2a9a86ed055cae30d34528,2025-04-07T14:18:34.453000 CVE-2025-2980,0,0,e90bea9fa0869a16071d3d0a033a2bb76e259b349a9a0bf9fb845593fb53ed2d,2025-04-01T20:26:30.593000 CVE-2025-29800,0,0,aa88ac334e3cd604c62f77dfd84972dee93997f0496d3c9899d6b123738b9e7c,2025-04-09T20:03:01.577000 CVE-2025-29801,0,0,f30e3573fbc30d148919af02cba137f289819a51d5b9eee78416badb077c0363,2025-04-09T20:03:01.577000 @@ -287857,25 +287858,25 @@ CVE-2025-29805,0,0,7845e0d29cd139c610706039b774486523ec11a7a3670f5f227cb58b14d3c CVE-2025-29806,0,0,dde4af49c411f184b167c313d22e18033ab4a12ed1db72bb3f1109ada8823750,2025-04-02T14:16:10.870000 CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000 CVE-2025-29808,0,0,ca4e2887a6e3cc19fabfbd90706a9f8430f5e425fa3ececb0b65e3c7d47b4b42,2025-04-09T20:03:01.577000 -CVE-2025-29809,0,0,ba293b5a5e3d05f4df5ddc4d7ed1a9e8766ae31100926c57e9eb9d2069d7e361,2025-04-09T20:03:01.577000 +CVE-2025-29809,0,1,e86e16cb8c2c6fce62d9334a5bde710c3cf9f88d472813e8814cfca1bb5ded4c,2025-04-09T20:03:01.577000 CVE-2025-2981,0,0,e1592099f2c8ea306adfab1774d65aad5b1081bf2f727bd1f3845471e7bfa07c,2025-04-01T20:26:30.593000 -CVE-2025-29810,0,0,c6ce8d5a3714790ac34fade83576e2d7ca8388f61a029056e351b631eb2d4f92,2025-04-09T20:03:01.577000 +CVE-2025-29810,0,1,57feb0e7f0aa396556ac6a54885006663d044f570990c6a9c1c434c2ca233d73,2025-04-09T20:03:01.577000 CVE-2025-29811,0,0,ca68711f7db7aa265bf18270a0a7a9e56e95ff98c6ea9a12f5a931ccf43ec055,2025-04-09T20:03:01.577000 CVE-2025-29812,0,0,5f5315af1327d52cbeaa2b595b26bee5d15120c0fc5e1d6a5682623e7d46f575,2025-04-09T20:03:01.577000 CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29815,0,0,1f4f3e8e153f17fdbb8262dd7f05d4fe97a5b776e03d0624e95ae0ccca656378,2025-04-07T14:18:34.453000 CVE-2025-29816,0,0,0f28f4d6b062144521da93fd52e293f6ac7b0bce3b6ac97d2d45ee7d8437fc19,2025-04-09T20:03:01.577000 CVE-2025-29819,0,0,13c5154fc859eb7884684c717d992e6b1620b6ae7f0942d5cfe5931b09754396,2025-04-09T20:03:01.577000 -CVE-2025-2982,0,0,18147376cbfa81f921d40bd8f9b57eee8ed0932c2ab1d6080b91a0ef0abe19e2,2025-04-01T20:26:30.593000 +CVE-2025-2982,0,1,2c2ebcac608fe0d1adcb1e6d3ea075ad059f2f0c1d50f6b5761a2ce38a606d84,2025-04-01T20:26:30.593000 CVE-2025-29820,0,0,ceece2b096c5b57274d87d5eccbf5459776b2e25facea8bd356b4873a294d6fe,2025-04-09T20:03:01.577000 CVE-2025-29821,0,0,57290d71b86115397faca996957f3a29fa63d3c86cf935b4eb0d6a787a869fac,2025-04-09T20:03:01.577000 CVE-2025-29822,0,0,4de7dc0240419b00e77efcf43425faa5e15e299e871fbc149227db8670e830f1,2025-04-09T20:03:01.577000 CVE-2025-29823,0,0,7020e8f361c2e1051ff80b6673ee2bc8c14b1552e575c216beb796659e5526c1,2025-04-09T20:03:01.577000 CVE-2025-29824,0,0,98cb78aee90059a4523542d9603153b103d0d54101029a6433c3089528857b68,2025-04-11T13:52:51.510000 -CVE-2025-2983,0,0,efeaa991885da11a1c8124e07f7de31c07c78c44b0bef43fd1faec4e54149319,2025-04-01T20:26:30.593000 +CVE-2025-2983,0,1,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f9155,2025-04-01T20:26:30.593000 CVE-2025-29834,0,0,c1edafc5db08600d282b1d504c73c12ff10139e21c4a2899ff9f8e6c1240a7ff,2025-04-12T02:15:22.027000 -CVE-2025-2984,0,0,3f4e6cd5cc63eeb9ae67002e32115346660333feb5923743bc7019b2dd2d5767,2025-04-01T20:26:30.593000 -CVE-2025-2985,0,0,a3543a73ce62ad86efa1e3373d8316301a2f3bab41174741e4e7d45e59a2160e,2025-04-01T20:26:30.593000 +CVE-2025-2984,0,1,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000 +CVE-2025-2985,0,1,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000 CVE-2025-29868,0,0,9813b653c5bca2e8acf756b26daf804f197eeda8b9cebaf4dca020346cbb34e2,2025-04-10T15:16:03.860000 CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 CVE-2025-2989,0,0,45a6c1ba1e6cd2d5c62dcb10c0528d36d57eceee6f8ab3df2269f6315f9c7634,2025-04-07T14:15:04.880000 @@ -287884,13 +287885,13 @@ CVE-2025-2990,0,0,63b80882efd0082cd3dd0dd95bad15058c1aab581ab83abc6f91191eb5a71e CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000 -CVE-2025-29908,0,0,8aeb00c2369ce053d9616f94a2754f8b0f66f1d044d827558778edbb12b2d21d,2025-04-01T20:26:22.890000 -CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000 +CVE-2025-29908,0,1,ed286b94ce021b1836ef56592ca48ec1a214ec77b6ff22e37e36590df3ff177c,2025-04-01T20:26:22.890000 +CVE-2025-29909,0,1,6569e640b74f77e0544991c44c8696aefefbb676af0455e12569d86dbd730a89,2025-03-18T14:15:43.803000 CVE-2025-2991,0,0,3cb0758e9ce30657d145aaaf0b8391bbb4216629efe9cccd7fc5f24bb2b96185,2025-04-07T14:14:59.393000 -CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000 -CVE-2025-29911,0,0,d7b0e552fc3731869e97762c6c81c5ffe46c14796263a964c630486b267f94f0,2025-03-18T14:15:44.023000 -CVE-2025-29912,0,0,f41e467d4eb0b486f0352ff3d8a22c27f72d3271f3ce2770d42821f527d056ea,2025-03-17T23:15:18.450000 -CVE-2025-29913,0,0,e7b5f4cfddc011754a65339ba8b2dd30ed9225f334f2b400d8c0caa53e62b489,2025-03-17T23:15:18.590000 +CVE-2025-29910,0,1,5b614ed38dab7d36ccf202e64b95e82ef1aee9a10776d58b1cc09c792d43a3fb,2025-03-18T14:15:43.913000 +CVE-2025-29911,0,1,c37fe79c34e9158af33ed7b8eff0d171e4d2a178ffb64ec64f2279f90b1649c9,2025-03-18T14:15:44.023000 +CVE-2025-29912,0,1,9af7639461c2f4f9533465a7ce3f19fd51f7f4c3ba4a6a6daf6167b2051e21aa,2025-03-17T23:15:18.450000 +CVE-2025-29913,0,1,feecba1f6dd2d61bae5885f49f2d1a8116a6529ce0ffe400b1b3e9a16cfa5164,2025-03-17T23:15:18.590000 CVE-2025-29914,0,0,8458456911f6c36f39a4613b540c6a9ec934384392033e5f4a6a2fbfbc99e487,2025-03-20T18:15:18.907000 CVE-2025-29915,0,0,d072197b7cdf194a35d763b053663d1bb62afb651dac76f7ff2189dcfa317633,2025-04-11T15:39:52.920000 CVE-2025-29916,0,0,9eb33819294178e88a876973f30a3d9c08539405fcda9e1897c28c6def1421c7,2025-04-11T15:39:52.920000 @@ -287903,25 +287904,25 @@ CVE-2025-29924,0,0,33ff2ffe448b023fe20ba1aebf83c3931032be11ba9e01550609a234d855b CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4bdc,2025-03-19T20:15:19.987000 CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000 CVE-2025-29927,0,0,9fe894281a445dc82cf58faae8c30ef1547051185123f2b9469125b69f8ac336,2025-04-08T14:15:33.973000 -CVE-2025-29928,0,0,a8d214b86a591a9a4539038c0623d4202e473916c9bd03bcdaaf6e157b8bec53,2025-03-28T18:11:40.180000 -CVE-2025-29929,0,0,25d530e1688b0222548f72f700e2cd59c64c8adda5f90b1907d220f762d09909,2025-04-01T20:26:22.890000 +CVE-2025-29928,0,1,e7378b2e927fc5fc3ba1dc54c402e9255b7beb92fd05fe3fde032f3211ae2ede,2025-03-28T18:11:40.180000 +CVE-2025-29929,0,1,06230861f00f04282a399bae0b4f7ed97a7506f13e695c7ff98910d0d0c5aa19,2025-04-01T20:26:22.890000 CVE-2025-2993,0,0,f1e29c0453dca825aef2d68be3449f02117216671238524fb942bc1ad682ad72,2025-04-08T14:00:57.463000 CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000 CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000 CVE-2025-2994,0,0,3998d75b7f0f42041f2d8938e2e7cae9fc19fcfd6624d2244213d422cfb3dff5,2025-04-07T14:38:29.277000 CVE-2025-2995,0,0,5436a78f06a70eb8d33e1fe2c9cd6f31aabdc45a26a44233afe5c6b73ef22b68,2025-04-08T13:05:30.387000 CVE-2025-2996,0,0,ed0c2bf67d75b7c11a9588f001f1b50b2ae957ae2e7644b79be0a93f378f18b1,2025-04-08T13:04:38.877000 -CVE-2025-2997,0,0,bc69099f8d7511956f428361eaf24eeb839dd67cac5eb37cbb44b2b22459dbf9,2025-04-01T20:26:30.593000 -CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36c0,2025-04-01T20:26:30.593000 +CVE-2025-2997,0,1,4139ef89de80d3c2a98f2b7dc08c14eb156091d7ef75661a786531e94ae59264,2025-04-01T20:26:30.593000 +CVE-2025-2998,0,1,f06516e01ca436e5d104d75c09e27010d33dfc4165ed7c41c61b0ba2b3ec8a59,2025-04-01T20:26:30.593000 CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 -CVE-2025-29981,0,0,0cc2dcfb5af6923aabfbdf35cc06825eda3d5f1d817d89ebee60d30dc3aea5db,2025-04-02T14:58:07.527000 -CVE-2025-29982,0,0,23affa7daecc4825576e77403823b6557774b9426b2d4d0f7cba7e9e66506adc,2025-04-02T14:58:07.527000 -CVE-2025-29985,0,0,2aeb5a8f8ec35aa18845c0d4af21956a36a7c943d3b098b90b6c6bf8f695e5ce,2025-04-08T18:13:53.347000 -CVE-2025-29986,0,0,99c178153f6bbbad7e209292a65a7c4e43cf8706f8ea6bc3168202624c16c250,2025-04-08T18:13:53.347000 +CVE-2025-29981,0,1,bc2e92e7c7060096b3d1962707be8389c3bd356ce03926ba8bfa8db6b09023fa,2025-04-02T14:58:07.527000 +CVE-2025-29982,0,1,07e38f4a7e83f4e02dd67a856ae6395d2d06b5a3b56ffb75e9f9faa0ed4b7ed5,2025-04-02T14:58:07.527000 +CVE-2025-29985,0,1,1eec117dbf1705dbb49dade4527f2796a0b3e1a4a8df53018f9374af083df05b,2025-04-08T18:13:53.347000 +CVE-2025-29986,0,1,ef87710ecf0b1b3921f667539fd6bad7e152cdf84671159872c1fc43b230a3bc,2025-04-08T18:13:53.347000 CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000 CVE-2025-29988,0,0,fffff8af5716bb267ee4d5abcd24a0f0916ef33883d34ffbf12f21ae885514a4,2025-04-09T20:02:41.860000 CVE-2025-29989,0,0,e2fdf532df3b2870ffa6f257a00c0b3d859a1f380de574d1390c4381e0184a0c,2025-04-11T15:40:10.277000 -CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000 +CVE-2025-2999,0,1,b7b151a817dcad51b88750027dcb57353ea552e9a954406bfed1cf34f15b2683,2025-04-01T20:26:22.890000 CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000 CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000 CVE-2025-29994,0,0,8b1d4c4db8a5bb026ac4bf9b653f3b25d05b3b75f8c87e310d6dd90fa8b8e6c7,2025-03-13T12:15:13.660000 @@ -287930,41 +287931,41 @@ CVE-2025-29996,0,0,d9ce8180be5b647a2760a5e1584c793faf6e1ad0f69620939820540427591 CVE-2025-29997,0,0,23c5a96e3ca55a349666d8f7b75c279d7c1f39d20cf9fd2507bd7cdd234e7b90,2025-03-13T12:15:14.127000 CVE-2025-29998,0,0,3f15888bdd465d14766f235864b3d61f644d43d3eb6a7cb983806db35738379a,2025-03-13T12:15:14.277000 CVE-2025-29999,0,0,8b8d91b56d225972b60395d0c4c52c26c06b3c4add7a35dbdf077f8b6c072743,2025-04-08T18:13:53.347000 -CVE-2025-3000,0,0,ae1877066464f53804bc7b03ebb1b9d13c43cf43cde1adbea92f828110fcc0d7,2025-04-01T20:26:22.890000 +CVE-2025-3000,0,1,571e9426cbb44178ad1ca91dbdea20603a51acde8d2349f6480c5ee72127aede,2025-04-01T20:26:22.890000 CVE-2025-30000,0,0,affa6abe4dc1f666ac7528d709b6ebffe6f6752eec94a0822b7e3a349ec798e3,2025-04-08T18:13:53.347000 -CVE-2025-30004,0,0,73e410cd8c1771ca59aa80fff53e7e0cfccf00b0105ca49a3494abebe1dc7b1d,2025-04-01T20:26:22.890000 -CVE-2025-30005,0,0,e545c32af86b79a8f709b3efabb24b994072a6d6325d7acaca8653d3031c0594,2025-04-01T20:26:22.890000 -CVE-2025-30006,0,0,c398c238e98621e23bd6b30abda93469f6d677d63847ffe76c3e73fbb2a98915,2025-04-01T20:26:22.890000 -CVE-2025-3001,0,0,27bffbb3e7b3c7258a825a0570f29d054bd03ad9a07c098cbfafe6044bea1c9f,2025-04-01T20:26:22.890000 +CVE-2025-30004,0,1,43ca7c438aa8e5dfd1fefaee24baf16778c8fbfcd7d0c20a1449a50f39acfd98,2025-04-01T20:26:22.890000 +CVE-2025-30005,0,1,588733151f27521b0597cc9d231bc7598e91d83dab1486a6a3e348e5d843b749,2025-04-01T20:26:22.890000 +CVE-2025-30006,0,1,f9652beaebd92099f68951291403e21d350646c1e4903663e1c1da957fbb1e13,2025-04-01T20:26:22.890000 +CVE-2025-3001,0,1,c538808c84bd2b78d6f6a29fe950698dd7c9125e8ce0673e6e42da2eb2d262b1,2025-04-01T20:26:22.890000 CVE-2025-30013,0,0,7932d8a85b9d770212454eee3b98c50b358df4b36d71db8888c54d58043de0d7,2025-04-08T18:13:53.347000 CVE-2025-30014,0,0,054d315989d45087bc8a7fd9952992c725b3784578faa4359fbd402f71c020de,2025-04-08T18:13:53.347000 CVE-2025-30015,0,0,1eb229a1f73e87f3b32a8ef5421619245cc21612830ccfd462f12595315a6145,2025-04-08T18:13:53.347000 CVE-2025-30016,0,0,689b905437064d0cd5bb37cc2d942bb6a7f8f784026b78ecd17897b0fd6d840a,2025-04-08T18:13:53.347000 CVE-2025-30017,0,0,00658069f31d7627dd093fc0ae9980c39830f453f77654c8854ce5faea559458,2025-04-08T18:13:53.347000 -CVE-2025-3002,0,0,091ec418c4fe34b31a468958501cb85d78c731a0031e80a884c36ea5dec34f9b,2025-04-01T20:26:22.890000 +CVE-2025-3002,0,1,def267358c52e4c89faa8bf9ac0731f7c476f33a9876437bdfb732dfed477e80,2025-04-01T20:26:22.890000 CVE-2025-30022,0,0,323cd273db7b659115dae67e365f1f9a2dade36f53e606c124c9f18a94e682e6,2025-04-03T15:52:18.500000 -CVE-2025-3003,0,0,37c02fb463f5c8a3a1dafcb39007a61a21e6fd3e14e7eb7da2154db9529b35a1,2025-04-01T20:26:22.890000 -CVE-2025-3004,0,0,8042152ff490d2e146d60a023d66e91fa753f91c94b45c443e0d744c6e9a89c3,2025-04-01T20:26:22.890000 -CVE-2025-3005,0,0,83c2b2a70a550d4a6c8e1a1f6935b07d00d86944febad7db7be72bdebca42a52,2025-04-01T20:26:22.890000 -CVE-2025-3006,0,0,b148bda232b4ae278c90e7cf899bdd3025264d8ea920cb3dfefd652f369302a0,2025-04-01T20:26:22.890000 -CVE-2025-30065,0,0,3870ef7177281ff4f09a5255aee64701c3ef01d2b4a153660bfc98c0f9fbb36e,2025-04-02T22:15:19.823000 +CVE-2025-3003,0,1,b1704281c7e4af0a788d70daba53d8c84ffc80631325fb5a974d3344dd5121ae,2025-04-01T20:26:22.890000 +CVE-2025-3004,0,1,36aba762b5b06e0e88a1a94ee95bbbdab7ec34e173535a7b8bc4d3327ec9d700,2025-04-01T20:26:22.890000 +CVE-2025-3005,0,1,7e4a865e4ee85cd874bb02498cdb18c5b2d5479751617b71da07176aff5e4b7e,2025-04-01T20:26:22.890000 +CVE-2025-3006,0,1,8f397a3528f5d0b60a142ad5a2621559dc83fa627d15c908062bde88c2c96019,2025-04-01T20:26:22.890000 +CVE-2025-30065,0,1,48855dc8fa322ba16cf446c56f04e5f1fa5dcccdff9fee907f2f3d4a2aad0907,2025-04-07T03:15:21.750000 CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000 CVE-2025-30067,0,0,3843c785594bc5e1c732a61f3e083d60771e2437a750335f1f735e5b5e49877c,2025-04-11T18:06:34.633000 -CVE-2025-3007,0,0,cf6ca44c81194e87c5d14f59676cf6026888c665f4ee2ec76e7e2ceff83021f0,2025-04-01T20:26:22.890000 +CVE-2025-3007,0,1,ed5ca966a5d6c670bcd7c0963249f56c27ee4a17d41d6ff0c30c54e87115ecd1,2025-04-01T20:26:22.890000 CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000 CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 -CVE-2025-3008,0,0,4072cbcc8b8d11abb2e20e3c9ae8d582d11c7182090e6f72ac8496b213ca1555,2025-04-01T20:26:22.890000 +CVE-2025-3008,0,1,4fa12c242f5a8201f6c22d962975bdb56f1fb8d6331510acdd26a20f396a03fb,2025-04-01T20:26:22.890000 CVE-2025-30080,0,0,6601767310f6b7ebc1eb1888b6410ba2af316c611e92066d1287334c8340e695,2025-04-07T14:18:34.453000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 -CVE-2025-3009,0,0,a79bcb763e3b79429ee2d640c4471f340985411ec32a903c02c9d1ef9d3cd8f3,2025-04-01T20:26:22.890000 -CVE-2025-30090,0,0,9256f232be9f762b42c5dfb6c6bd114477d3a4fae494b6c04cb30d629656ada9,2025-04-02T14:58:07.527000 +CVE-2025-3009,0,1,2ece19ca671196966292028f4305ecb7262e6ccef463f1ac76d0f4bb8322457d,2025-04-01T20:26:22.890000 +CVE-2025-30090,0,1,bfa905d9aa408c1f2585d10b532f402f67ab61becc7dc968d47593329efb248a,2025-04-02T14:58:07.527000 CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 -CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000 +CVE-2025-30093,0,1,1b6f9f05e31019a953ba5e0a3595825a9aa3d03b71a7b0fef4f489c7f79cb737,2025-03-28T18:11:40.180000 CVE-2025-30095,0,0,93e17bec8d1cf481725cf4f9bcf311125c6633428f3ca644a0806bd1e05b67db,2025-04-11T14:15:24.813000 -CVE-2025-3010,0,0,9412a302f4c2a093e2cd2a4cf268e70fcecb0f7985ebfed44aae7bd7e5423926,2025-04-01T20:26:22.890000 +CVE-2025-3010,0,1,0be162920eaabdfafeeb15da6565caf83eea25a19d64f9d941d63d7a5862718e,2025-04-01T20:26:22.890000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 @@ -287992,77 +287993,77 @@ CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f9 CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000 CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 CVE-2025-30148,0,0,29af0e59843efb2e7b8c69e1b7f2af701bb5cce0280381a18f1bffe78cdaf0a3,2025-04-11T15:39:52.920000 -CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000 -CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000 -CVE-2025-30150,0,0,78c0a67cc85c67ebae2202ed81d36fba73d24dbd816d4eab529fd509b9c71b6c,2025-04-08T18:13:53.347000 -CVE-2025-30151,0,0,2a8d368b6af639e9763bcb11bea6817909b13b4f025a6b32a64e4e4a25829b1a,2025-04-08T18:13:53.347000 +CVE-2025-30149,0,1,ab0a07e66a00efc10ffd3507898b414b26c290aaf077498455fdbd14ccfcefee,2025-04-01T20:26:22.890000 +CVE-2025-3015,0,1,1a9600aa1cdb68fd6d8fb628abad6f46be76035ead546d7314d86cfce5302768,2025-04-01T20:26:22.890000 +CVE-2025-30150,0,1,cd318f97af1afc5ddcc3a58be3ef9678625f07c6c1c6e819a6613fc5579bd1ab,2025-04-08T18:13:53.347000 +CVE-2025-30151,0,1,55157c669ceabb8368a55e1d710631e42a1374b10357acd32f11a867c2361fa2,2025-04-08T18:13:53.347000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000 -CVE-2025-30155,0,0,9d214e59bc7bea4cc0dea753408518911001f2ae774c65e6ee6a86721f6305be,2025-04-01T20:26:22.890000 +CVE-2025-30155,0,1,73a90b4061b436b5d3315d16e7ed336d7d0ee9813bf9846d83eb14fdd6fcb239,2025-04-01T20:26:22.890000 CVE-2025-30157,0,0,242e1ed76bf2915a3dee7a5519b7199b1b19f384af1b145e763b2bab2e9bbb18,2025-04-01T20:22:34.500000 -CVE-2025-3016,0,0,e3addfa577527b31fe78d840bd5bba98850ae388103227e96443fecc2be775d1,2025-04-01T20:26:22.890000 +CVE-2025-3016,0,1,af2eb06d49c92f9bea4f8df9974b48ccc2833bdacab9c55324355433737640fe,2025-04-01T20:26:22.890000 CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000 -CVE-2025-30161,0,0,93f02337f899fffc0a069554c6055fbd6fabd15132725d35bb3b73cfadbf6d6e,2025-04-01T20:26:22.890000 +CVE-2025-30161,0,1,f82851224812cb6cb51198c61284f68a32f1e38a7fd3c0f7a0c3eb3e291553c9,2025-04-01T20:26:22.890000 CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000 CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb182,2025-03-27T16:45:46.410000 CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000 -CVE-2025-30166,0,0,412bdd08d8373a58cc6cb4c9eb2077f881c64072f235c4d1d06c3ef861b012b5,2025-04-08T18:13:53.347000 -CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000 -CVE-2025-3017,0,0,ae6477a257eae8225bc122e9d2ffd840d22d835e0499aad249230b11392c7bd0,2025-04-01T20:26:22.890000 -CVE-2025-30177,0,0,bc31f6237a8a75bdd9699eb57e1c446258bc4f357acb1c9dcc48b902103b6e3c,2025-04-01T20:26:11.547000 +CVE-2025-30166,0,1,dc8fa2e955f9b83b24c2517018cb3ddc4399710004f918cf05eb88fd63c78734,2025-04-08T18:13:53.347000 +CVE-2025-30168,0,1,3703f1f4b9dfa087aa1c5a98a4898da5aafd4533d5e73d111e4aa608fa2c614e,2025-03-21T15:15:43.440000 +CVE-2025-3017,0,1,98ff904dc48968379de3c001eb6b068a3a8d13595e1e3e62ce18b74891721501,2025-04-01T20:26:22.890000 +CVE-2025-30177,0,1,1bfbcea48aa1ea068670da36dff62558776eef3abe203d4326a5f744d663461b,2025-04-01T20:26:11.547000 CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000 CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000 CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000 -CVE-2025-30195,0,0,8f3f1b1a07ca04bd893228f3549f8ce9aa13eb155049bf09e210b92648e3a715,2025-04-07T16:15:25.850000 +CVE-2025-30195,0,1,784018ab366bcad0b0efb7501086c2cd2f6ec83f77099bd6262ec43bf6bd251a,2025-04-07T16:15:25.850000 CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000 CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000 -CVE-2025-30203,0,0,e800abc36567cdb1aba654be30422b80d90780ac94d6ea5cf2b8a4bf6a4b6384,2025-04-01T20:26:22.890000 +CVE-2025-30203,0,1,5db06c38cdbea2eb8c493695ff18560d3171df5fdf98e563249182ea23863bb1,2025-04-01T20:26:22.890000 CVE-2025-30204,0,0,a62a2febc5dc48c687f751c501a508130f5fcc004bb8b764581a0a0be25b0f0a,2025-04-10T13:15:52.097000 CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000 CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000 -CVE-2025-30209,0,0,ca85555ac6409e2cc639554bb6f23475b46a539ab4ead27cd69c29cc29e86660,2025-04-01T20:26:22.890000 -CVE-2025-3021,0,0,a6ef01df84dc9936813142153828caf3385ee07765251cfe8d5be4d47ab458ae,2025-04-01T20:26:30.593000 -CVE-2025-30210,0,0,2b70d3ad86ae4444d9b4205d6534163f15e8d5d179302fcbba5c48fe1c8a30ea,2025-04-01T20:26:11.547000 -CVE-2025-30211,0,0,d33a5774a6df695f88dbc7402e84e28608ec28f5c63a447e0230b78b38298384,2025-03-28T18:11:40.180000 +CVE-2025-30209,0,1,296b6bfd92b671240c888b0d7357ec25edc1731069d0df4d8d354cf96814c041,2025-04-01T20:26:22.890000 +CVE-2025-3021,0,1,a819f7885f966c318efce1137c78018078cd56f1c4c8d8cc0e7412d02d27b6bc,2025-04-01T20:26:30.593000 +CVE-2025-30210,0,1,11d34541e787589a54122d4a545ec492dcd698a87f2af888942feffab59f9168,2025-04-01T20:26:11.547000 +CVE-2025-30211,0,1,6f934d1391ac57ee0e441fec63067c5b8a66d2fe9be5fdffdfe7b65e836f01a7,2025-03-28T18:11:40.180000 CVE-2025-30212,0,0,972410e2716e8f2e53ffd488d4d423564ff98176b3c1d36a04eac762d7cbcb18,2025-03-27T16:45:46.410000 CVE-2025-30213,0,0,9bc622ae8e82b32e191467dd2fc76643485ad29790111a6b5bc5c8f5ed285211,2025-03-27T16:45:46.410000 CVE-2025-30214,0,0,18b0a8e5b0aa52930309829b5c50a4314f3b9445c89b2192f63b40d54ef90591,2025-03-27T16:45:46.410000 -CVE-2025-30216,0,0,43c8b40d5b8ca9992bd9d4ed5e077e8f5ec9b8f6662e8d35eec0ecffdc0d3de0,2025-03-27T16:45:46.410000 +CVE-2025-30216,0,1,4a4e5b54f04495c4df1b80922555eeaa5f35ae1f03a9f789985b2bdeebb439d3,2025-03-27T16:45:46.410000 CVE-2025-30217,0,0,255ed4a5f5d331010e4f8f80bb9c804fc57df9c07f06a9ea33aa8ab1adac0ffe,2025-03-31T13:15:45.683000 CVE-2025-30218,0,0,0938dca1e8d47564f064f28410796b8b85eb62ded957e7109b8e0c2e3158457f,2025-04-07T14:18:34.453000 CVE-2025-30219,0,0,326f919a01c3e200686e1e77066b4ecd3788d0deb365cd59968de4fd276ff7df,2025-03-27T16:45:46.410000 -CVE-2025-3022,0,0,61907d4ed0a1c64223dc3e8861bf6d95a3264ff1fa9779784da4b246ad786f11,2025-04-01T20:26:30.593000 -CVE-2025-30221,0,0,6ae53bdf0345b96392a165c31ba84cf22b0d6efa70d330536507ae8f41f720cb,2025-03-27T16:45:12.210000 +CVE-2025-3022,0,1,3e5c3522912a5af9f22a50e01e2ab86007dcf43ad518eed68ffde4cec152f888,2025-04-01T20:26:30.593000 +CVE-2025-30221,0,1,b78962d7d374d57624c57c2bd45520ed73de256e6210780692f628d0e7b67d45,2025-03-27T16:45:12.210000 CVE-2025-30222,0,0,8181bb8e50b5d5403e3aeeed651e80d360ebd306c6c001c9fd5d8239df2af092,2025-03-27T16:45:46.410000 -CVE-2025-30223,0,0,54d10cc19ec596f2354e78313bc03ff808d7e9aabf67e3a4cc17f3efddbbf77a,2025-04-01T20:26:22.890000 -CVE-2025-30224,0,0,6b55cd1dce8d9e2d18e09ee793dcde18a48cd48b73247b636899e771df325b52,2025-04-01T20:26:11.547000 +CVE-2025-30223,0,1,31b61b937326178d46925dc0ef3d6b549ce269034fb63371f6368418121b1ad9,2025-04-01T20:26:22.890000 +CVE-2025-30224,0,1,5f978e3ac7d3d27f608317cf753f50f8cf3c6a501ef0fc849e2387751d26f0e7,2025-04-01T20:26:11.547000 CVE-2025-30225,0,0,cc37e4f779c1e97cd26219457ed556549a6b6364424a050cb8b68a80d988d93c,2025-03-27T16:45:27.850000 CVE-2025-3023,0,0,c0506f7d95f0b17e7bc0a73f1252e5bd69aa40179970119460c1a5bbe9e48c68,2025-04-09T23:15:38.053000 -CVE-2025-30232,0,0,d8f8a7b7969436fc63ce073fd14636bd35e3c03c930952f5855db44b35d714d7,2025-03-28T18:11:40.180000 +CVE-2025-30232,0,1,eeb8ece2fb628c02d10a566625252905e84a897de93ba8f383987da02d0cb6af,2025-03-28T18:11:40.180000 CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000 CVE-2025-30235,0,0,9222f9a2278ce550ac692bab27bb8a819d1de8dee62df51cf264df3162d55e58,2025-03-19T06:15:16.043000 CVE-2025-30236,0,0,3f73c2c498a83243d93d66190e1e818a0ccbcdd521592f269afac288686f067a,2025-03-19T07:15:34.313000 CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9ac24,2025-03-19T20:15:20.140000 CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000 -CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000 -CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000 +CVE-2025-3026,0,1,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a90,2025-04-01T20:26:30.593000 +CVE-2025-3027,0,1,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285f7,2025-04-01T20:26:30.593000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 CVE-2025-30280,0,0,33b37eb133e77c5bc63348da26bf3cd4729f94f78e16c3e659bfc301d53c6a05,2025-04-10T09:15:16.237000 -CVE-2025-30281,0,0,2dec1c832fffa187130084e6cb83715a38793905c1f714d3b105c90a7c21fef9,2025-04-09T20:02:41.860000 -CVE-2025-30282,0,0,134c9e9371309ef607568f2ab29a5bb556b6d5ea08bd0d11d7351b30c81aa3a4,2025-04-09T20:02:41.860000 -CVE-2025-30284,0,0,efdc875862cd4020f426e186b7051ad0a744a4672e3858c9842b562858198414,2025-04-09T20:02:41.860000 -CVE-2025-30285,0,0,c69aa71c77686b2fb775e161c96dbb81c1d8e0221a26ca569d8fc53737c1c4b7,2025-04-09T20:02:41.860000 -CVE-2025-30286,0,0,227d34a181e790a3bd139bf54adb257bcefb5f8cdf3a4a218d5d78d4967b19a7,2025-04-09T20:02:41.860000 -CVE-2025-30287,0,0,4ab102af63f836feb1ee1361f4f626c74b8bfc1da6a5d613099bf34c7892806e,2025-04-09T20:02:41.860000 -CVE-2025-30288,0,0,fab9d4b6be3f11ddde174ef1c0ba5ea1b5cfe019120fc4f75d0164bbfa3239da,2025-04-09T20:02:41.860000 -CVE-2025-30289,0,0,f03f870fbab21604b7e9c47b051493357e365754f01d12cb8fac9619db593f3f,2025-04-09T20:02:41.860000 +CVE-2025-30281,0,1,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000 +CVE-2025-30282,0,1,a17dd9832b027f03ba6a75d738edfc9d501eb453a9d5c6408c6b0cc08654cbf6,2025-04-09T20:02:41.860000 +CVE-2025-30284,0,1,8e53e1c7c93960fd053bcc2c17b6442972477767d5d61a97f5c87a3737a9b037,2025-04-09T20:02:41.860000 +CVE-2025-30285,0,1,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000 +CVE-2025-30286,0,1,fee5b612b75884ec17abdbefbb8f2d26f78d165a956082e5f8a78ee1044b68e2,2025-04-09T20:02:41.860000 +CVE-2025-30287,0,1,5bb3e90b488dff71cae604222196a6c5f87ecfa19d3be5d2f564f0fe5cae828f,2025-04-09T20:02:41.860000 +CVE-2025-30288,0,1,2cd26c4e99eade9fe4bcc24953e47056f07c6d39632d06bceb551cd8d86f7707,2025-04-09T20:02:41.860000 +CVE-2025-30289,0,1,8f48179603b010834692b67823472cb86cc697c14e571abee7ed2cd3dbb4515d,2025-04-09T20:02:41.860000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 -CVE-2025-30290,0,0,c9fbfdf7b09a23e3abdc69e3f9166828f476bf7ab3116d5596fc23559c524311,2025-04-09T20:02:41.860000 -CVE-2025-30291,0,0,549c7c5b5b489dcea9c22b20b069fa41e1e04b9627f1574bbaaed2c9b99d8ed9,2025-04-09T20:02:41.860000 -CVE-2025-30292,0,0,86ef09882910daed67835ac808d17e7dc317d1c9f957e4b07d29c02a8d504f99,2025-04-09T20:02:41.860000 -CVE-2025-30293,0,0,b311e9fe96b82f01487abc0294a5add4e0dd8281c76ff0bee8eac4d09d1c5e68,2025-04-09T20:02:41.860000 -CVE-2025-30294,0,0,1c1d4be9eef830b01998b304e3d2775dbb6c21ca67f52442de7dd9c8e8ed8d76,2025-04-09T20:02:41.860000 +CVE-2025-30290,0,1,6f893833437291deb8fbb2322de2982f9eef638dfc164661994353e52e717a27,2025-04-09T20:02:41.860000 +CVE-2025-30291,0,1,be64480373a53935a5c873966693c9a68bd6c296cec2c80b4ad0a637f8d74fb2,2025-04-09T20:02:41.860000 +CVE-2025-30292,0,1,288ee8184606598fa06ab8359d36b9c03496cbe391e0e3db0838b6a31796a766,2025-04-09T20:02:41.860000 +CVE-2025-30293,0,1,db4f2b68590150fc49d9958b7bc828fd4cca7eb0d17ed45c39ceecbe6a2f01b0,2025-04-09T20:02:41.860000 +CVE-2025-30294,0,1,ac65318d95205a52bc76cf00ee37c391b744f644d390380fbff4be5d3c011da6,2025-04-09T20:02:41.860000 CVE-2025-30295,0,0,dc143ca0187d672e7c6ff588d91b302f09c8ef01a93f1300ec72037012254c74,2025-04-11T12:49:05.523000 CVE-2025-30296,0,0,d7e73be7425b9e4e00a6b9dff79676441c0907a978176fbd95fd7d3793c06947,2025-04-11T12:48:57.520000 CVE-2025-30297,0,0,956e4e25be750755bccfd8faa4814a05be03e3044492c2467838e4b6ff2f0ef2,2025-04-11T12:48:50.323000 @@ -288097,11 +288098,11 @@ CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000 CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000 CVE-2025-30353,0,0,8e65a7ad0acf611c52613ace8bbc6a0d71be7f9b2d98fcdd8dc95fe923800548,2025-03-27T16:45:27.850000 -CVE-2025-30354,0,0,5dfd79e839963dacd533ae1d1045edbad165ae9e4f05b41666c121d409d7b22d,2025-04-01T20:26:11.547000 +CVE-2025-30354,0,1,deadd34d6d342657137892bc006d159fa15a8c10ddd595cb3bf8e9b0e8f013c9,2025-04-01T20:26:11.547000 CVE-2025-30355,0,0,c181bb9f03178ada7f8864d95d9a7bf782ab89dac6c391740fa45089c2c71179,2025-03-27T16:45:27.850000 -CVE-2025-30356,0,0,76dc700b90de5d9324d0fb35cd7c56db1a547ff8ca3a792dd82535a7db147d05,2025-04-02T14:58:07.527000 -CVE-2025-30358,0,0,1336bf68dc77795212b15e968253b9b288e4ef6b51817854b1199a3a91700753,2025-03-27T16:45:12.210000 -CVE-2025-3036,0,0,9b0cf009578125197aa4aec620a4f3c05203c71ea759e4feb8ce4148704a9ff5,2025-04-01T20:26:22.890000 +CVE-2025-30356,0,1,60b8a1d16dc60d47897c176d787d328fb9e2b00427000c4c869d91e625d6fbe3,2025-04-02T14:58:07.527000 +CVE-2025-30358,0,1,ba82b45f3275f086cfe8fd2cd02599b2d0205f25d94443c7a1b8198759a53381,2025-03-27T16:45:12.210000 +CVE-2025-3036,0,1,8b560165610ee081e898e5e9b2907d7c8a45c746482d4145bd11439f712e0b7a,2025-04-01T20:26:22.890000 CVE-2025-30361,0,0,6695565d0777221a44204675142361643e1cf148fe09667f585673cf2a20e49e,2025-04-10T15:16:33.707000 CVE-2025-30362,0,0,cc4dadc795cc1f5352ed0bc9925d710102e2d8900e361590a007e946d9f05ff6,2025-04-10T15:14:58.300000 CVE-2025-30363,0,0,f5fe622f8f57b3897f9511b638bfb1838b97277957a4b88ee569e064f6b24434,2025-04-10T15:09:44.697000 @@ -288109,28 +288110,28 @@ CVE-2025-30364,0,0,65ce4609d61d8bd5e95466150b54bf2063234cfbdc356d4ff01f46c278d4b CVE-2025-30365,0,0,9c0f9b49527800bdc35cf5c662f5624ce7b9dbf6593318af09fa220ee41fb576,2025-04-10T15:02:52.833000 CVE-2025-30366,0,0,3e59a00133f9cbca6a7385d1e76cbe218fc6520ee49099a3535ac5b4b53a7ed4,2025-04-10T14:51:47.070000 CVE-2025-30367,0,0,ebca730a8d72b5f4485f173a5819d24614d6ac5b65610596d8243bfd10562e9c,2025-04-10T14:39:09.080000 -CVE-2025-30368,0,0,b2aca00a233d5e2699292734cb0b923e250cbf1cce34e6b5a6933288f17e45fa,2025-04-01T20:26:22.890000 -CVE-2025-30369,0,0,6c31ac6189e648775f6a98e426b393658f570141f22b2bcbcb5abe0d58ddc19a,2025-04-01T20:26:22.890000 -CVE-2025-3037,0,0,6a2907c9cfc947d4ec7113a8daddc7fcd9474b61d3079d351d22ef4c304e04d4,2025-04-01T20:26:11.547000 +CVE-2025-30368,0,1,54d10822d93ab69bf73ab0199ab9410ed73735db03fe6d89093d91a8916e09ca,2025-04-01T20:26:22.890000 +CVE-2025-30369,0,1,7412c62e90d5e3220c161795a9019d5e7bfe5a889eaf1873e87c11a292e4155a,2025-04-01T20:26:22.890000 +CVE-2025-3037,0,1,886d48305a6b5a336fe2d42d2ee117171b630af941071b4684c6f67945ecc485,2025-04-01T20:26:11.547000 CVE-2025-30370,0,0,2de42281682fa273e344bf2c04c64567a3dca7296e2e179568bc67f79e5803cc,2025-04-07T14:18:34.453000 -CVE-2025-30371,0,0,460a9e9c642c5d00739d5b5e11ddec1f7f2ad086735daa8cc9c39d2d2cc86b2e,2025-03-28T18:11:40.180000 -CVE-2025-30372,0,0,e366784170fd69403c95573e66e81140f6ab7eebcee57a3b740e41f187b2c54b,2025-03-28T18:11:40.180000 +CVE-2025-30371,0,1,8ff85bdbf2a4594146d78a4da113723d7e8bf8a5680b38bebfd9011a19854cc9,2025-03-28T18:11:40.180000 +CVE-2025-30372,0,1,32daa4e3d93b30f2b744ee52f4396440a5c163a53bf54c8f5b6ab05c81ad326e,2025-03-28T18:11:40.180000 CVE-2025-30373,0,0,9fd9207fa251f338adafa2796470af71155f3a2c3aa1274f47f5a2901265696a,2025-04-08T18:14:17.307000 -CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000 -CVE-2025-3039,0,0,8412b53044798e7429c2f1e43b2eaff144fc88ee266808028d00fb7035e9ff90,2025-04-01T20:26:11.547000 -CVE-2025-3040,0,0,274892af91b4ed207c6fb8d845fb283c63d995b076d284b90cfd8062dbb59a9e,2025-04-01T20:26:11.547000 +CVE-2025-3038,0,1,7234e6f6a94363915d71af8eaa721ba5266f9fea3f40b45b2439e5206630faa1,2025-04-01T20:26:11.547000 +CVE-2025-3039,0,1,846a42b19421afceedab84a2e86fa6d7400b7dcea08d5d7721ac60a629dd9b39,2025-04-01T20:26:11.547000 +CVE-2025-3040,0,1,a1e6fbe8160fa81005d502057842330cb2ae7690c502ccb75ab1e381046694f9,2025-04-01T20:26:11.547000 CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 CVE-2025-30406,0,0,74f4728a8207a8430cbf17dc69c2eb699bb9ba65d3a42f780e840730c437994e,2025-04-10T16:19:51.107000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 -CVE-2025-3041,0,0,d9fe1e53f2cdd91c8975c5476eceec361ea81e0c3d05a42ad90016292a4f1e02,2025-04-01T20:26:11.547000 -CVE-2025-3042,0,0,fd88736e20fff4d6fb751d6092858797dcfb15be28c6cc70538ea93c2bdbe3e3,2025-04-01T20:26:11.547000 +CVE-2025-3041,0,1,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000 +CVE-2025-3042,0,1,670ae0eb437b93f09d8021319b85476af0f31022941a26149d0aeb898aac3fc2,2025-04-01T20:26:11.547000 CVE-2025-30424,0,0,3789e69e0c0627fb3d4b0cd0d09461afdf6505fb271be8ca155757c7fcc2c17c,2025-04-07T14:07:27.610000 CVE-2025-30425,0,0,06357d7ee132ba4c469ba9db3ba7117542d2ac6d6c1651591ac34dd91912976a,2025-04-07T14:02:29.640000 CVE-2025-30426,0,0,67218cb8c1548e7cc99a86578d3b070614ab0fc301b7f834f5cb9b7993ad3575,2025-04-07T14:02:24.553000 CVE-2025-30427,0,0,cf48e27c4cbdd98b0d7d29e8502315c6669cb5e854c6998378b0d4c0bccf4fc9,2025-04-07T14:02:18.690000 CVE-2025-30428,0,0,c263495f27f2ab29a4f44c244beb29d1610c61619e51c7c5cf2d36174c135a08,2025-04-07T14:00:54.200000 CVE-2025-30429,0,0,7861bda20adb14488f0669e6979274a5ad1ede3c1353582b694cd47e34bb680d,2025-04-07T14:00:46.650000 -CVE-2025-3043,0,0,141d094f9a6fee6289c9cf81ae2eb5b11251d987d0044ba7d57ad91903b1eb23,2025-04-01T20:26:11.547000 +CVE-2025-3043,0,1,0244123c48bf874cd0fe9c941c32b47edf764564ef1ed10f33d6e772dacd8687,2025-04-01T20:26:11.547000 CVE-2025-30430,0,0,d0a27d23901069fff955b7c3e64d24c948d08fcd8c401e76e799ebbf14f75da8,2025-04-07T14:00:38.887000 CVE-2025-30432,0,0,5a09d7b1ed58f6785ad0da877c85d095b778b3a6b62862b9696e2dae63ead051,2025-04-07T14:00:33.353000 CVE-2025-30433,0,0,83ca60af644a225f8112f888ed9efd7acc7ab4f4c2a49e0d182168b78ca6beed,2025-04-07T14:00:28.420000 @@ -288145,7 +288146,7 @@ CVE-2025-30444,0,0,7012499cc39e750a77057d8969c8b8cc9bf8b8609bf143b9cc39bc30fc25c CVE-2025-30446,0,0,981dffbeeed7b6d0a133a31354b5639e18efeb1f940bfa1a46bd0e35bafba0f8,2025-04-07T13:32:49.590000 CVE-2025-30447,0,0,203471f1d33c3097ff3e7033ccb86976a2135c3fac1bc3d6f9d9447f0c63a815,2025-04-07T13:32:38.797000 CVE-2025-30449,0,0,803f705e11846ad27b3daa6777d882e147b1edc94d42ae75dc7a301c5de3d9af,2025-04-07T13:32:19.277000 -CVE-2025-3045,0,0,d1bb69c29a142292c5068648f022094677578a135ca579006924bfb19a4ea68a,2025-04-01T20:26:11.547000 +CVE-2025-3045,0,1,8708e77c577cddede4bd38337075f9bf11a069178544fdfe0259b6ff0a521562,2025-04-01T20:26:11.547000 CVE-2025-30450,0,0,ceb3652814f5346aa7f7f08f9ac78cb2fff53f15371617b13043bdf57a8248db,2025-04-07T13:32:13.027000 CVE-2025-30451,0,0,a58165541c3f501bbc882a86fac75fc8ba8f191c9a6326ff9e9bcbfeb1b29f2f,2025-04-04T19:41:29.893000 CVE-2025-30452,0,0,a83dffe8a5e88ae85cc126634bfb79382c5cb2d9ed7d0248af1e53658f132d4e,2025-04-07T13:32:03.890000 @@ -288162,16 +288163,16 @@ CVE-2025-30464,0,0,162cd6362752c0f31ef3dab640c358c1acdde6a03810f6f12a55bd6714d97 CVE-2025-30465,0,0,6662e5d084f4b08d9b14aed1394c2c5112e2e03c0e03b4486bd615995b89d730,2025-04-04T18:16:13.317000 CVE-2025-30467,0,0,a719241a9705392d42f30d7c189aba650161488350f36a52aac6c1d3080c65bc,2025-04-04T18:15:47.390000 CVE-2025-30469,0,0,12dc8780539236a700bd1bfbc0ce6f4be605db998e5fb59430520d0b2b69f417,2025-04-04T18:15:42.680000 -CVE-2025-3047,0,0,a30c36369bf3e12cbd7e65026519106518e3e5f822a760b35651157c31c62e14,2025-04-01T20:26:22.890000 +CVE-2025-3047,0,1,cfa884e8622bfe4e7e55cdf5c7dcf2b226d404ef83a560c54bf8e30b5596fe5f,2025-04-01T20:26:22.890000 CVE-2025-30470,0,0,74bfaf44e0681d163fdd1bb7cb5edf9226008c5405e279c34157c5a94d199b90,2025-04-04T18:15:36.720000 CVE-2025-30471,0,0,9269044bc98a97554e0c019dea428a665104b61258abc5e9fae7c043683161e9,2025-04-04T18:15:26.537000 CVE-2025-30472,0,0,a9a589c92e85a7dd5dc78fc910cf31729074e91942c97c7d1b5338ab1df8371e,2025-04-01T20:28:02.283000 CVE-2025-30473,0,0,8461d69cdaaa16a1fdab0a9d9240078880cdeac254bb6fd759f3f7e6fbd8d899,2025-04-11T12:59:03.450000 CVE-2025-30474,0,0,eb6c167d1736e5a0a05d76dda95c9383453e456c61b97e97ddf0c32b61180eb9,2025-04-01T18:15:30.003000 -CVE-2025-3048,0,0,8c9d9ed36af65f4d6aa3fb74d6647d88f2ae80886b1a7fcca7e2b0a1fc1e20e2,2025-04-01T20:26:22.890000 +CVE-2025-3048,0,1,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 -CVE-2025-3051,0,0,191e4438cb371e2a15f1e0848098419500c25d30e4bc0eb4a4497eb60bb0a69b,2025-04-01T20:26:11.547000 -CVE-2025-30520,0,0,4594ffcb887663f1dc394fd83a45832001aba3082bc418a07983b58e49399108,2025-04-01T20:26:11.547000 +CVE-2025-3051,0,1,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 +CVE-2025-30520,0,1,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000 CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000 CVE-2025-30522,0,0,ab298bed764aa241f7fdd86556fbb1b68374df7068fea4de0fc7d11feb11540d,2025-03-27T16:44:44.143000 CVE-2025-30523,0,0,27dd8edc00c6d2ce64b6c4519874b126f4e153d04e04c3150119a6c112a3e071,2025-03-27T16:44:44.143000 @@ -288195,11 +288196,11 @@ CVE-2025-30540,0,0,027ad62303196b2408a12b619a7e82a7eea9f2d76f6ec953f52cd9b024955 CVE-2025-30541,0,0,c9ccc98d7f873fc7ac86e04f81077705c5cbbc92cc2c3985346a5525a21731c5,2025-03-27T16:44:44.143000 CVE-2025-30542,0,0,52bce21f108ce1978b39b8b0c66a657f959f5438a178c25fef8782cd688ff94d,2025-03-27T16:44:44.143000 CVE-2025-30543,0,0,5ad516d18373b51e8e99263cd406e2c210c8061490c706a563472f28c040096c,2025-03-27T16:44:44.143000 -CVE-2025-30544,0,0,64e236ee5cddf0e9399a274958ec8904df815e184d17ae4a3b836bbb540cdcdc,2025-04-01T20:26:11.547000 +CVE-2025-30544,0,1,0bd2ea292ab3530c3dd2760f2219d24d8f30b973d65d899af4f15cddf3132ab7,2025-04-01T20:26:11.547000 CVE-2025-30545,0,0,d348ee3ed7ebfefeb5900abf5776dd35d559bf5e295114746f8d29f8af3f54bd,2025-03-27T16:44:44.143000 CVE-2025-30546,0,0,1047a478f20c90c432b62448475883ab92d6d3e414334fe3093939208ac18fce,2025-03-27T16:44:44.143000 -CVE-2025-30547,0,0,df818ec537214afc029633084805d1f25dda208a30c42204d78402560a7f4b7c,2025-04-01T20:26:11.547000 -CVE-2025-30548,0,0,15945f69c342b314fa52a72233833c85417f1ad0c276596f43015fd338439b14,2025-04-01T20:26:11.547000 +CVE-2025-30547,0,1,b5dc99d925ae51433091b45bce10dd3c06529e627265c4d78d0989f88f0cedd4,2025-04-01T20:26:11.547000 +CVE-2025-30548,0,1,1f1c4d7c0cd9c8a0569a9998002c5af52cbe1c56bbe2d2605cb7acfed07b4f3f,2025-04-01T20:26:11.547000 CVE-2025-30549,0,0,b2b1de6341113f4fbb9d879074548b0dc8cc7edd63dc810da06bf5336f97af6e,2025-03-27T16:44:44.143000 CVE-2025-30550,0,0,41b5245fcd0b617f004ff2ce804a57dea117699496544bd6b4a90f8d3444caaf,2025-03-27T16:44:44.143000 CVE-2025-30551,0,0,9aaa7b60d24447e720a2920b3348a8170045c09e9e2e6a155d49167a18ee4d9a,2025-03-27T16:44:44.143000 @@ -288210,17 +288211,17 @@ CVE-2025-30555,0,0,f8220e84c2f9054bd92a63b05fb7525e12a6c3644273d6174ddb537107a5c CVE-2025-30556,0,0,9427ce0496ac92b40f89de403aaed996ddfdd8f3b9b5c68c1fb05b6f9ecbc0f7,2025-03-27T16:44:44.143000 CVE-2025-30557,0,0,881ab91cdee8f8b192636cc20dfc8e01b859d837da9a2bf2be916b02b0d23934,2025-03-27T16:44:44.143000 CVE-2025-30558,0,0,6094686e0f2b739755e47399f0cec01e9beac1f78ddf2c8d069c396bc088b2be,2025-03-27T16:44:44.143000 -CVE-2025-30559,0,0,8660b6019d391f9decb645ec87c73dc54ecd47615f698904d2713db2452fe6eb,2025-04-01T20:26:11.547000 +CVE-2025-30559,0,1,35d567dae51326c272326fd1ad46fe1a9fa4c3e31f83eb87077ea7b71563da8e,2025-04-01T20:26:11.547000 CVE-2025-30560,0,0,d65ab8f0fe34177baf190fd136d781cccbfc187c572b66fae92504331257b6ba,2025-03-27T16:44:44.143000 CVE-2025-30561,0,0,807a983c59a39d34b7031b8ca5ea01e804f6f789e50e63803ea31b39b407baa3,2025-03-27T16:44:44.143000 -CVE-2025-30563,0,0,83606059c1172297e55de564656b5799dfa6b2276c3fefe512982d7ba5a4d0a7,2025-04-01T20:26:11.547000 +CVE-2025-30563,0,1,29a38ee73e713ee9c8a75dbd238ee18ec709e417c2441fcd368b809eb66dd8fa,2025-04-01T20:26:11.547000 CVE-2025-30564,0,0,8ff729f6f53be23b41fbccbc3f8f7b9a34118cda75b7737519686fcc4123d3d4,2025-03-27T16:44:44.143000 CVE-2025-30565,0,0,242441067faf6d08b583408d69923ff5a0722b9f6175a491b7bf7f8915405099,2025-03-27T16:44:44.143000 CVE-2025-30566,0,0,5a2172ae9024a2c1c79725b1f0d375f2c75ac5345e5aa87ffd4a063c7471cc01,2025-03-27T16:44:44.143000 CVE-2025-30567,0,0,8df22289d55107bb22c6b7333359d0526c61a43767d0737add98471f9eec39b6,2025-03-27T16:45:46.410000 CVE-2025-30568,0,0,f07f5089954f3a61fc8a1d784979ddaee091f57ae896e38dfdb35a832cabb013,2025-03-27T16:44:44.143000 CVE-2025-30569,0,0,6e2cc7790fd359e21392e087977434952d3ed1c250a6ca8a71d590371792cd3b,2025-03-27T16:44:44.143000 -CVE-2025-3057,0,0,ea00a669d66133bdced4e5bd1b341f71e15350cfd20ea13039afbe563dee8a67,2025-04-01T20:26:22.890000 +CVE-2025-3057,0,1,3a98271f543a0ebfce19e46093c31413afe8271f95f729cce5bb977f5c484b39,2025-04-01T20:26:22.890000 CVE-2025-30570,0,0,531efd7bacb4bb9f98129475c50533d9631939b67de9e05cb7f60a8530b3a911,2025-03-27T16:44:44.143000 CVE-2025-30571,0,0,40e0306629b04fc558251fc2eb3eb1efc39c9ecd97a560a361c2c07e05f21b88,2025-03-27T16:44:44.143000 CVE-2025-30572,0,0,c5bf033e3c54184cd7671ebf05f00dfa44bac5ea80a3888ef73f713b5f0ae4a3,2025-03-27T16:44:44.143000 @@ -288230,7 +288231,7 @@ CVE-2025-30575,0,0,dcc51f367f3e6f8a8f07bbf01bad9e8e6ec4582149d4b225c62c876d99520 CVE-2025-30576,0,0,e1d87ee2aace225dc7cca88448af9a1521f8ee6d8dd508d389e89e80435af08d,2025-03-27T16:44:44.143000 CVE-2025-30577,0,0,26e59d52b73762620dbae646b94e9c324eeb683a80c9cc4b66589a6dc0541819,2025-03-27T16:44:44.143000 CVE-2025-30578,0,0,df0e515b67de27403fead6b3a0d0605b0745ef6905beb293f877aee39986b25d,2025-03-27T16:44:44.143000 -CVE-2025-30579,0,0,4f2e87b73586bc3349d6362cae91577ffb28cf0c2a31af9a3e8ff58995e2529a,2025-04-01T20:26:11.547000 +CVE-2025-30579,0,1,da2f55024609e1594c641c65c436343740b52aeabbd2f346fe4788234dc64bb1,2025-04-01T20:26:11.547000 CVE-2025-30580,0,0,6381da27fd12c08384ba9231a62ea0ef9bcef0c60a27c676b80196d25920a4cf,2025-04-02T14:58:07.527000 CVE-2025-30581,0,0,4d19dfdbed84fcf0c4e24e7260ec626ebeb80c300c7d2006ae0d8d9b7b8df858,2025-03-27T16:44:44.143000 CVE-2025-30582,0,0,06bee20e18d636e9fb3bca8f1b5af5a9bbc9d1eed3a33dd305728492366b1e0e,2025-04-11T15:39:52.920000 @@ -288240,13 +288241,13 @@ CVE-2025-30585,0,0,14d7c7d783fb9121b2fdb3a3e849a21725887aea98d77ce1ccc00debda093 CVE-2025-30586,0,0,750e9f0e62701cc7d9f85c333eaf38b162024e41f2640d54806c1fc995663945,2025-03-27T16:44:44.143000 CVE-2025-30587,0,0,aef2b2bea767d4d028fb9963d47d9ef91d920748cd1348e455c8f98cef841670,2025-03-27T16:44:44.143000 CVE-2025-30588,0,0,5f8ea50c75b9887ae4abe2a7a7e2e691cc44041310b1a21bc03b87349fdc8110,2025-03-27T16:44:44.143000 -CVE-2025-30589,0,0,3230a886dc892a8c34d42480a213b49ed85365d1673bcb3464ef1405fecb76cf,2025-04-01T20:26:11.547000 -CVE-2025-3059,0,0,e36109af9107728ab4eba7943098855c6fe26f1632aa6afb28b4ad32f6a0b156,2025-04-01T20:26:11.547000 +CVE-2025-30589,0,1,15773cb704becee413a74b6749590284568892c425cef543a7641c3e80da7f5e,2025-04-01T20:26:11.547000 +CVE-2025-3059,0,1,1a46bd9e152546c416b433b56866820f9e5f90971cfc01fb564212efdfb9974e,2025-04-01T20:26:11.547000 CVE-2025-30590,0,0,6b7d45d9af83ce5a497e5f8e2ad019e5a4ee6dc2d0a2103adeb6fa3f22fe0bcc,2025-03-27T16:44:44.143000 CVE-2025-30591,0,0,014b9e71f3c98abcf2a9b905482b5ac497717af9774ff72e16d99299de3ffcd4,2025-03-27T16:44:44.143000 CVE-2025-30592,0,0,4e34bd1a744c317f2ba8f1569663e07b4a2d3b4092f3fcc51cdc18a9a1768ee2,2025-03-27T16:44:44.143000 CVE-2025-30593,0,0,024687cd34e210c3a4e041cbb14b6cfbc26737464911576febd5f135641435fc,2025-03-27T16:44:44.143000 -CVE-2025-30594,0,0,a359b962b5b09e279ab7988741a4f936da2291cde955e6a822affaa07e034dd6,2025-04-01T20:26:11.547000 +CVE-2025-30594,0,1,a5cf46e5108c721bbb5934492dd8996cb555616c22cfc46132932ab358d65079,2025-04-01T20:26:11.547000 CVE-2025-30595,0,0,2ccaf3de9b2d19084c59840b555f29fd530c24e41c8ee52207abf0dd94f5c519,2025-03-27T16:44:44.143000 CVE-2025-30596,0,0,c8867e7627f6bf9e5f8b60397344794a5d3826e30d9d49410fa19d2919f68539,2025-04-07T14:18:34.453000 CVE-2025-30597,0,0,465a0cfffc1bf08488dd91b1b78e307e0ed131b9001b0e55154ec971452725c2,2025-03-27T16:44:44.143000 @@ -288260,25 +288261,25 @@ CVE-2025-30603,0,0,c18169dfdf84d8f7566ceb8955823a727f86a1502efecc185ac7e752b02f5 CVE-2025-30604,0,0,4fd83028bb8cb75714a6c74009fa84d06017ba7cf65f370fb28c177d95f16117,2025-03-27T16:44:44.143000 CVE-2025-30605,0,0,1a8f379ab851735b104191219201dee93e7e704108fa722481c61acae1b4b868,2025-03-27T16:44:44.143000 CVE-2025-30606,0,0,3fda21cbfff1ceaf50357d12669583680b2786f21c17b8b788e2e3b6a1b37507,2025-03-27T16:44:44.143000 -CVE-2025-30607,0,0,5a9c91b2974d01d63a092d4f363260173d2f77887366464ad05b48d35c1ba1d4,2025-04-01T20:26:11.547000 +CVE-2025-30607,0,1,9658008a10e8193e8a369726908af1b525c6335193ef8385c891b68f18fd20ac,2025-04-01T20:26:11.547000 CVE-2025-30608,0,0,825e7491b996140adf7dd6a39eeae1c55a2f7690d6671548c87a1971a0720b26,2025-03-27T16:44:44.143000 CVE-2025-30609,0,0,8f6ed469332895551fa211f0585b369678c30c39498f44e066d7e4e95089c81b,2025-03-27T16:44:44.143000 -CVE-2025-3061,0,0,b3eb113277a9356454ae1fd0e6003f5adde95036cee10a195aeb7ecf566c17b7,2025-04-01T20:26:11.547000 +CVE-2025-3061,0,1,95e7fcc411394e9accc7c3f6a13408f6250a0f6dad3ccc5ab0a25e7d36b5f468,2025-04-04T21:15:49.897000 CVE-2025-30610,0,0,ec88084413951b305562ff6f91b59671638140ba50ce684d6b4a189e21534b9b,2025-03-27T16:44:44.143000 CVE-2025-30611,0,0,4aefb28d1c6a55333d1b390fd18aa2adddcc4289ff7243d9c30acbd2c319bab3,2025-04-07T14:18:34.453000 CVE-2025-30612,0,0,c7485ffb3ce83ed6cebe65707c2ac8969d5b3b2810e79511c47ac4f3abf6ebc9,2025-03-27T16:44:44.143000 -CVE-2025-30613,0,0,bf83780e37531d113c5e946de85b24fab67250b5c412179811872090aa551180,2025-04-01T20:26:11.547000 -CVE-2025-30614,0,0,5e3e4725209301269dda45b394731ae74fc2846a1c3d272423aad826583e40d8,2025-04-01T20:26:11.547000 +CVE-2025-30613,0,1,0c5171149ba8dbe86c1ee2dc662f2172f7fe8fb37e312ea2b8fcfdba3febd535,2025-04-01T20:26:11.547000 +CVE-2025-30614,0,1,5dfdc083cb9680a6bcb162abc7bcbe37afbdc64a1696fd11cda0f2014cf04763,2025-04-01T20:26:11.547000 CVE-2025-30615,0,0,12254e1e5a9bf6df32594f8859495f558e53af8a30f333827891cbe7462c6e33,2025-03-27T16:44:44.143000 CVE-2025-30616,0,0,206da150c5b3587e782fa0c6870c4f5d10fc72df0b7660c7a2bff86b86ca90bf,2025-04-07T14:18:34.453000 CVE-2025-30617,0,0,96a2170e35bfa0565f616657a20e77a22f6adbc3a2ffebb29c467b0218588229,2025-03-27T16:44:44.143000 CVE-2025-30619,0,0,f97cb6d261a22354867f9064db313f9b626b3063c07f056198e438c30c115bd6,2025-03-27T16:44:44.143000 -CVE-2025-3062,0,0,9d9145646fe0736e3b54ca7808f0a348fa1710da829033f5779696e82ba5b4d5,2025-04-01T20:26:11.547000 +CVE-2025-3062,0,1,ef1b5c531480f2851a5c90acd3bf2a3b521701e8d1101b60cc1525eaa9141994,2025-04-01T20:26:11.547000 CVE-2025-30620,0,0,c08b515269c7c0e04b1b49f9e6c2ffe9756d4e917a1b7d90dc4cbb85983697a0,2025-03-27T16:44:44.143000 CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9bf71,2025-03-27T16:44:44.143000 -CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000 +CVE-2025-30622,0,1,9bd2a98d595e44c50c97ddf86c65a5579feb4c620992a32ef6ce2cea6b57a03f,2025-04-01T20:26:11.547000 CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 -CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 +CVE-2025-3063,0,1,390f40b4c1ca1b36f917180dc126df973d9565a65fe21ca2123be4dac4400ecf,2025-04-02T14:58:07.527000 CVE-2025-3064,0,0,f53e9a492cac40f0d95465aad0a29118d38f50ea14aaad499bc5a6be35199190,2025-04-08T18:13:53.347000 CVE-2025-30644,0,0,95d561ded9587cb69fef45c5fda1f89f7c9af2aa9fd87478f5c4656b29c7f89e,2025-04-11T15:40:10.277000 CVE-2025-30645,0,0,ed7653b3d826632934f86f3c58b93ab6e314d69bca3dd25dd14866865048095d,2025-04-11T15:40:10.277000 @@ -288298,19 +288299,19 @@ CVE-2025-30659,0,0,188145d075a246c6f3fe60e55ea44924cc8e705d4d2e8fb70537a3bbe715f CVE-2025-3066,0,0,b20f0dbbbb99ed64b3ca9de6a47602b0bc04611f1e234de1623fef6949f9ef45,2025-04-08T20:15:28.200000 CVE-2025-30660,0,0,cd93e2c4967ecebe0a6a4ee0ffa11a2a20e4c65cbe8639eaa406a8341d456d9d,2025-04-11T15:40:10.277000 CVE-2025-3067,0,0,7d3b2e645511578005abbbeacbec82fc74b74b6c63aa21cac1f18b360c60a63c,2025-04-08T14:03:21.997000 -CVE-2025-30670,0,0,33871fc914d81802954876c8654de6ba21fb316b8751c5736304878f0da0654c,2025-04-08T18:13:53.347000 -CVE-2025-30671,0,0,d126e406e2609b2da4208844ed1e95f6b0e14bd3da567ffa49ec098f1a51b8cd,2025-04-08T18:13:53.347000 -CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 -CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 +CVE-2025-30670,0,1,7ddcc50f8117fbbfe0aa389df6861a35821f3879e9bc77660e33b25b2eccc1a3,2025-04-08T18:13:53.347000 +CVE-2025-30671,0,1,446c356ddda2d884479f2b9e2a9211d99a48925d40d190f1c798d21f83cf08ac,2025-04-08T18:13:53.347000 +CVE-2025-30672,0,1,7b25b22d01762d96bbb92d7f9b4ff321d758096279d5762a652a254e9748a797,2025-04-01T20:26:11.547000 +CVE-2025-30673,0,1,e292e0371f10baa0dbb2b4b3b206efd65282a8bcd608d5d5a448633581759121,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 -CVE-2025-30677,0,0,428096c529adf8e05b28521d8a741203edf8b1bb8a98820c834db818e3e23ea8,2025-04-09T20:02:41.860000 +CVE-2025-30677,0,1,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000 CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000 CVE-2025-3069,0,0,c275422f91841fbe2892e1b63afd1da88d5376102ceba230e87a55bfbdd7bb13,2025-04-07T13:28:15.670000 CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000 CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000 -CVE-2025-3072,0,0,ddcbaf040f317e06ba30451dfe0d6f628f558eec148a6cd6a3694b67994c1b8f,2025-04-02T14:58:07.527000 -CVE-2025-3073,0,0,5b3691858a5f3f8c9fda3b40e4cc2efc5d5a3f5c797da0dcb3d227256f0347ec,2025-04-02T14:58:07.527000 -CVE-2025-3074,0,0,c39e0a38315c56b8262a3f7748ea4fb065257713c374669394b5e7b18d7279a7,2025-04-02T14:58:07.527000 +CVE-2025-3072,0,1,237b1129679de4b46e5d9ceb5c0e5052c6b1ac264d837475695d1721b9d4d1dc,2025-04-02T14:58:07.527000 +CVE-2025-3073,0,1,71ef74cec958f960a8417f14caae4baceecce1c29ade9e48ef87fc8fb06e426d,2025-04-02T14:58:07.527000 +CVE-2025-3074,0,1,2ca4b5def9fac1059737ef935d77045ccf07707f02d85fe0a665502b1da0c471,2025-04-02T14:58:07.527000 CVE-2025-30741,0,0,a7ba724d5523a4cf0c1b38678a2ee1b0c99bfb24f80e0249782577c8771159ad,2025-03-27T16:45:46.410000 CVE-2025-30742,0,0,86ca35df94be3200dc999955b93d6c2b0d3e9fbdd347944fb57613c93c49228a,2025-03-27T16:45:46.410000 CVE-2025-30763,0,0,8cae761cd1fe343dec958c3bde26a021d7b611e1f3fb5c049ea6e8543db73e0c,2025-03-27T16:45:27.850000 @@ -288324,7 +288325,7 @@ CVE-2025-30770,0,0,dab4ea9f83ab36dcead4f406120c8660a192dafbed11b3cf32455fb771814 CVE-2025-30771,0,0,4bc7204c9348fe2621346e8eac40aa2932f849595d64cbefee5e299599efe9c6,2025-03-27T16:45:27.850000 CVE-2025-30772,0,0,3ddd942d529dcad81069b9d4fc16adf3a7169a1e32d2feeb4eedd047e790943a,2025-03-27T16:45:27.850000 CVE-2025-30773,0,0,84b6b1fafd4140c0e65aff206ac384cacee6a734345908a99e33e59804ef45a3,2025-03-27T16:45:27.850000 -CVE-2025-30774,0,0,05f941b6f209b4e2921e4d84f5e24b2f8867b2189495b2369ff91c5b86c5755c,2025-04-01T20:26:11.547000 +CVE-2025-30774,0,1,2a5d3c71a462ea7923146e043a0a69ec549e9955537907de226fd240b2435320,2025-04-01T20:26:11.547000 CVE-2025-30775,0,0,ec48c59e4f517272b634cf064fdc0fd135fef035335c5faa59847f395ecfebe0,2025-03-27T16:45:27.850000 CVE-2025-30776,0,0,28fa1f1c65adac862f2b13198c63ef1bdda5f43f4d61ecae77459e4d25e6947b,2025-03-27T16:45:27.850000 CVE-2025-30777,0,0,49166396ff4a280bba60b51dde7f7f29b5cdd497d22789307f5c09ccbf7be56e,2025-03-27T16:45:27.850000 @@ -288332,7 +288333,7 @@ CVE-2025-30778,0,0,3516c7455af8924debd7a237e92ecba859559f45eeadf390cf8a1edd5cae8 CVE-2025-30779,0,0,df542bdff6605a7c37e297edd632eb5db2789e4d1efc34863668457559d61fb3,2025-03-27T16:45:27.850000 CVE-2025-30780,0,0,6627803ec044cab4c9d41461fb2e379e519d85752ddcfd1dd17e9ec659b6f72e,2025-03-27T16:45:27.850000 CVE-2025-30781,0,0,ca777b4fbd29dd7f79d74e842726b221a14440c3a9e4142ff310a949fcf1a3f6,2025-03-27T16:45:27.850000 -CVE-2025-30782,0,0,ac39b88ea1affd17e186cec64676c65c17ddb2f3630655ec46323dc064d196bd,2025-04-01T20:26:11.547000 +CVE-2025-30782,0,1,0d06894950b159a2f55f405fd7e3d93e948334f0cd89db46458239840a1205b9,2025-04-01T20:26:11.547000 CVE-2025-30783,0,0,af75244b6ac2cac0d3c22b5f2e3747ff1fb7cfdd4572fa939eb7db3dfeaafc59,2025-03-27T16:45:27.850000 CVE-2025-30784,0,0,1a8c666b74c2236bd90a05413d1dbd690b077b85be89756742dcd664a90b85ba,2025-03-27T16:45:27.850000 CVE-2025-30785,0,0,b176d9f9d8594cc37a5720a97b5e9d4647c1f4008d293ea3cb7a2f6f93a476d0,2025-03-27T16:45:27.850000 @@ -288343,22 +288344,22 @@ CVE-2025-30789,0,0,ac4750f56eed0ed23e122e8aac9b4303a83a3485616a37d2edcdf929c947b CVE-2025-30790,0,0,e8295d2e2b95cabc9f587e69ad2fee77120ac3cc2e87b54245f81b4750575ab3,2025-03-27T16:45:27.850000 CVE-2025-30791,0,0,1998d5f84b2ae91f4fd89e27f038f0a968b0983b653384dd4c8e17d94306ff1c,2025-03-27T16:45:27.850000 CVE-2025-30792,0,0,86726c5a3dbb5819e5497fa48192b6df9b2d56c09931f84f127464114382150d,2025-03-27T16:45:27.850000 -CVE-2025-30793,0,0,eee42c28827b1844b90ca5076ab2142c80bcf5b89898d79871125ee228f8c191,2025-04-01T20:26:11.547000 -CVE-2025-30794,0,0,3bf3443cc6f7e6f49a883d302eebed3e1063488d5ee9f2dfcb1054732247e0dc,2025-04-01T20:26:11.547000 +CVE-2025-30793,0,1,bae7e1dbd2e7fef9984541a0f37090d41aaeb87409e0f2e5169fd61a6bcc4d7e,2025-04-01T20:26:11.547000 +CVE-2025-30794,0,1,c018b7eb3fdd0666e1c18c52b7c3001862d096426191c4dc5beb7f9bcce188d8,2025-04-01T20:26:11.547000 CVE-2025-30795,0,0,e8c3457f5eb130377f20f0fe2d777649fc18e751ee01a0aa596f4df95e4ca007,2025-03-27T16:45:27.850000 -CVE-2025-30796,0,0,0ee6b277a14a56005ece2c224d878e512588be90e23f64c3911ea98d275b2da9,2025-04-01T20:26:11.547000 -CVE-2025-30797,0,0,0ba772d71bf0864a3037293a9920c55a2d53d88997e031afe63f27f4738409bf,2025-04-01T20:26:11.547000 -CVE-2025-30798,0,0,feb10e3d9b54373eb44dfb267d7540743d60c5f565763a687980425a4c828903,2025-04-01T20:26:11.547000 +CVE-2025-30796,0,1,01eed6ddc0a426312271c6911af81b958ca15b3bc7d84d993ac25abdf65f5cc0,2025-04-01T20:26:11.547000 +CVE-2025-30797,0,1,c450d488185f3581900304b1233dbaec6ab2cc4a9cce464e12cee749746ddb18,2025-04-01T20:26:11.547000 +CVE-2025-30798,0,1,ffdbead0bc81db30f934388f9e8abf874bf3e004c53b50270582bd2400a53c7b,2025-04-01T20:26:11.547000 CVE-2025-30799,0,0,ea156c71c6fceeaeb773aa576447f5b3e7bd2fe0ed4c1c9a659e37a411dc4790,2025-03-27T16:45:27.850000 CVE-2025-30800,0,0,63728b764a9670d1968a436202946324e02a235f487bf5712ebddfa68d4b26f5,2025-03-27T16:45:27.850000 CVE-2025-30801,0,0,abb0d1ce04e749ec58934c3da3b32772f770561d9f5bbd030e500e4cb304da16,2025-03-27T16:45:27.850000 -CVE-2025-30802,0,0,f167d5d3bdfb3b7ccf062d2a2f0e3ac2b0257d17750900fc839f02c7f26a4df4,2025-04-01T20:26:11.547000 +CVE-2025-30802,0,1,9b117f1aa4c86ea5e34d46f011ccb9d2e5611bd4b936bc0dec25631a97510640,2025-04-01T20:26:11.547000 CVE-2025-30803,0,0,f481a310b2c12c4a31963ed9930875140d0bff8908e5070e52eb7605d6843a87,2025-03-27T16:45:27.850000 CVE-2025-30804,0,0,685c94d9e8e5cbf12140b73de10b859f47b2034ff12671dee34a884681007337,2025-03-27T16:45:12.210000 CVE-2025-30805,0,0,c81028485cd8a27dbf0ec5ac793d14c790ecdaaefa054e7a413718248377d75d,2025-03-27T16:45:12.210000 CVE-2025-30806,0,0,11137bca263b3d5825e526330074d0b8a7084294f433c2ef8ab48851629bff18,2025-03-27T16:45:12.210000 CVE-2025-30807,0,0,9f44ccd9c253ad4edf62df5a1e117e2128a4af05dcb432553ab4a059dfe18f1b,2025-04-02T14:58:07.527000 -CVE-2025-30808,0,0,8ff08968a0aa3a0b550b1f37b2ae7a62f0941b80ce48ead843a88bf948a33d33,2025-04-01T20:26:11.547000 +CVE-2025-30808,0,1,80f817aee4457a04a396da666ce547adcb180702ebd57a5a323af11c05324768,2025-04-01T20:26:11.547000 CVE-2025-30809,0,0,c642ef9141055c40052f4c0c7e84a20304523507fba0e40b11c8f5a2a3ba11e0,2025-03-27T16:45:12.210000 CVE-2025-30810,0,0,f6bf2bfc58c00f27e7cded810257bb37a31c05f0777f0d203810e95769c96bd0,2025-03-27T16:45:12.210000 CVE-2025-30811,0,0,13f48ace278996a2027d76414bfa8859eb449bd2cef6c0a2d1df621b79122db4,2025-03-27T16:45:12.210000 @@ -288370,7 +288371,7 @@ CVE-2025-30816,0,0,86aa62d22d26c1677b8fbc2d5a26ff69334a638d0cbfc8a040d084b98bf55 CVE-2025-30817,0,0,8c68dd2359bc8b223264bcaf130261b6d50fa50dce54e42de4a27d598222577c,2025-03-27T16:45:12.210000 CVE-2025-30818,0,0,7f151ca2e67c18f616fc2b6e730a099fa2d6c72d321d27dddb7e52dc62180bc2,2025-03-27T16:45:12.210000 CVE-2025-30819,0,0,c839e0d4cc216303e77cb7edd2f52d654e10b42f866c0977df833188fb042da7,2025-03-27T16:45:12.210000 -CVE-2025-3082,0,0,29f6f9d179182a5c39f849d8a36fd0ff51ace7d91e724ab57fa4a1e1017a3a57,2025-04-01T20:26:11.547000 +CVE-2025-3082,0,1,f0b7757843e61dfd9ec70b359f769a6c9bd693251c34c31d3754fc4e6525ce6a,2025-04-01T20:26:11.547000 CVE-2025-30820,0,0,cfaf7e7f7d246bbb9c6ee13438bde2745fbdfcc3d7cca50ed220e792b3e82478,2025-03-27T16:45:12.210000 CVE-2025-30821,0,0,31ae51095c59dfaf0eed02ba626cb6b09bad176ab8cebd93fc6a5a1e0e640269,2025-03-27T16:45:12.210000 CVE-2025-30822,0,0,2207bcc8796316ad3958896a7f3e7034d296ff6fa4db22429bec71d22783cbfa,2025-03-27T16:45:12.210000 @@ -288378,22 +288379,22 @@ CVE-2025-30823,0,0,a3148fbb2573493477e92d497cd32322c5252dae6a3f1e334c9ad8d4b8553 CVE-2025-30824,0,0,344d4423a6a5a45505d5ad3b8b81ea8cc3fbe81d73d925d23adb84286a1d4e7e,2025-03-27T16:45:12.210000 CVE-2025-30825,0,0,664422843ff73a1234a8df5cfab6c3429d7c845885a116bb9582fd784c26b29b,2025-04-02T14:58:07.527000 CVE-2025-30826,0,0,75257443e76f09bc6627b81604675fc61a36199453aa13dd9dc8031e1e683e38,2025-03-27T16:45:12.210000 -CVE-2025-30827,0,0,68431dafcc536aa520dacad25958a06b8d5b5bd0531d5bd6a1e9cb66a95d2922,2025-04-01T20:26:11.547000 +CVE-2025-30827,0,1,8f64771e54830293ad09ec92bc8aa338ec5415fa4acf4a73dbde79b14fd4fe9d,2025-04-01T20:26:11.547000 CVE-2025-30828,0,0,13165c8a3d6127400e5dc61cd3acbdd0c00ff2da92174ed76ef5b12c0fb111b2,2025-03-27T16:45:12.210000 CVE-2025-30829,0,0,d778319af23c16bef5b797ee777aa1f3cf2ab5ec8837ae52469c3024592e73c0,2025-03-27T16:45:12.210000 -CVE-2025-3083,0,0,6e175755b0d304768ba1021b3a5cd3cc23c10a9003448dd3632596520718a13c,2025-04-01T20:26:11.547000 +CVE-2025-3083,0,1,5d066987f7091fbea8eca3667c31aa2a7c1fea76f896c946ea86786add307e5c,2025-04-01T20:26:11.547000 CVE-2025-30830,0,0,757146686939893abbafce7567881d6582c1c8891bb29b2eb8a3e312165fff05,2025-03-27T16:45:12.210000 CVE-2025-30831,0,0,58d6659c79961b1bd4ecff4586ae2944853bee5fcbb0265f99091764205fbfcf,2025-03-27T16:45:12.210000 CVE-2025-30832,0,0,872225febe12961ed121a80db974e1743a077eecf1159ceea59c5ee8994e141c,2025-03-27T16:45:12.210000 CVE-2025-30833,0,0,a2a29ba40c749d9154bd543506d967eeecf9a87f52c05ad20c854b71f3aa0186,2025-03-27T16:45:12.210000 -CVE-2025-30834,0,0,9d1f5591357864f56c77370fa5f93a3bba7e79c8f38007d132489f94a807bc42,2025-04-01T20:26:11.547000 +CVE-2025-30834,0,1,85baa44e7edde648a9dfd4a010313133432a02b6c0d478ecb8cc451d909a101e,2025-04-01T20:26:11.547000 CVE-2025-30835,0,0,243b1aafb00a5947404c4c12e527de827b0bd858c3ea7865260d24901ee7d284,2025-04-01T20:26:30.593000 CVE-2025-30836,0,0,6504eb324a1ec096686c876af4abf58ae341b41fb408f47abc7dd4fc1ed7b258,2025-03-27T16:45:12.210000 -CVE-2025-30837,0,0,eb4f50d04617706df4f0bfd928dfcc8fc0ff1965ef44945423ff28ce043a1a9c,2025-04-01T20:26:11.547000 +CVE-2025-30837,0,1,89f61dc123fa290590fef54ddd3e873920d0c558efeab3ffe0c17f3440bde5fd,2025-04-01T20:26:11.547000 CVE-2025-30838,0,0,c8224637914836764520188e48d3be333661d703c0aec303d3408c4a2082d067,2025-03-27T16:45:12.210000 CVE-2025-30839,0,0,7f84e9cce6914ca3519aebb5888dab9272dcac0726c7c6911a57af687fe3a8b5,2025-03-27T16:45:12.210000 -CVE-2025-3084,0,0,21d179c952afe04cb3c0c22dc79ec764ee0937ee3c9581e593b24af284ed4c26,2025-04-01T20:26:11.547000 -CVE-2025-30840,0,0,f5be5f9b8cde4fabef24cb93e5af7c7c30641d815ce77f4c0065b24caad2503c,2025-04-01T20:26:11.547000 +CVE-2025-3084,0,1,283912988147d3a1046648eec3e146a727e49ab32bd82c89886cb723469dc12e,2025-04-01T20:26:11.547000 +CVE-2025-30840,0,1,96cd23c247bec85429d144d3da9d9c46ffc88812746ca1c44775096b30cdc577,2025-04-01T20:26:11.547000 CVE-2025-30841,0,0,ed1da8f8372894cd6daa05e39f9443cb0a61ab2ebf28e0b704d4e4169f7c4744,2025-04-02T14:58:07.527000 CVE-2025-30842,0,0,93eb0fde9f95676ed20551d6eae16bb95a1afd32e8be327515370b50c4c34a12,2025-03-27T16:45:12.210000 CVE-2025-30843,0,0,817ee1e3c6dba384583fac96ece79c5548c0e04c4c65dd836b1a65d52b79eab1,2025-03-27T16:45:12.210000 @@ -288401,9 +288402,9 @@ CVE-2025-30844,0,0,dfc6f29cfa3f888f47e6aa08d17abecb0620c9a3c4fa6a19b88ae0aaec49d CVE-2025-30845,0,0,b54f191a5980e269aa62b45434c04ce5550edfbd07e4caa2db1bb3253d528179,2025-03-27T16:45:12.210000 CVE-2025-30846,0,0,1f57df704f5b7b54a04e45d88dc76b7d3db79fd5b263d95d056743b064a78579,2025-03-27T16:45:12.210000 CVE-2025-30847,0,0,fc961a502cdbb5e3e70606a6f8d637679f8552339c8080ad8895748b861656dd,2025-03-27T16:45:12.210000 -CVE-2025-30848,0,0,dc969dfeb4c3d3e43c8c90359011a0df3e2f51b39e62049162de10aca26c1948,2025-04-01T20:26:11.547000 -CVE-2025-30849,0,0,6576783fe5741fbdb49bc5b4ac17d9edae3b022c68e5cb2f9a2f40fc2266dfb4,2025-04-01T20:26:11.547000 -CVE-2025-3085,0,0,0fd4494096f453e397118346d54485415ee75229091f3202dcd807a1d8c6cf1a,2025-04-01T20:26:11.547000 +CVE-2025-30848,0,1,61cdfb890cd749a52f2950ce84dbcb91448757b82ae64af73a11115c92d6599b,2025-04-01T20:26:11.547000 +CVE-2025-30849,0,1,6d2bb0c00ca3468779907bcfdaa0c7fac637e19f577d9fe198f24774d4c1989b,2025-04-01T20:26:11.547000 +CVE-2025-3085,0,1,b54bb1d5d5befb68119f38f1a972c17d05f11d862f9bd03c903601d3a424a416,2025-04-01T20:26:11.547000 CVE-2025-30850,0,0,760a1d8de33f40d499c33ff5bcfd7dc023a854aa3c9dd3ed4b3e1e844b1c5114,2025-03-27T16:45:12.210000 CVE-2025-30851,0,0,f31de6d06feb28cbb6d2ae0384a043c45d36984af50b98b70a1d34611d3389bf,2025-03-27T16:45:12.210000 CVE-2025-30852,0,0,5b02b410dfbd7f12375fb1500eb5c81b13c813bd84400b67894684991e380003,2025-04-02T14:58:07.527000 @@ -288424,24 +288425,24 @@ CVE-2025-30865,0,0,bffd1248f8f15b2e751b6f6efb4facadc52958effc8373383203b545fa444 CVE-2025-30866,0,0,bfcfb31d390344d8a10b72e59af13af80a476cc8bbc19a5929b49ad9fad01a59,2025-03-27T16:45:12.210000 CVE-2025-30867,0,0,ad501afdd1f9d4d3e510c448c7a3512c9a52fbd7b66921095afcb6daeeff301c,2025-03-27T16:45:12.210000 CVE-2025-30868,0,0,0ce69a49d90edf537d7d9bde764d07d7255ce2ba3583c37eff7f468be21da2e8,2025-03-27T16:45:12.210000 -CVE-2025-30869,0,0,acc88bf8ebbad99b2b2ed393b10f82c1669cde75bb0fb28f22fa6c41073cc157,2025-04-01T20:26:11.547000 +CVE-2025-30869,0,1,a3a238cd1f258b954371714f246337351bc1dc02fa3eb28aca007ef9691f67e4,2025-04-01T20:26:11.547000 CVE-2025-3087,0,0,e8a26b9e1be3f7b979dc4c333865695b9e7ff44f95515aeecc477d99e3cbae5e,2025-04-07T14:18:15.560000 -CVE-2025-30870,0,0,26ef848ad27e7d9224fd33e8be10e32100d1566ca2803fa757b9116452dfc568,2025-04-01T20:26:11.547000 +CVE-2025-30870,0,1,b2d165bf975aa17d82fae1858848dbd041928c6b3285a8f04e9d161a5791a90c,2025-04-01T20:26:11.547000 CVE-2025-30871,0,0,7c3854deb0642b8eae958a1aed4582e5158e5614f363495a55e00351f0f694e1,2025-03-27T16:45:12.210000 CVE-2025-30872,0,0,b536365800566287c904971c159342f1608ad2caa5882ee55888508434c1c145,2025-03-27T16:45:12.210000 CVE-2025-30873,0,0,eed0e4cd5d9593bf216342cf19b6229ced540b9bec3dad1935ee2b1987e974a1,2025-03-27T16:45:12.210000 CVE-2025-30874,0,0,b641de1654a56252487c524d81b4025d598af27fb61306d50763057c7e851511,2025-03-27T16:45:12.210000 -CVE-2025-30876,0,0,fb98e41e9be20190e89c46bb395400ab6895182d32b807096bce268140925cf2,2025-04-01T20:26:11.547000 +CVE-2025-30876,0,1,9f32c7422fe9d6849a299f742cce415278165f1ff11c93020fddc7f553732a05,2025-04-01T20:26:11.547000 CVE-2025-30877,0,0,e277e8e625f9f1187239f321e2ba0ad73ce58a56ec0c0d3ec6ecfc4c9d9e81ea,2025-03-27T16:45:12.210000 -CVE-2025-30878,0,0,f50623b30241889e3ac0ad69db960d6a0c562c24e30f83584aeb166bb36f91a8,2025-04-01T20:26:11.547000 +CVE-2025-30878,0,1,50bdb887721c4cd78b380dce1199adf9711138e1282ca9b58ca917a74df2506b,2025-04-01T20:26:11.547000 CVE-2025-30879,0,0,a0b57132c6604f870faaa0c9302f2ce400288a3b3ba1f18bc9d61b0de603abea,2025-03-27T16:45:12.210000 -CVE-2025-30880,0,0,0b74283a22a656d05a06972da942e48f4a03070204843227023dad44f4d282c5,2025-04-01T20:26:11.547000 +CVE-2025-30880,0,1,c4397a1167b0be75b11eac410e19f5e42d269723158a7f5f084a811335c6cb81,2025-04-01T20:26:11.547000 CVE-2025-30881,0,0,af49d406b8e4a3cbc66b4551b6225e11494b229aed41d2477a980dd2984c68ed,2025-03-27T16:45:12.210000 -CVE-2025-30882,0,0,b64c2ca35888be011731831cf0af473f56b80719cb5f76bf92e5a88b4fa2bb6f,2025-04-01T20:26:11.547000 +CVE-2025-30882,0,1,807378ef650489a6b42e9d1ccd592aaa60aa470a0f1787830e9aaba5fa009186,2025-04-01T20:26:11.547000 CVE-2025-30883,0,0,b22272b1876c98bb1c229001a0548b787bf0766d5191bfb34140316bb62115ce,2025-03-27T16:45:12.210000 CVE-2025-30884,0,0,0ef1958009b86e49767364a144d1c9e9af2d46111f8403b3f4d4b969ee1567ea,2025-03-27T16:45:12.210000 CVE-2025-30885,0,0,40a8a772f0ed7c0a0a92d0bb35ec72a3f3e42eedb6364b3d898ba934c2481e6b,2025-03-27T16:45:12.210000 -CVE-2025-30886,0,0,300845441a8a9901036a68a48cb0f8f308aec8d36a675092ff7ff824a32f3633,2025-04-01T20:26:11.547000 +CVE-2025-30886,0,1,e3eaa9e0e5328331d3be81a3ef3a52eabcef255a61ce2fdc4aff902b5f40e5bb,2025-04-01T20:26:11.547000 CVE-2025-30887,0,0,00178e0fc6d40ed0fb05b64730d950b12dddf402a7153376ff545ffbcdb91f0a,2025-03-27T16:45:12.210000 CVE-2025-30888,0,0,28d49bd5d38792f337809e7025ed3b6c1dc9dcb81b5a217fc4e71f613fd24189,2025-03-27T16:45:12.210000 CVE-2025-30889,0,0,cbf3f6e45e103de2f2c356a4f0635f47a8ce105e756170d52b21bd4dd633090a,2025-04-07T14:18:34.453000 @@ -288456,8 +288457,8 @@ CVE-2025-30897,0,0,d507b5b7b3f49669aa5853b4a94bbf3f6af6ebe3ecb72dee7411d7c16e677 CVE-2025-30898,0,0,322d192cedb82806acd3a2f77289969ccd2c366bf8e398c0df801a2354305a4c,2025-03-27T16:45:12.210000 CVE-2025-30899,0,0,73016cbbda013097d3b01f02dcd2534e5ebb1bc3ba59e10ee481e1fcf5abed17,2025-03-27T16:45:12.210000 CVE-2025-30900,0,0,a614192b4026cc4688874a3842501877f3bd90326aa62e5e1a319d29a474d4c5,2025-03-27T16:45:12.210000 -CVE-2025-30901,0,0,db10305124cf8a6d88f70e7c583f212a908a5a21a6eb5732cb7cc86f05495e02,2025-04-01T20:26:11.547000 -CVE-2025-30902,0,0,786e2f3e39500249bd1889c893f61d44555c5247416d88fa3c4ec52bb9a62e74,2025-04-01T20:26:11.547000 +CVE-2025-30901,0,1,d44b1676d3b3f75f6fec17a87a777e7bf68e628cfdbffdece1d18c8686fa84cd,2025-04-01T20:26:11.547000 +CVE-2025-30902,0,1,9d4f561ef5e842a66a009ee1ebea03b01bcb47a9c6a614d5ab4fc5ac573b2117,2025-04-01T20:26:11.547000 CVE-2025-30903,0,0,3639345a01ecdba3e4e599ee1498cd740ed71a1d108b1489266ed9209dc346ff,2025-03-27T16:45:12.210000 CVE-2025-30904,0,0,ce845237d000895388ca2e0f51a5ff9432ef6c7acc912df506973fd6456d19b5,2025-03-27T16:45:12.210000 CVE-2025-30905,0,0,4c763bcbff3095db5a9da47b274b151e6189301c5c5bab54c08c8927af8b24a9,2025-04-02T14:58:07.527000 @@ -288465,93 +288466,93 @@ CVE-2025-30906,0,0,bfedb627274aa8b9f0732f272cd39734251b3e80595c032124d1d75f755bd CVE-2025-30907,0,0,ab215138d6596b15037ec7b716f7a04cccd3c1fc43ceabe8e846d9a3644b806f,2025-03-27T16:45:12.210000 CVE-2025-30908,0,0,9b276b0c034acb2fea666f449773804545d4ecbec8d488d820b5f5566b3d4b5e,2025-04-07T14:18:34.453000 CVE-2025-30909,0,0,d25dbbefda6b252a2ba0c68cef8dd6e47d4e0e87574e1cf430b007aa59f10888,2025-03-27T16:45:12.210000 -CVE-2025-30910,0,0,615c2a5ac4254b21913adaa69a0ecfe695eb1e9e2b304c9d0e3fb11c56e420de,2025-04-01T20:26:11.547000 -CVE-2025-30911,0,0,5b63afcf74aba60241ddcea42c067e17b6de97915d6b102359c2132a8d624f06,2025-04-01T20:26:11.547000 +CVE-2025-30910,0,1,16c1c60d3eeaf5436df2566d15920eed1ae357bbb4888adeb3690958a4783218,2025-04-01T20:26:11.547000 +CVE-2025-30911,0,1,fd1209080c16944fadf23cbbe36a25662222585c121fccd1af2f9ba2c8c9d124,2025-04-01T20:26:11.547000 CVE-2025-30912,0,0,fca46532d8975bb3997b3b5ef36e67af4b3247382151c6e6da33c3bcd4495c5a,2025-03-27T16:45:12.210000 CVE-2025-30913,0,0,33fe563f996b4b4992da1fb39f827398c5eff4304452e872bbe1ee9f03f381e9,2025-04-02T14:58:07.527000 CVE-2025-30914,0,0,c165e78d2f5d527629299ce0293cb9d1398c2a9a6518f071a574006a570d168e,2025-03-27T16:45:12.210000 CVE-2025-30915,0,0,1a145aab19a80d162ce913f3850ed9e461aa169b1403897b720248d6a5d3110d,2025-04-07T14:18:34.453000 CVE-2025-30916,0,0,67962284e46acdf1fc92cd89be3f0f0a6e58e129d24a7def6ba505045ebf3e07,2025-04-07T14:18:34.453000 -CVE-2025-30917,0,0,51f845606e43cb70db71e7f644724bc0ad0047fd5f400135cd8e1a85e2781df6,2025-04-01T20:26:11.547000 +CVE-2025-30917,0,1,21d9c643ac11015461a07dc23f3a237b94855c30cb31324e3a617b89431047e6,2025-04-01T20:26:11.547000 CVE-2025-30918,0,0,957a7a0a1c0b4cffefaca20fa9b9595ccfd2697210a0fab47da603b7cb716787,2025-03-27T16:45:12.210000 CVE-2025-30919,0,0,6f14544f37a1764de5c28c68ff26f4c3193600030d68c49cbbb4ef867f1a1d6a,2025-03-27T16:45:12.210000 CVE-2025-30920,0,0,67b52e8625e5f13c5e3105ca98f049b13c07f1eaf4ace7c6d45af6672ce9ddae,2025-03-27T16:45:12.210000 CVE-2025-30921,0,0,0f49c6a76231945cfa45ff97ac30f85385ce79f7b853b4f89aa238944aeb0521,2025-03-27T16:45:12.210000 CVE-2025-30922,0,0,9ff4dd0946f44b4c7c54a61d5993f66f06f3cb56f15e96b4e5bc278cdcc10d45,2025-03-27T16:45:12.210000 CVE-2025-30923,0,0,4337439665787ddec21f95bc117262f2db948b09c40c497dd22aee51e7ef404f,2025-03-27T16:45:12.210000 -CVE-2025-30924,0,0,695e4f5bda7896261a2be049fd0c40a61bdd95b04170ab7a84c3755e907efaf8,2025-04-01T20:26:11.547000 +CVE-2025-30924,0,1,f7c9bc1028773adc8e89a6f6304abf0ba5e8ad193dfedb8f5ad01eddd1963845,2025-04-01T20:26:11.547000 CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa4c3,2025-03-27T16:45:12.210000 -CVE-2025-30926,0,0,4788b4c5d98884ab92112a5ab613e374e3483016af7ceee805257fa80053e170,2025-04-01T20:26:11.547000 -CVE-2025-3096,0,0,40119acc5bfbf5460522eea807e5ca3f4cee07a27e6b3ff002f97204458d8ac0,2025-04-01T20:26:01.990000 -CVE-2025-30961,0,0,f234d21494724742ebcd811131bd85463489be49aa5e724899855867bf3171cc,2025-04-01T20:26:30.593000 -CVE-2025-30963,0,0,a864010fa707e901c889301180c6b0f078a197d272ca7db8491a22f4e3bd4903,2025-04-01T20:26:30.593000 -CVE-2025-3097,0,0,8b604a001c8e5e51b9fc0d4161c9cda0c3d6ac5c0fbf5c09d142f1444ae5b4e6,2025-04-02T14:58:07.527000 -CVE-2025-30971,0,0,92b14f174c92599de02a891c3fcb3bebb1869a41eef00ab5d9b6626db1c99dac,2025-04-01T20:26:11.547000 -CVE-2025-3098,0,0,ce95a008105100dc05dac96d60492ad8c2a1a9010656c6a251be6a7755736abb,2025-04-02T14:58:07.527000 +CVE-2025-30926,0,1,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000 +CVE-2025-3096,0,1,8268841e6f7bc41398dcf36b7be8d3dcaa69d002c9097adfeaedeae01b3e118b,2025-04-01T20:26:01.990000 +CVE-2025-30961,0,1,a9060b0c2e5039ac1c7dc0d0a4866d8355c5b144195397ac7f7bbd22c91d7a82,2025-04-01T20:26:30.593000 +CVE-2025-30963,0,1,8f31ec02fefff5554b72626ba454b387f81489df6ae8a03a71d1b10a82ac3371,2025-04-01T20:26:30.593000 +CVE-2025-3097,0,1,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000 +CVE-2025-30971,0,1,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000 +CVE-2025-3098,0,1,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000 CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000 -CVE-2025-3099,0,0,9e53ac247011e5c9d18381ea42caceb1c07bbbabd16a29680a8aab5d54621675,2025-04-02T14:58:07.527000 +CVE-2025-3099,0,1,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000 CVE-2025-3100,0,0,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000 -CVE-2025-31001,0,0,4265bbb6e115d79eef571dbbe3c6c20ebe4772d8a6b0bb96964817d20c125ddf,2025-04-01T20:26:11.547000 -CVE-2025-31002,0,0,88f569f1709020dc294992faf94d9bba8f9d390194eeb3150900a443b02c803d,2025-04-09T20:02:41.860000 -CVE-2025-31003,0,0,f194dea39b8cdc9b58148d69902a45e8e3c6eba95aa5c64d2425c4ccdfdea1d8,2025-04-09T20:02:41.860000 -CVE-2025-31004,0,0,8ffa553a256c0bcda23bc14a63500dd2d79a7682c240d6114d1fad98892722f1,2025-04-09T20:02:41.860000 -CVE-2025-31005,0,0,b1efbc523457634c30a0a9849009d1745b45d633c451ccb7bdbc41a86cd090f1,2025-04-09T20:02:41.860000 -CVE-2025-31008,0,0,76d3aa622de53ca6dd0eb79a24c5fde85c488d10155b7a553e54a8b6cf7d360b,2025-04-09T20:02:41.860000 -CVE-2025-31009,0,0,e9b11ef91313e83a2c5f00146ae964456d89a3cb219ccff5c37419bfd5ba24d8,2025-04-09T20:02:41.860000 -CVE-2025-31010,0,0,2eedda8f330a9beae819a4cd9d50315b7c3705aef34f39a70e86c91cbd492554,2025-03-28T18:11:40.180000 -CVE-2025-31012,0,0,21f03eb3af6d9b3bb51a2a0fcf9624a753c1fc6babd21259e4b8c500780eb98c,2025-04-09T20:02:41.860000 +CVE-2025-31001,0,1,2099e0e716d4e325f57fba5d7e0cf7f07e3821d398de9c5fe9a87297cd1f817e,2025-04-01T20:26:11.547000 +CVE-2025-31002,0,1,ba99c9096fdd3939df3ca31d43466912b766252202b3b421440a181cc386f8fd,2025-04-09T20:02:41.860000 +CVE-2025-31003,0,1,2736549923e37a730c5262e14427e9b35cc896f7bc1fcf03b2ef999e90bcf5cb,2025-04-09T20:02:41.860000 +CVE-2025-31004,0,1,1c721c90a5d8c7fe897d860ac0ad025214a2363df8206f71c0b40013d946b7cc,2025-04-09T20:02:41.860000 +CVE-2025-31005,0,1,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f633e8,2025-04-09T20:02:41.860000 +CVE-2025-31008,0,1,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000 +CVE-2025-31009,0,1,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000 +CVE-2025-31010,0,1,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000 +CVE-2025-31012,0,1,1f46b9635d7584db0ebef271a97e01198fa0633ac746e331966237bdddb260f8,2025-04-09T20:02:41.860000 CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e713672b8,2025-04-11T15:39:52.920000 CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 -CVE-2025-31017,0,0,b56a44652605d8eeed3d64b16f1dab34aa789f93a1221cc3bdf4b45f393886c0,2025-04-09T20:02:41.860000 +CVE-2025-31017,0,1,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 -CVE-2025-31020,0,0,daa9e1981c03ac81dbf536cdee43874fa54a803f7000d9e16ed8ebb44cdf19dd,2025-04-09T20:02:41.860000 +CVE-2025-31020,0,1,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 -CVE-2025-31023,0,0,dfa96669063a1f3955fe0e1aab8c8bfa43477b027538a93d222fb97048f80625,2025-04-09T20:02:41.860000 -CVE-2025-31024,0,0,f27fb13571b9dddbe1b515b7ab2184082954eb269d62d89f6a6c625e2c4c4385,2025-04-01T20:26:11.547000 -CVE-2025-31026,0,0,110923d78d570a4dd4efff2a47da0efd3f170aac2374a5da2e6fd53e6d352a2d,2025-04-09T20:02:41.860000 +CVE-2025-31023,0,1,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000 +CVE-2025-31024,0,1,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000 +CVE-2025-31026,0,1,254b219c6491f5a7e38a4af9c5c74d846ca2f862f1957eae5acb00be5bfdce97,2025-04-09T20:02:41.860000 CVE-2025-31028,0,0,ebad35846cd78b12d03c51b6b71e44d0624e34aa5a05101e27fce9486d87ebd4,2025-04-11T15:39:52.920000 -CVE-2025-31031,0,0,168f44010a9f1d1f02e128d4aa188c4843365dadbda135ce003254626d8a07a2,2025-03-28T18:11:40.180000 -CVE-2025-31032,0,0,6ee56cfbfa29ee841356b3cf210c65776fcfb1d107d1a9ba3f9a16bc11bd75d7,2025-04-09T20:02:41.860000 -CVE-2025-31033,0,0,c794537ee0b5f69607f27e241596ab4e43a486acff4e1440b6412367d3c90c07,2025-04-09T20:02:41.860000 -CVE-2025-31034,0,0,8c9adc6115c4b92fd480b9eaf53ae5796f65cf796d88440a46ea7968ae4b94f3,2025-04-09T20:02:41.860000 -CVE-2025-31035,0,0,a43aa2d0e1ff08b29f133dbbdb5406bef17c4ec3bce3f996fc125f85cb494856,2025-04-09T20:02:41.860000 -CVE-2025-31036,0,0,cc456760a875d1bf2c4e28d271430d48fc855351e73e4e33c11aab9d54f1974d,2025-04-09T20:02:41.860000 -CVE-2025-31038,0,0,9fb6143bac9687c0ce18cf1b30e0c01f378e4d2f968ce8a3716360d9dca9e86d,2025-04-09T20:02:41.860000 +CVE-2025-31031,0,1,151d32b9da3d458fb821a908a76d8bafa5c8bbe7678b62350f41abb290ba4283,2025-03-28T18:11:40.180000 +CVE-2025-31032,0,1,e4c20395a033e95e16a3cd7eee015003ddb05f299ac311a0b4dd4c07da3ce0e6,2025-04-09T20:02:41.860000 +CVE-2025-31033,0,1,840a89b6a6fca121cfba44c8138c52066a8fe2d84b54cf8217e967669e52c58c,2025-04-09T20:02:41.860000 +CVE-2025-31034,0,1,00045c692d736174347a15996f2644c271311b493b2650b7c9934fd5c24aaef7,2025-04-09T20:02:41.860000 +CVE-2025-31035,0,1,5c760e02fcbaee44a22a24ae8d34d9e90e3913b6f5837b6cb83b1fc705e4819e,2025-04-09T20:02:41.860000 +CVE-2025-31036,0,1,62cc9af3a9e12c32332fdab0e5c5a83ab6b53958493b4efe680877f6a1c84c8b,2025-04-09T20:02:41.860000 +CVE-2025-31038,0,1,7b5afc8e5d375ec9301ab6b724560141888b47309d5f5f2d9937b8782c078587,2025-04-09T20:02:41.860000 CVE-2025-31040,0,0,0231cc866d51dc61c7f61781fad3ea23cc4ca7aeca5478924158d392d59bb7f9,2025-04-11T15:39:52.920000 CVE-2025-31041,0,0,0041321ae6c993907944cd87119ee6b5b37dfd775d87cba0f12518a7a41dc2cd,2025-04-11T15:39:52.920000 -CVE-2025-31042,0,0,246018d907231149fc29347b3eeb3029c728b92e6f229e944fea16da771e00ca,2025-04-09T20:02:41.860000 +CVE-2025-31042,0,1,dd7508689f88e2fe1dddad52457abe85ec8bdf2cefb5a744ba057ee4d8c1ed58,2025-04-09T20:02:41.860000 CVE-2025-31043,0,0,2b40a96fc4b8eaf20a7a30e77b072b27918475850ebb17c34a51d56b785169bd,2025-04-01T20:26:30.593000 CVE-2025-3105,0,0,7655f789901fca3e90cb57cc3d3b5f5846f175abac5b5dbf4ae81b8a278e336a,2025-04-07T14:18:15.560000 -CVE-2025-31073,0,0,e055d10b35c7f1d19592c754caac0fe0b296e12dee12b2987368c5a10e4343d1,2025-03-28T18:11:40.180000 -CVE-2025-31074,0,0,4adc993df66dc086ec84e8b5811707bebfceac54363e5849479b04f5a8216cbd,2025-04-01T20:26:11.547000 -CVE-2025-31075,0,0,534ea9726b86c919ee098a11b6850ee9f4de6cb2ed29ae3ffb397856198274b7,2025-03-28T18:11:40.180000 -CVE-2025-31076,0,0,3c681763194ea5b2cf5d10661c575d0ca0bca725a50d656f4c1debe2fdcddb87,2025-03-28T18:11:40.180000 -CVE-2025-31077,0,0,6d334f411985f56899d4340c2a0d10526138784232ac3e37702f094230070cae,2025-03-28T18:11:40.180000 +CVE-2025-31073,0,1,115918a5cd22bae5fc4fd10c6a43cbb47a9370110d3db58b7019ed219e512f16,2025-03-28T18:11:40.180000 +CVE-2025-31074,0,1,7f8f57c92e74b9c1415e867dd5ecddc5d535968732bbd92158047edf4f296080,2025-04-01T20:26:11.547000 +CVE-2025-31075,0,1,da94976c4d4403f70a2c8b7928bb9a5163b5c94a954738bc51b994497969087d,2025-03-28T18:11:40.180000 +CVE-2025-31076,0,1,828c30720e4eb2dc7f3fc59dc8be6a648b0486905b7a6815532dde47f9d44bda,2025-03-28T18:11:40.180000 +CVE-2025-31077,0,1,c356ffd0b74d6893071ca7c0e85e191b532bf96b73b865b26ad16386706925d2,2025-03-28T18:11:40.180000 CVE-2025-31078,0,0,8ce8050616cfd8b7e1e7456f4899c4ba2c4c91fd5c0b1cde5e6134be185d9883,2025-04-02T14:58:07.527000 -CVE-2025-31079,0,0,8b7cdfa274fa030227bb339b2a2aa3a0990d7a27098ea51628566f7b4195c5d7,2025-03-28T18:11:40.180000 +CVE-2025-31079,0,1,46b384ef015521e190bca84bd2527302238a3f0c98173efde811ff4de494bc17,2025-03-28T18:11:40.180000 CVE-2025-31080,0,0,f5765755a2ce91b8863099fd7e2de278f04b94c4cc661b8dde775f3360a45794,2025-04-02T14:58:07.527000 CVE-2025-31081,0,0,861fe5a7a8dc08a1e4e9012abea6bfec5e3e656c0b9e13bee20af2af16ce0cfc,2025-04-02T14:58:07.527000 CVE-2025-31082,0,0,9f3db0c988533e5eb16a5d8011e1280a136ca6ff92f3fbb911ddb5a75bbfbb72,2025-04-02T14:58:07.527000 -CVE-2025-31083,0,0,2b356d52512e136be6deea9b2ef681ff962aec18a4ee0892c98d8dfaafd165a5,2025-03-28T18:11:40.180000 +CVE-2025-31083,0,1,291c53b9ff6d86c09a5b92eddc5412d8d3c12da9b763559bd490bedb4487927a,2025-03-28T18:11:40.180000 CVE-2025-31084,0,0,1e3bbace1093a7738c9469bff32b82733eb8fb471acdae53895ed1b3de1c246d,2025-04-03T17:31:28.073000 CVE-2025-31085,0,0,4201348083f2b8d185deee5ae4002090f26d6e8c658745e627f2fb92aa897033,2025-04-02T14:58:07.527000 CVE-2025-31086,0,0,98c399d24e2cd19a73e40da18e1cf5c41d7b4f9b19f58ab32eef26a814c093ab,2025-04-02T14:58:07.527000 -CVE-2025-31087,0,0,b99bcc552bc4281d9b5d81a6738034306842addac6eb6a137cc0056b989273f2,2025-04-01T20:26:11.547000 -CVE-2025-31088,0,0,4612587a189aefe8855a9caad30b909b0271d388c8ce3cfafc2442147272f7c3,2025-03-28T18:11:40.180000 +CVE-2025-31087,0,1,51f0b76dbc2a4d046c2d86ae617abba0a61d4e2bcfadef15449cb132d7410466,2025-04-01T20:26:11.547000 +CVE-2025-31088,0,1,a90e8a671f964030099d302eefe47e5fd11acefa7d52ba657ec01b85dc3e014b,2025-03-28T18:11:40.180000 CVE-2025-31089,0,0,32734a690104ce6afbf051121a3b11bca874be9067e19949187553be55ede7e4,2025-04-02T14:58:07.527000 -CVE-2025-31090,0,0,c742f28867f925f09edb8311608e07ab07752e35480ae0bab757c43c042c281f,2025-03-28T18:11:40.180000 +CVE-2025-31090,0,1,a5b2cd6e5da2b442e5c11765a639f08cd277c80d1cebf178cdbc75c1520b8502,2025-03-28T18:11:40.180000 CVE-2025-31091,0,0,bfa76020e302c7312fe27a0c4e692f7f101ea785a4bf68e68c90594a5d70e327,2025-04-07T14:18:34.453000 -CVE-2025-31092,0,0,4d8fd9afd09c13e28cb80341b3cf0168b786a6788b05effd872bc6a1de6c0c5d,2025-03-28T18:11:40.180000 -CVE-2025-31093,0,0,4754d5588b89135827d382526482193f59bad9b9c1ce6e1a35afddcf8bcdd8bb,2025-03-28T18:11:40.180000 -CVE-2025-31094,0,0,34a3ecad75f43d595b0edcb25fcfdaf64b45098287f880bb335ce4fec99f4a8b,2025-03-28T18:11:40.180000 -CVE-2025-31095,0,0,ef9884b552db6da8e33d5ed8de0d805e7ec2d6bf7aa5590ec56010595d87b28f,2025-04-01T20:26:11.547000 -CVE-2025-31096,0,0,8ca3a285f269aad50201bec6c5b5176c2aa3543ce31a05030bca7554320f02d0,2025-03-28T18:11:40.180000 +CVE-2025-31092,0,1,af0fc88d2e03ccf61191c9bf0aaff2de4d1d4ee2d61c8fd92ad7a5f8ed9847f5,2025-03-28T18:11:40.180000 +CVE-2025-31093,0,1,ed9f86efba419fceeed8287a46b0dfababcd0bcd1a9c9a5ce8e5c263afeb54d1,2025-03-28T18:11:40.180000 +CVE-2025-31094,0,1,b4b864687b7e93e5d573c184b676f1dbd158d4562b508099c0cf853b8584059b,2025-03-28T18:11:40.180000 +CVE-2025-31095,0,1,7418a752a1927a7904139e50a4ed3e197e893d9836b9573ec0a78aa40c655947,2025-04-01T20:26:11.547000 +CVE-2025-31096,0,1,6934b80f19b5e9b06df8809526dfa9854ca2683a34c38bbf4a1b9a8725164bfe,2025-03-28T18:11:40.180000 CVE-2025-31097,0,0,81304d2cca7a73ea94b523b674256b66d95e6036bb8242c2a7dda0b34b7cb244,2025-04-02T14:58:07.527000 CVE-2025-31098,0,0,888426771a8040575ce3850b49eccaf0628be230bcf71f1ca366cb558e39e2d6,2025-04-07T14:18:34.453000 -CVE-2025-31099,0,0,4c86dd21b4f050e9ca4bfab4f784a4375f6ca35560b038f877abe5e3229cb539,2025-03-28T18:11:40.180000 -CVE-2025-31101,0,0,2cf8e74c917f5eb2b3dea3e0d7d8600ede97a2ef0d0ab55822bb3d149c95f86d,2025-03-28T18:11:40.180000 -CVE-2025-31102,0,0,4ae39b1d21bf9a7659387386638726b4f9a10b166abb1ef9aceb0d97fc5360a2,2025-03-28T18:11:40.180000 +CVE-2025-31099,0,1,d59b3dcd5b166c2f5332f3dbfab7e0f340d869a303bd97e0a15d998a19cc86b5,2025-03-28T18:11:40.180000 +CVE-2025-31101,0,1,b0aa42e293ed8c0fa3de844d31c2f23b1ac4edce5e04ed55a821c3d034201c34,2025-03-28T18:11:40.180000 +CVE-2025-31102,0,1,1bffcfe145f0b4c20ae0eaf0c1dfb6f986c908f84db6c88ce8a6162685f2af9a,2025-03-28T18:11:40.180000 CVE-2025-31103,0,0,d29e578cc6c083b74e532f8344d8240b2142c1fd6a774a8d069c759e6d0a7e30,2025-04-01T20:26:30.593000 CVE-2025-31105,0,0,3ea420eb0f78514b1d8574d41cb07f9b0316bbcde24f1aa0f802339e7a9adf19,2025-03-27T04:15:27.447000 CVE-2025-31106,0,0,9cd943c74a3d3aeb9d7fce7b86609160c2b3b46f9adb8d4161fa966b85a9a529,2025-03-27T04:15:28.007000 @@ -288563,30 +288564,30 @@ CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000 CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000 CVE-2025-31115,0,0,d9c346dc734407b3573079497e00a644c27c2e9908db838b6a3d8b0e4c18509e,2025-04-07T14:18:34.453000 -CVE-2025-31116,0,0,365802d859f813ebd4a74f84f657bb2a5443e82a93171de8c0cd448867dbfc8e,2025-04-01T20:26:22.890000 -CVE-2025-31117,0,0,551c5a06d847a105a420d8050cad5d051b79612fc81a0944a6a9b46fa9f30c8e,2025-04-01T20:26:22.890000 +CVE-2025-31116,0,1,e6f602dfca3fef7607a4d66959b3482496ed1bcb318a1e3c3c832246219be81d,2025-04-01T20:26:22.890000 +CVE-2025-31117,0,1,225780aaaa9e104e918e0b998e5fd792f493a80608d43729aef93ee1e6d4b39b,2025-04-01T20:26:22.890000 CVE-2025-31119,0,0,8d9ab5def7d45f10e19e138b367b0c6d22067c0f28db2fa5e859ed729d9d01d5,2025-04-07T14:18:34.453000 -CVE-2025-31121,0,0,c668e00dc51794b2f1b83d4fed51234fdaa297e0c645abb483e7aa8446fa2b39,2025-04-01T20:26:11.547000 -CVE-2025-31122,0,0,d4d3b9dc77c023f722d4b751338ad31ac17ea2261b9c6ae57def859283fc4591,2025-04-01T20:26:22.890000 -CVE-2025-31123,0,0,6ebb0f55e6130b72f73f6757a877ed46a1421a80a7f6384e67a047c189fc6076,2025-04-01T20:26:22.890000 -CVE-2025-31124,0,0,30e95107f76a0c7b293693c4daf63fddb62b9f77d7b9aeacd29f3f7c880446fc,2025-04-01T20:26:22.890000 -CVE-2025-31125,0,0,072ccac32b06397b498203fc00d82b6c97b15bcc7f5cd2abbaaaa468b42585bf,2025-04-01T20:26:22.890000 +CVE-2025-31121,0,1,7d7f35ec5756d75ccbb17e775cce9719d9beb09e4b3a5e6e6e9c081dceeffab9,2025-04-01T20:26:11.547000 +CVE-2025-31122,0,1,9d10a08abcc76e6c9132fba1b31fc54c931fbd5a244a4acba0d835f767d49ffb,2025-04-01T20:26:22.890000 +CVE-2025-31123,0,1,c68ff19bc18cf9752723810827a75b0476217394b9862b9f74a881c420b1bd80,2025-04-01T20:26:22.890000 +CVE-2025-31124,0,1,00ca590f839811e6831028d7fc11bfb4e88933b3c0f7d1ac01d8c8c76e526109,2025-04-01T20:26:22.890000 +CVE-2025-31125,0,1,758220e19df59ec1146c07a56a54fd9b298c2dcc32dd85577f72fa4c31d89215,2025-04-01T20:26:22.890000 CVE-2025-31126,0,0,594a8e94f07ff895f7cdb73c7c326c792c6e32e5456100ad6de0f2cd956e261d,2025-04-07T14:18:34.453000 CVE-2025-31127,0,0,c3c69120067218a710205eeaac6e6acc7d4fd14fcb0d51ffd70e82dc0689d86a,2025-04-07T14:18:34.453000 -CVE-2025-31128,0,0,52e006b38e138bd3cfa52eda23e225a5789ea16b27f326a93ad59b1b0e562c14,2025-04-01T20:26:22.890000 -CVE-2025-31129,0,0,a6a4a9f484942a82b7b2400d9c67e69c64eabd46827eb84a0adccbba59ac10d1,2025-04-01T20:26:22.890000 +CVE-2025-31128,0,1,992ee51c7a18646791d426aa64d2b0202893c5a61a5ad55fec4ea4f70b592f53,2025-04-01T20:26:22.890000 +CVE-2025-31129,0,1,dff9fc2be964a820fb8cb151749bedd1a6b1b0feb654fb5f4f13b274250615b8,2025-04-01T20:26:22.890000 CVE-2025-31130,0,0,acf3990daefd59c21fd5a299f504c7568622322ae9d561fcc713ae7aa1c998a6,2025-04-07T14:18:15.560000 -CVE-2025-31131,0,0,ffe40251d16a258e4a81f59dcec18bb939bd64bb0cc9817076ba3c26ae95274a,2025-04-01T20:26:11.547000 -CVE-2025-31132,0,0,eaf6e55e3fdf39265a487f499946844b88ccfa5eca63cf5dd8b8ef7debd6ca38,2025-04-01T20:26:11.547000 -CVE-2025-31135,0,0,c29646479a81ed688aa2c7dba2e194b8b12ec18ec185c562b74cf6cab4701c90,2025-04-02T14:58:07.527000 -CVE-2025-31137,0,0,aa5cb365eeb8f1ccf4d4e02b2375f9788bb7b8b918887cbc536481f36524d9de,2025-04-01T20:26:01.990000 +CVE-2025-31131,0,1,b120cc94994cd9a3758fcba4bd13dbbd6f72eb85270e760ef840141e21464949,2025-04-01T20:26:11.547000 +CVE-2025-31132,0,1,529f4cea3faea434883eda729fc063219493e8e091a7f2f10b391b34138f5f80,2025-04-01T20:26:11.547000 +CVE-2025-31135,0,1,207e0c0576bd29325f457097be93c7a44eb5e24c5f685d26d2830ea953a650cb,2025-04-02T14:58:07.527000 +CVE-2025-31137,0,1,68ee066855a1ed540acafdd46a9114f6082667580fb68d589f14ffae7073796c,2025-04-01T20:26:01.990000 CVE-2025-31138,0,0,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 -CVE-2025-3114,0,0,eb0cc8026e9d326295de785426bf79375fb5e9c37472192f18f24a4f7ec13390,2025-04-09T20:02:41.860000 +CVE-2025-3114,0,1,10c52aae615ff76dc9c4bfd4236c21f18b97126c968483efd0fa83dd9a78516b,2025-04-09T20:02:41.860000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 -CVE-2025-3115,0,0,1b9ced13ea75f4aa49a649badc0373af21a5d6193b7340b126ef12441a29f16b,2025-04-09T20:02:41.860000 -CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000 +CVE-2025-3115,0,1,56373582c6a36776aed89b3820adf24688db4877d09f8b8d1c0e67b7b8bdee29,2025-04-09T20:02:41.860000 +CVE-2025-31160,0,1,82f17d7889cbcc07a050e3bd5a0bf584b89c18037b9043c83c638bc1493fe9fc,2025-04-07T01:15:42.477000 CVE-2025-31161,0,0,a5cff012c6715e6d7cdf36222e1d08dbc62300c22c1d4fecfefc68e4ec1dd101,2025-04-08T15:30:22.440000 CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000 CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000 @@ -288598,12 +288599,12 @@ CVE-2025-31172,0,0,62074afc6d32994ee3e26cb46ea208145dfa963a64c593f95d50ecf0d32ca CVE-2025-31173,0,0,b33fa31ab1a82f0a14477c301fa1aad1fed0fc9eace528248f4664d0f71e3eb6,2025-04-07T14:17:50.220000 CVE-2025-31174,0,0,2b09d641ef86582f085a34dbc8a0e15fea6044f982fae39560b77e48a81a27f7,2025-04-07T14:17:50.220000 CVE-2025-31175,0,0,b30fe8550725871fefab9ba367f407077356cec133efe4821b3a7aea346b7680,2025-04-07T14:17:50.220000 -CVE-2025-31176,0,0,5950baa63470ffff5328579543aed37796bcfb5a77b8a6c2dc6909c9a3e3e744,2025-03-27T16:45:12.210000 -CVE-2025-31178,0,0,0159271cafd90a7c68cb6b42d742565e913c95d142c34439b76c4b7fbcd3ab7d,2025-03-27T16:45:12.210000 -CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80311,2025-03-27T16:45:12.210000 +CVE-2025-31176,0,1,8500ac94130dd399003e18d292263307875bf6d92557e6b7c36177bceb013d42,2025-03-27T16:45:12.210000 +CVE-2025-31178,0,1,4952f6e781c685ac25fc24f1587a1f816ebea95ddfd24821aa94ec95658897dc,2025-03-27T16:45:12.210000 +CVE-2025-31179,0,1,8ec0554af59f7481dd66b1965d8b007e266de5c0c14e3697785f6666d53f1092,2025-03-27T16:45:12.210000 CVE-2025-3118,0,0,7589603d98026aca349bd4ea68cf34b6bc2ac1a6252374d274fb689308d1b121,2025-04-10T14:26:20.653000 -CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000 -CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000 +CVE-2025-31180,0,1,672925ab7d7b4b5f339c568eb8baaeba05d5d760b6e4b634fb8ad94c66afcb87,2025-03-27T16:45:12.210000 +CVE-2025-31181,0,1,2bb97b48dfaa50ca66fe4db390cfcd2b5008f894f43a0c9048b6ca689312fb2e,2025-03-27T16:45:12.210000 CVE-2025-31182,0,0,8d0dadc7fec7579b3c4ddaef7641311eae65f68d5d8a0686083e15fb44a0e78c,2025-04-04T18:14:52.887000 CVE-2025-31183,0,0,c73e164beb072dcd317fc78fa989ca1bf3b077c5b2036ca05764e7542a151cbf,2025-04-04T18:14:46.857000 CVE-2025-31184,0,0,9de93f9df79c2c2852be383e54b5da8ce2ffda4a32e49580a9cc8195cd97be7f,2025-04-07T19:15:56.553000 @@ -288616,7 +288617,7 @@ CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d3 CVE-2025-3120,0,0,9369db34641ba283515729ba877bacc73b1ed0ebf559ba3490de54e6e6cc3ad7,2025-04-07T14:18:34.453000 CVE-2025-3121,0,0,0fd3e4db6bab40a1114040fef4157a1f22168b8ff992c2ce90e1de325e42fd49,2025-04-07T14:18:34.453000 CVE-2025-3122,0,0,772110a5ff905b9e06974468fd4d65c9c80b3c7578e83c665aac7f3d07cf62ac,2025-04-07T14:18:34.453000 -CVE-2025-3123,0,0,5b331acab67b35fc645f3c9427caad44768ada4a83e54d5690a3f05dfbd3c2c9,2025-04-07T14:18:34.453000 +CVE-2025-3123,0,1,449baa99ae5f8386dedc8c93a29da0c19761ac9b25b48941a87f062412255d46,2025-04-07T14:18:34.453000 CVE-2025-31282,0,0,e42cf63dbb0fe720b3cff193b25f790bd6ddf2c2ce7f9ecf83cd2fa7f8f4826f,2025-04-07T14:18:49.830000 CVE-2025-31283,0,0,f1c9b9a8bd26581142b32e65b03aa48b10749e70986d31aa3500b4055b161aed,2025-04-07T14:18:49.830000 CVE-2025-31284,0,0,414b38cf46319d544e3e7ccb1bcdd15c60d390dd05075a67d2ab6f13acabecaf,2025-04-07T14:18:49.830000 @@ -288624,13 +288625,13 @@ CVE-2025-31285,0,0,c76aee62b0e63406ce2bba4eb6cc45c049f27ae73b357eac3652593406911 CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27fb4,2025-04-07T14:18:49.830000 CVE-2025-3129,0,0,222a3d9c8714652d0d6ba97391c55e31cbb028a8923d2de4eeec30cd2a04c719,2025-04-07T14:18:34.453000 CVE-2025-3130,0,0,2fc34a21e49634629835e2bfdad21b63fabf65952307e6d85abb2208a8a72837,2025-04-07T14:18:34.453000 -CVE-2025-3131,0,0,56c41c7a3abd5fee2ef9d2e92ed9bee398a4642831d4279a84cabdb8aeb4c04f,2025-04-09T20:02:41.860000 +CVE-2025-3131,0,1,f8e6a22856fde2ee726571aad6875d2710c7413e15f60318028cc56f5a484d14,2025-04-09T20:02:41.860000 CVE-2025-31330,0,0,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000 CVE-2025-31331,0,0,48d6dcadbd283a08a1842391c0c9e47ce4c05f71de3f97bfd6b5e3101a4dda56,2025-04-08T18:13:53.347000 CVE-2025-31332,0,0,3f108a9ac0319835d7c708da67bba48806ba6d1b5dc051eae9a5717ffd8b5266,2025-04-08T18:13:53.347000 CVE-2025-31333,0,0,08699a9906ce65a0334a63e341c6baa3bab14124a78670666f36434a88ab4eae,2025-04-08T18:13:53.347000 CVE-2025-31334,0,0,90b4ed63dc1be647230b7e7d107e9e1dc7ff2e1eceac7d38af6b4703cfff3e2b,2025-04-07T14:18:34.453000 -CVE-2025-31335,0,0,23839e3692f6b9292f971ac2ba3542c0132ffb2a9a22b6edf4f234426c27d3e9,2025-03-28T18:11:40.180000 +CVE-2025-31335,0,1,a59dc29e49bc09b300cb323976dd36a985ae5397e4dd70b31cd1f3d833e330c2,2025-03-28T18:11:40.180000 CVE-2025-3134,0,0,a71cb6e1788fa22b93ff06d650061e802b0d1c6df7394ab696b49920594382f7,2025-04-07T14:18:34.453000 CVE-2025-3135,0,0,faf2817fe977a6ad95e9552e324f8f965e6f56a203594f3cbe1385fe01f217f4,2025-04-07T14:18:34.453000 CVE-2025-31354,0,0,b8b90655d9a0b8747f225721e852a1a1020189f6d54a475687dca2277d63908c,2025-04-11T16:15:19.800000 @@ -288645,102 +288646,102 @@ CVE-2025-31371,0,0,cd370f88c92ee402d4c5aaef8baeb9e083693b4c18cd5565fe7e097d1b422 CVE-2025-31372,0,0,7a7a683873bc962dfe6aa91ab7aa77a42948f5cb58f2a30db9c2fe953aee9559,2025-03-29T04:15:38.950000 CVE-2025-31373,0,0,f9071278a14d544e1d638810d17e35e9b3cf783fa438c6415cfa720de050a0f8,2025-03-29T04:15:39.090000 CVE-2025-31374,0,0,a0063074d97edd2d0b6a359f9337f2fbc025fc83f5ab0917de6d943a4c010e45,2025-03-29T04:15:39.340000 -CVE-2025-31375,0,0,d40d58526a82fb163d06e606eb98cef9164c7aee4c60bf356c1ca3ba6396b825,2025-04-09T20:02:41.860000 -CVE-2025-31376,0,0,b701b7ba661f1762215842f01eaab352e5cec0fffbde18b5aedc908f1c5af508,2025-04-01T20:26:30.593000 -CVE-2025-31377,0,0,f0876c1370382f7938641dfce85161c18044561c007e6734f92876f9ff97935c,2025-04-09T20:02:41.860000 +CVE-2025-31375,0,1,d405635a02c76fcd25496a11ac054541bbc2f7187738a257e78a8dc2903d4e93,2025-04-09T20:02:41.860000 +CVE-2025-31376,0,1,d37ab2d997b2bbee796228fd10c41f2f3ba0cdf083f8049e4e1675d670cf90ef,2025-04-01T20:26:30.593000 +CVE-2025-31377,0,1,ded8881679c5020d0df6dc7ae355735962f8a4ba87ddf5677ef0f7b94038b418,2025-04-09T20:02:41.860000 CVE-2025-31378,0,0,5d8a1bb2245acc51e6a6ef8d8dc56ddc0a089171a287963f68684bca4ec62143,2025-04-11T15:39:52.920000 CVE-2025-31379,0,0,b14ef66902d1a6ebb9237bc69982d51c1cea06fae11df03e3a6df897650f5fb7,2025-04-11T15:39:52.920000 CVE-2025-3138,0,0,3a391b3973806b7c959b34db1fd6ebd0ddc97a57ffcf6e3917f0522b59cc1954,2025-04-09T20:17:06.037000 CVE-2025-31381,0,0,ef752b2c9c7c29a3c84fb86d4ef143cb9b4c68b6405ca16b3456144622287ed5,2025-04-07T14:18:15.560000 -CVE-2025-31382,0,0,2129389b54b4c5fdf51b41c80cc79ed9dc6b314dee3b0f9848e2dd7f9952ce24,2025-04-09T20:02:41.860000 -CVE-2025-31383,0,0,02c952aaf2086764ae7d30a36c2c8c6960b5aeedf4313811c1ec214922f78142,2025-04-09T20:02:41.860000 +CVE-2025-31382,0,1,72868a42f74c64c3416a52f6144b8bdd077c31ef3b9e95b1383174e5a95f206c,2025-04-09T20:02:41.860000 +CVE-2025-31383,0,1,dc0ac9a6c594802e6b2cb9fa26312c2fe646b29b40c26cfb5b5a580972bacd9d,2025-04-09T20:02:41.860000 CVE-2025-31384,0,0,2a0625ad103a2675f34c0efb54ef3d69c044c393961b9c9bd9a02a1b91b69579,2025-04-07T14:18:15.560000 -CVE-2025-31385,0,0,9ccdef04f711df1c6e05c21729531afd25432ec9220653c3a1dcc7dea45e7677,2025-04-09T20:02:41.860000 -CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000 +CVE-2025-31385,0,1,1f23051e8f5635d453f5a8bf8a35591417593ac24c48c63cbe6055f89b98c134,2025-04-09T20:02:41.860000 +CVE-2025-31386,0,1,be9f048a954aa648bd6b9cd14dc6eeb397812588cc0cb1f3d696a3a7829871db,2025-04-01T20:26:30.593000 CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000 -CVE-2025-31388,0,0,0500b5961e72058b1e5a2c84fc6e0c6b4bad5d8c527cad156e5fa1ef4ecb2bf2,2025-04-09T20:02:41.860000 +CVE-2025-31388,0,1,f62d80d7339af39b450a8deb32cfaafaddd1483f7922c8736d2109cc82b1fa61,2025-04-09T20:02:41.860000 CVE-2025-31389,0,0,c325abee254c046e90cc0113c3621986fa2d592e9234eae84e1d157fe75d1db4,2025-04-07T14:18:15.560000 CVE-2025-3139,0,0,d92b12075ce31c570013300fcf491334322f593740e5b2fe9c7d0ed59a1c1c36,2025-04-07T14:18:34.453000 -CVE-2025-31390,0,0,cfd30c39babd3471f35ebfa432daf7a3db2b35b83d6763a41c0c854bee1d83c7,2025-04-09T20:02:41.860000 -CVE-2025-31391,0,0,d797c804f848cd96788e7850352c8f2615036b1f78cc451834891b5940864554,2025-04-09T20:02:41.860000 -CVE-2025-31392,0,0,ffc520a6d0085b72f83d7dc9ed796d9e35563e699da05361f89fceb4290fb1e9,2025-04-09T20:02:41.860000 -CVE-2025-31393,0,0,ef61af60ecb6f42a599d6b28e8170f2409615c82a8f52290758b793897fbbee8,2025-04-09T20:02:41.860000 -CVE-2025-31394,0,0,35bcd5eb6b0051edfb7c45978aaa6a986235f7b243bc199de6d67c5fda75e8fe,2025-04-09T20:02:41.860000 -CVE-2025-31395,0,0,d6518399a22fb7f0117d5a7d13fd307885677a68bbee3703c8cdc091384e34d5,2025-04-09T20:02:41.860000 -CVE-2025-31399,0,0,252cb400501f8ad233f443884efb7de3e08293c24e02f5ab3a3bac7e9594eb71,2025-04-09T20:02:41.860000 +CVE-2025-31390,0,1,f6081a114be782955c5c4599441893cf50911adf553c4249423b2d88ba832fbd,2025-04-09T20:02:41.860000 +CVE-2025-31391,0,1,5b669cac65a04572fced311458911d4c445e6d5f8e6754c5eefdd622d7f461ec,2025-04-09T20:02:41.860000 +CVE-2025-31392,0,1,af5926a297ee06fad00816bdca5acd86e15a3bb4a408d814556ec95dc55593b2,2025-04-09T20:02:41.860000 +CVE-2025-31393,0,1,d9d0a7d5bc95ef6373f570176c8394d94346217559e211e7f82d92c36ed19000,2025-04-09T20:02:41.860000 +CVE-2025-31394,0,1,dcb2d58983e82a4803d87aef9833fc22dc7940b5638d0e63e8a54510592ceb81,2025-04-09T20:02:41.860000 +CVE-2025-31395,0,1,d63b8f50a08b3f03912992e56dcb94ad0fb69cd8ebe1ea98498b9e95366ac63a,2025-04-09T20:02:41.860000 +CVE-2025-31399,0,1,7c8d11ba4d0f5bc6369fc9e14d3cc41eb0008d7506d25878a6aaceb8d676a8e8,2025-04-09T20:02:41.860000 CVE-2025-3140,0,0,5e4447ac4f353309a204c953780c9aab222b7aa274e4ff45d2062480543744c2,2025-04-09T20:15:21.987000 -CVE-2025-31400,0,0,4b2d32de686d320674e0e3313204d55f14f4ac8a319bb99dda5ee206b909a906,2025-04-09T20:02:41.860000 -CVE-2025-31401,0,0,afe2a22a63b02354c3b88b26f9f1ba6e4feb76f3aa550b234034b6104f74f484,2025-04-09T20:02:41.860000 -CVE-2025-31402,0,0,33249c66684bf6e8d1b4dcb9facff0459de7eee1dcaf41ef4847dbe694ea0198,2025-04-09T20:02:41.860000 +CVE-2025-31400,0,1,396ab2cf0dea963b562cfbc33737fee1c7e3fa84c2f11a35bc4583ab0b70558e,2025-04-09T20:02:41.860000 +CVE-2025-31401,0,1,04ed897b4e7fff746da24144a340c7df651b8ccf5caac3a9f6ca466f5dd2e448,2025-04-09T20:02:41.860000 +CVE-2025-31402,0,1,c5d0910d5cd3d84fc78e145c779e344f8c17ecd37e800b3d75d61a60caedec37,2025-04-09T20:02:41.860000 CVE-2025-31403,0,0,af1f518a4f5460aa40054e837ffc06f3751aeeac2cbece905fe20a0cbc0bbcc3,2025-04-07T14:18:15.560000 -CVE-2025-31404,0,0,6d6333de86d45edc9b4ad168811a0b8ebf846f591f657f54f5db90643927abd0,2025-04-09T20:02:41.860000 +CVE-2025-31404,0,1,d21b9fb9b3469e84987983358df6e71d699c8d39d2ea87994cb33d6eeb11cc7a,2025-04-09T20:02:41.860000 CVE-2025-31405,0,0,befb9a9b701000631169f19b9525a9147c2b7768599e630ea62d53298ff2847e,2025-04-07T14:18:15.560000 -CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000 +CVE-2025-31406,0,1,8f770333d33bde829a2f12443ec31c0feb28b1ce30a8b9c1081c2e36753bfb0b,2025-04-01T20:26:30.593000 CVE-2025-31407,0,0,eb92c69f68b38eede8347f8bf26ad4aad6be3a22acff41ba3845769a0915f40f,2025-04-07T14:18:15.560000 -CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000 -CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000 +CVE-2025-31408,0,1,b90f37207f0e997414b9112aef3c27b133a084527669545603d4928a4abb0cc8,2025-04-01T20:26:11.547000 +CVE-2025-31409,0,1,b9077535cb0c1e091da990ff630f5916189d1065cb5853d41afaae8f10d9e34d,2025-04-01T20:26:11.547000 CVE-2025-3141,0,0,8360183ec4fba0da13c3410bb9d4443e65e196b85f2b1133d2249c2215248c03,2025-04-09T20:08:13.613000 -CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000 +CVE-2025-31410,0,1,02c4a61948cd1bc5da209892033cd9d0d4d471bf2fa47e81db94a1f1d4c59174,2025-04-01T20:26:30.593000 CVE-2025-31411,0,0,d7685f1e3a2304476b8558dbe7f5fd6bbeedbcad26c66ea4d9a3421088a9a5ee,2025-04-11T15:39:52.920000 CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000 CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000 -CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000 +CVE-2025-31415,0,1,f3d7d356dbdda00d6ffc73c41e2aad814bac525d79e5131ab611306b94b2e970,2025-04-01T20:26:11.547000 CVE-2025-31416,0,0,29878c1830e385646ac785a9b214e2a4646059477a152c5e18cceccf704d09b6,2025-04-07T14:18:15.560000 CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000 CVE-2025-31418,0,0,273f47353fe3591e42412a8d01b2ce012a4357939ad0ddea5f354c4444cb8857,2025-04-07T14:18:15.560000 -CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000 +CVE-2025-31419,0,1,4a712b78a5c17ab03dbc79fdd0418b0456ec3efc6ea6b7aacc939449a0c985e8,2025-04-01T20:26:30.593000 CVE-2025-3142,0,0,cfe9a4df387ca900f5eeef76dea61372c0ffba8eb1a551f3b7869cd050793b15,2025-04-07T14:18:34.453000 CVE-2025-31420,0,0,695f432344892337ae2ac59a6e952dde4581ca04d99a48205c358fb4efa25174,2025-04-07T14:18:15.560000 CVE-2025-31421,0,0,7e33fda4666889d6391294873e088571cbaa504e495b35bac6915192a2dd8df4,2025-04-07T14:18:15.560000 CVE-2025-3143,0,0,c55972ec8e6a58c40ec36f56cf8c75e5c390d27d604198d83215b8c596a99453,2025-04-07T14:18:34.453000 CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000 -CVE-2025-31432,0,0,66cb912d57f88bc72b111a0fcfbe419506a386c0afd760e3d30a46c5880e1d8f,2025-03-28T18:11:40.180000 -CVE-2025-31433,0,0,29229c0e5e364d182f865fd66896e72801948e3d4a178c39c73725ee177d1d9c,2025-03-28T18:11:40.180000 -CVE-2025-31434,0,0,fd6e557d5be9414ff58efa72871b7225ebc3d16a5ed03bd3604c8da6239c3911,2025-03-28T18:11:40.180000 -CVE-2025-31435,0,0,0f62c96c036522ad5186e49b737ef2befa37e3c5fad8564550f8570ac0168cc2,2025-03-28T18:11:40.180000 +CVE-2025-31432,0,1,1e744df6d78360ba76514d4c712d70299d06243466e1aa99c1a3712db77e8fc9,2025-03-28T18:11:40.180000 +CVE-2025-31433,0,1,fac9d330e1a61decf3f5950e2c96f512d6c77792307fff15d5bc19458ddf8ece,2025-03-28T18:11:40.180000 +CVE-2025-31434,0,1,9ac7d41bc94d196167ba77257447645067a7087cefceec9940906b5d997f4143,2025-03-28T18:11:40.180000 +CVE-2025-31435,0,1,96c007e36d539a9325cd27732e1a286868e8aba6b15f471eba268ae24651dbf6,2025-03-28T18:11:40.180000 CVE-2025-31436,0,0,795e77d2b3991154631d5c9f11a744f4b01b9e0377bda22753c9f3d8b96c3ea2,2025-04-07T14:18:34.453000 -CVE-2025-31437,0,0,bb9bebaa1e8049b6f9f323de79f1b89f64d0b8fa50986fd6d4b4769de19a4e05,2025-03-28T18:11:40.180000 -CVE-2025-31438,0,0,55b6cc7e6be8d251de6290ec4d11a0ed212ecb2367169b9673e1863d951d6df5,2025-03-28T18:11:40.180000 -CVE-2025-31439,0,0,c5c1da5e09db0442f7accb5c1822c26b14e61ab3b8df06836d07f9e6a67a5b2d,2025-03-28T18:11:40.180000 +CVE-2025-31437,0,1,06e851c38afe478422828a4c4cd768b2aece5994471f58c362c9414ed76d774c,2025-03-28T18:11:40.180000 +CVE-2025-31438,0,1,cf8d482d817c24801475ef237d037c2f1627b588a7c4124218853f96cd26aa32,2025-03-28T18:11:40.180000 +CVE-2025-31439,0,1,11b94f2d13648a8658aae88fce06117881e12de8e062e5712f2bb8cb7319ff5b,2025-03-28T18:11:40.180000 CVE-2025-3144,0,0,7ba5a0be6148b38548e6d67fd09b5d60b2f7490259a621e8537a6007794dd0bb,2025-04-07T14:18:34.453000 -CVE-2025-31440,0,0,fc686f5e7a5560d59dab940c9feae33dbee5619e900c7ecf44ae2d029cdd78a2,2025-03-28T18:11:40.180000 +CVE-2025-31440,0,1,9171bb8b23c8ca63d0f8e1467d4fb04f43d40a3a129e855d750888f207a8e452,2025-03-28T18:11:40.180000 CVE-2025-31441,0,0,086b8131d4f42372de25b0b9c9890c1b9c03533b53378e72946e94576dc09f60,2025-04-02T14:58:07.527000 CVE-2025-31442,0,0,cddd409acb5e9a3d82e6579c07efba725e22a6b31338116454a78978516908af,2025-04-07T14:18:34.453000 -CVE-2025-31443,0,0,a810a0ca0a57301b9d28937b27cf4f2f7004f4c29319f67b09d54b716d8647f7,2025-03-28T18:11:40.180000 -CVE-2025-31444,0,0,cca614c67502ce4038be1d0e91374a3053d89f8f564736787e05c271ce3cbf54,2025-03-28T18:11:40.180000 +CVE-2025-31443,0,1,dd85b71274d5294aad14d8042296e0b6e0a87b3b00f2ed027e0c5e275e4a2b4d,2025-03-28T18:11:40.180000 +CVE-2025-31444,0,1,709f6520aaadeb72c8680d86ae705a39468421297fdad52aef7366a27da81369,2025-03-28T18:11:40.180000 CVE-2025-31445,0,0,5c2addfd02e6a8cee67db41b062643de4cce7e268b2fcf5dea3618ee194bf3bd,2025-04-02T14:58:07.527000 CVE-2025-31446,0,0,1abbb4190ab1533ff8924c7127cf1b8e8b97d28f446a1674c1877505eeea242a,2025-04-02T14:58:07.527000 -CVE-2025-31447,0,0,a2e24f812a26cfffba6a6833b02599e438b1d438242739f5ab16be2c4e8d8c7c,2025-03-28T18:11:40.180000 -CVE-2025-31448,0,0,dbc24153384cdd280ff0ffbaac62baad727e56a7ed12e4c5d618e4466506b0de,2025-03-28T18:11:40.180000 -CVE-2025-31449,0,0,c84e231a93bf4ff01b3aa7a20d0a30116e7a77cc9ce263a8afa09f62ac82d414,2025-03-28T18:11:40.180000 +CVE-2025-31447,0,1,9cff27255cb3e17e28c8bfa7a908ea5eb21c6472a4cacf8f41f7a75f04eb1259,2025-03-28T18:11:40.180000 +CVE-2025-31448,0,1,0d50c338455e05db6debd8004c36ee2622ff287c4ec3a3072ed43908dacf87ef,2025-03-28T18:11:40.180000 +CVE-2025-31449,0,1,52553be2522b098c18852cf59c24a550735d76bb94a3e67c91de376dac3f74c6,2025-03-28T18:11:40.180000 CVE-2025-3145,0,0,4091c3caefc5b434633d03a5fb4450500610643647885125077fa86a7ea6f0a8,2025-04-07T14:18:34.453000 -CVE-2025-31450,0,0,2e691b4a20957344fc3f29c67e4ed46d7b1bc532cf783467b3109fc35a7b82cd,2025-03-28T18:11:40.180000 -CVE-2025-31451,0,0,22da2aaa904049403ee28b6e4c3472cbcecc3c989354bbd5b0b0a8dceff1b47c,2025-03-28T18:11:40.180000 -CVE-2025-31452,0,0,a03b3313f3e1b883743f768c769f3eaf27504279e23c8c00d258d4ea56af861e,2025-03-28T18:11:40.180000 -CVE-2025-31453,0,0,9528b249be3b29ac760b1a5f54a7581908d17d1b81da1f584771b831d632c68f,2025-03-28T18:11:40.180000 +CVE-2025-31450,0,1,1697b77baabd76c59e494f3ce72b1b9bbbd493623cced72e1e7db49b525a5b0c,2025-03-28T18:11:40.180000 +CVE-2025-31451,0,1,ef9dbad9d7116a0dfe7239117f6c8c990653d34f532dbe773c71059b5425729b,2025-03-28T18:11:40.180000 +CVE-2025-31452,0,1,14e1babcdcedbf28beebb61a532d48d2954033a7593aa334a28bdb4e42983b01,2025-03-28T18:11:40.180000 +CVE-2025-31453,0,1,b4439516dfecdafb062ccd1c13db22336bb56cf6fe94e63da6ee87343948e4df,2025-03-28T18:11:40.180000 CVE-2025-31454,0,0,e11729251aeb3fe9dd6fba5dcb4dfde71466b5b24d8130dba043b0b440febdbc,2025-04-02T14:58:07.527000 CVE-2025-31455,0,0,78da965f784601914679df69c7d7126d5e7375cdf4b83ecfc5fae15caa6e7a9e,2025-04-02T14:58:07.527000 -CVE-2025-31456,0,0,2bff385e8e0baa2ea87c8a48582c4981407a6004e4d53a30ca1a140f69765c6c,2025-03-28T18:11:40.180000 -CVE-2025-31457,0,0,94db5c74744c7e3010a6292f6398e658b2f1f4c4bfd962bc226325e8473a53a6,2025-03-28T18:11:40.180000 -CVE-2025-31458,0,0,bb420d9150dfa038eb56c1560d5ee862881401033f4e9a66754a4bcb53931cf7,2025-03-28T18:11:40.180000 -CVE-2025-31459,0,0,8f530f7b78bbe2c8b9cbd724d2022ba6735ddb60be16f64b7bf05413a18ac804,2025-03-28T18:11:40.180000 +CVE-2025-31456,0,1,28920384b3063f0681bc4aba8342d6bba1d2a7c2ab3ff1a80b8efb65537041da,2025-03-28T18:11:40.180000 +CVE-2025-31457,0,1,a1f14dfcd8bfcea56fb270bf25d24da13815c4738b56d09fd4fecc2e306d3ed4,2025-03-28T18:11:40.180000 +CVE-2025-31458,0,1,f13bd08177c7725e7fe208c107943a27aca6d0a964684d6a33ac9afef0f044b7,2025-03-28T18:11:40.180000 +CVE-2025-31459,0,1,4904a04774d129da8872e4ef9cbd37d72d0de126b991707b4a23a45b387f7d09,2025-03-28T18:11:40.180000 CVE-2025-3146,0,0,a592f95db3551a1a63b97f91d3d78c829dde50eae7e28285cf0fbec6bba22748,2025-04-07T14:18:34.453000 -CVE-2025-31460,0,0,09a19caf595f9b29966b1f49149104446c040f2d710b05930c9641719b4fffc0,2025-03-28T18:11:40.180000 +CVE-2025-31460,0,1,5e2525d46b1b47d1e4a0b76fc500fbba42c3ceb918b6d50e9bcfde54e52e56e6,2025-03-28T18:11:40.180000 CVE-2025-31461,0,0,bdc620dd49593c387f4a803645c68b850c06521048c648b5747c9585ddbd7413,2025-04-02T14:58:07.527000 CVE-2025-31462,0,0,5f9812a3f73c9de6fa4e1f00a3593337b0bd5f2ec7e8395e765dbef36c70e055,2025-04-02T14:58:07.527000 -CVE-2025-31463,0,0,9b2c2f8b991db3a26a51e33d41d9d9cddbba3af37f2dce198bfa8d4c19c47ebf,2025-03-28T18:11:40.180000 -CVE-2025-31464,0,0,cef469810eb1423bb7a7e1716b75c91cc72134c0c506e1793f76922b93cd9e19,2025-03-28T18:11:40.180000 -CVE-2025-31465,0,0,6e44e720ae1ebb67aaf908a22fed5ec3ede3833fd6421e9faf5f98fde13494f5,2025-03-28T18:11:40.180000 -CVE-2025-31466,0,0,8949ca4155d826510f40ba20fa018ebf472feb4783c6c45a3203ee2328cf61ad,2025-03-28T18:11:40.180000 +CVE-2025-31463,0,1,2eed54e68e3d6737406bc60bc9424f854944639098a240ecc910f289b4ed4f1b,2025-03-28T18:11:40.180000 +CVE-2025-31464,0,1,acb5824bcf2ebcc9a98ea6d6aa09654f9a3c30f781bc0232ddb10ced72d97bd6,2025-03-28T18:11:40.180000 +CVE-2025-31465,0,1,31100f0ae5369cc0879bbf65ec14d2b9c64dd5082bde45abc987a7fcc5cf35ae,2025-03-28T18:11:40.180000 +CVE-2025-31466,0,1,d001be0db04e1365abfdef21d55d942ab93f477739c98a2686a63c8b34364a9d,2025-03-28T18:11:40.180000 CVE-2025-31467,0,0,23b5660bd06f693351db06bfac2bcdbadc4fa81554df69c741bb0c86d9c91dab,2025-04-07T14:18:34.453000 CVE-2025-31468,0,0,bf9c1fa94f1d5595c8fc544b9c8e42774b02bc98ae5e27b917b30e008310d895,2025-04-07T14:18:34.453000 -CVE-2025-31469,0,0,b2368052847cee226f25de858a53defbbb5ee791af876ecd60ac831bb3efb065,2025-03-28T18:11:40.180000 +CVE-2025-31469,0,1,cb3d47397f9386a74dff5aa48c4e3aa392f60d7615cfb8d829466b912b38c72a,2025-03-28T18:11:40.180000 CVE-2025-3147,0,0,9685e1c7914c0849113c231ae834cdcb8c0abc2e719fe1302bab707b91a8867f,2025-04-07T14:18:34.453000 -CVE-2025-31470,0,0,b3e524e60e22c08db04157398abd8ee8eb05546d49c011c6dac54bed2b0b24f3,2025-03-28T18:11:40.180000 -CVE-2025-31471,0,0,f14a73777598a992310e0897619724d0e55e2ad37cd96fbfe8ec71a2d2fd30b2,2025-03-28T18:11:40.180000 -CVE-2025-31472,0,0,ae81b04fb65d7c7cbd3ac866886f9e1ba5d7ced37e5c5d1b62e397df92b5809a,2025-03-28T18:11:40.180000 -CVE-2025-31473,0,0,6b8642bfa6d52c3065cf9a40b6bbee92e5edddb9a1e9e71f4dd87e54a9e84baa,2025-03-28T18:11:40.180000 -CVE-2025-31474,0,0,3b178b6034f0ae913924408b2660b0dac0698dd9519ef434ea55136482afe5ec,2025-03-28T18:11:40.180000 +CVE-2025-31470,0,1,cc528ec6bc5c9b017cfd18e824a99739751ef29283dd893d912a3dabf43f42c1,2025-03-28T18:11:40.180000 +CVE-2025-31471,0,1,a33c2075cc76c85c876d3160d30c5477a8ff64232365b53d04ac3552d90e2f76,2025-03-28T18:11:40.180000 +CVE-2025-31472,0,1,eb8be703d38d9a84cbf7017d2e0c76055ba68390df1b9386f55bf14cbf564e80,2025-03-28T18:11:40.180000 +CVE-2025-31473,0,1,8edbaacc29861e0ed3a3ca51fb8d4293ab485bcd40b847b40ebd94e4effb92e9,2025-03-28T18:11:40.180000 +CVE-2025-31474,0,1,5e7d6600ce1174be36633aec5902c9252df21c2f48f1552b8554d9d1218e307b,2025-03-28T18:11:40.180000 CVE-2025-31475,0,0,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000 CVE-2025-31476,0,0,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000 CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000 @@ -288758,7 +288759,7 @@ CVE-2025-31489,0,0,86b687749f556cb33a8356498a01d508d0da05ad595a76560944268496b2b CVE-2025-3149,0,0,61479a4dbdbba6ab59d1ae99d855a79e55a52858fd9b2654fa6a6f9d8eddf660,2025-04-07T14:18:34.453000 CVE-2025-31492,0,0,c3a8af2b78a6ecf7a731e5159a73f99e4e0787364701aa4aef00fbbfc177b209,2025-04-07T14:17:50.220000 CVE-2025-31496,0,0,12f17064ea4e4584d7a91216d2d100c9a89220efe7b8206230e9a4ff7e506dee,2025-04-08T18:13:53.347000 -CVE-2025-31498,0,0,4d0b1d0443b00abb73c24b0904ebb872eaebcc417a52a0d2793abe18a50dbe23,2025-04-08T18:13:53.347000 +CVE-2025-31498,0,1,f84cf018b9a7f2d3baed2463f19bf6204e206ba0c9a21e4ea32e21746b404d29,2025-04-08T18:13:53.347000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 CVE-2025-3151,0,0,fc53025e57933c63ffd27d66baa971840e395a51a52617b1c48843e916fa986d,2025-04-07T14:18:34.453000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 @@ -288773,152 +288774,152 @@ CVE-2025-31522,0,0,8b152261343b34bf4b32d69ed994a16afffa1303f58888cc9c6a6e6905a21 CVE-2025-31523,0,0,81113894cfa80d89931ea63414c1f6be1d24ae5c614ab3a56f7fe8c072a28f33,2025-04-01T03:15:18.630000 CVE-2025-31524,0,0,d35b338872ef232310dddd74c0cbfc8a6cd08cffa07c2569c463fae0139da626,2025-04-11T15:39:52.920000 CVE-2025-31525,0,0,1edcdc55e4105d68d9748a283fea82492cf2708b53f458069bba8226ebfdb48b,2025-04-02T14:58:07.527000 -CVE-2025-31526,0,0,6b994d9dfcfda12ac02d0c38dca3cd2a72a7957550d285e07c64f664be7feb88,2025-04-01T20:26:30.593000 -CVE-2025-31527,0,0,65969985c05d19b2b3662bd9fdcdc5e9885859dc7c7ab521257e59936faa18bb,2025-04-01T20:26:30.593000 -CVE-2025-31528,0,0,f49948bbf0c4c42394d03aef58ba6b9772d0352fd3817dd77ca3c31a81ec7172,2025-04-01T20:26:30.593000 -CVE-2025-31529,0,0,225c1ae94543fb8667466dbed84610d7ef6f6f01271959aa1b4153cbe221bdfe,2025-04-01T20:26:30.593000 +CVE-2025-31526,0,1,81ee16c378a27e29181aeadc3a6022549901cbb67cb819680324faf3d5015c20,2025-04-01T20:26:30.593000 +CVE-2025-31527,0,1,b9ebbcd435831231abb308e5245d719d7aee70f8e96ecd583a9d8ed445515e3e,2025-04-01T20:26:30.593000 +CVE-2025-31528,0,1,d395d4411663c3be8fa9e12374c0cf2e2857ece50324963d42a9db0077be4f32,2025-04-01T20:26:30.593000 +CVE-2025-31529,0,1,f19452459af99ca08cab3cee4c0f67de6933a9bad0504265b2aed70d0c203512,2025-04-01T20:26:30.593000 CVE-2025-3153,0,0,8a0a2ec0fd9d7679d5a0b3e0aa0c141f1099785aa59865ff8d6c35b21b5b2bfd,2025-04-07T14:18:34.453000 -CVE-2025-31530,0,0,64a35abff23ae827a728640ef903f55f596fd05bb923a0a345a62a5b7fa835a5,2025-04-01T20:26:30.593000 +CVE-2025-31530,0,1,f13e27a6a96145736c1f643d253135fce8f41e536c64f6a37d21d292dec44e1d,2025-04-01T20:26:30.593000 CVE-2025-31531,0,0,7271e84200d4347b7364a572f893f39bc776e70462ea18ec63a78f344b41ae02,2025-04-02T14:58:07.527000 -CVE-2025-31532,0,0,0695feb2c77b861b6a9a935b4833d3e2a04871f9c3fe711fde58a520f3e674ca,2025-04-01T20:26:30.593000 -CVE-2025-31533,0,0,f3bdf413c63f279a84a26ec7d91e82db7b55f1640eb1f502c3463bd5c06ade76,2025-04-01T20:26:30.593000 +CVE-2025-31532,0,1,6dc5895a84f9cb630d8f37150d178146a0ef3b1fd4ddf509f2589289d411da73,2025-04-01T20:26:30.593000 +CVE-2025-31533,0,1,3a4662f209e42efe350fddc781d59ea8c95f65894933008d6ea723757a1bb82a,2025-04-01T20:26:30.593000 CVE-2025-31534,0,0,7c79ac2e52c538c99ead18facafc56cd962a5ee110786b042663a3f1aad09c96,2025-04-02T14:58:07.527000 -CVE-2025-31535,0,0,4083dd10379825bea705ea43b83a6f48311d8ab01c90c8cf7d76d183f8da7b27,2025-04-01T20:26:30.593000 +CVE-2025-31535,0,1,f52e3e526452e26f042cd1ee9bac0034cc45f38e2b9b12c95d1da65f0c08aa50,2025-04-01T20:26:30.593000 CVE-2025-31536,0,0,9844b7d7bc43358259a799ab9f14f2dc323131b9de48308d56c5e8e1447c4e6f,2025-04-07T14:18:34.453000 CVE-2025-31537,0,0,85b4c37deaf97098cd9510a40acc3a503f10f971fa6aae37bc43ec3743e38308,2025-04-02T14:58:07.527000 -CVE-2025-31538,0,0,a543db87d89c04c31d8bf1c05d16c8485482cbecae5f9bf80580092da07dff15,2025-04-01T20:26:30.593000 -CVE-2025-31539,0,0,ffbc00e55d8c15e6b1b821148deb243dbce763fcf6b046964a4ca6edeeeb753c,2025-04-01T20:26:30.593000 +CVE-2025-31538,0,1,302c351830626fb5937ad635b2021a8ef3487a060907372ceb692bc257b5dc1e,2025-04-01T20:26:30.593000 +CVE-2025-31539,0,1,b21e7bf7006f0dc275e972c8f584fe285221cac1da3d0b2db0268937b3d3c65e,2025-04-01T20:26:30.593000 CVE-2025-3154,0,0,a0ad8a22f4af9e97241f1650c6a80242c554e0ad7acd770fab74488a2d1a9875,2025-04-07T14:18:34.453000 -CVE-2025-31540,0,0,921925eab553884c24b8f811a0476b75aa4b8ae88cc84eb82b5ff59366af1290,2025-04-01T20:26:30.593000 +CVE-2025-31540,0,1,4859b21eea06069d10f8cf7a8e564c5d024010da40bc5fbac9656d209c2e971d,2025-04-01T20:26:30.593000 CVE-2025-31541,0,0,aba064911c2e843fc48f9b67555294393a1d2b8c2a44853c9428ee0adb61df19,2025-04-07T14:18:34.453000 -CVE-2025-31542,0,0,98d1b9f9d5a343b33902309bcfceac548c95a543854155f803f4ee0e07370826,2025-04-01T20:26:30.593000 -CVE-2025-31543,0,0,37ef3238cf5e4f4d4679f9facb0eadb11aa7fac10a343134b1591c170a367e8a,2025-04-01T20:26:30.593000 -CVE-2025-31544,0,0,396e63b9853aa96712ed6074608e1ae614d4afe051268e517409539415a9ea3f,2025-04-01T20:26:30.593000 -CVE-2025-31545,0,0,5050c5e1cb9221206aa02351a0e006210283392e298bc90ed3f4322850762f54,2025-04-01T20:26:30.593000 -CVE-2025-31546,0,0,c81be945160530a5d8972f502c8b6dccdcbc4f31426d17fb23e7ca1bda644639,2025-04-01T20:26:30.593000 -CVE-2025-31547,0,0,34c1819315aa0af394560d2aea8a2920a9d3d7da1f143da584c8e8a4f22c83cb,2025-04-01T20:26:30.593000 +CVE-2025-31542,0,1,131766e0236b0c71da17020e45c119614a0c22b57aa6727536e4b7448c2d71e7,2025-04-01T20:26:30.593000 +CVE-2025-31543,0,1,48796a41bc6e92db9e3008a237e4985886b73f0e895bf137f1bcf9567b7e1702,2025-04-01T20:26:30.593000 +CVE-2025-31544,0,1,fe84002ea626025697daaff88ffa24b8e1107229d8c176b69112b65ea5d5c9bf,2025-04-01T20:26:30.593000 +CVE-2025-31545,0,1,b40592755d39eccb8c05e0cd115e0038918c8f7e70c591b662dece6d3fce6d5b,2025-04-01T20:26:30.593000 +CVE-2025-31546,0,1,ea1a0fbb32fc0d8f843e251c2900c9f3bf773f8bead39ce5af4bea45a6c7d2ca,2025-04-01T20:26:30.593000 +CVE-2025-31547,0,1,f5607c580924af16dd0ada70846ece32dcd8885ccfe1f299b8e940090918b0c6,2025-04-01T20:26:30.593000 CVE-2025-31548,0,0,d1b4214b4f31dcd8a9025f858166713a075840a49164ed00e12986869a0aecde,2025-04-02T14:58:07.527000 -CVE-2025-31549,0,0,83b4a5c9d8badcd5b96931246bf4796624e241c3b1f405e59a18f12c8a783db6,2025-04-01T20:26:30.593000 +CVE-2025-31549,0,1,6e04d0af8bd8de1ee53eb25324158c685c942726fcb5a8e75e9378a9fbb44aac,2025-04-01T20:26:30.593000 CVE-2025-3155,0,0,4c655058ba8507752997992f548ef355bd8a4c2040437a6bcc8ac21390dc4ebb,2025-04-08T13:15:41.573000 CVE-2025-31550,0,0,83f208aa53a9d367608231584d9c7b6b24f74f32a0a08dd8a80b85123a4b82ee,2025-04-02T14:58:07.527000 CVE-2025-31551,0,0,01a6ff107cfbcc3282db3d6ad9a7d1be104aab604084a23cac69debe8b4c1934,2025-04-02T14:58:07.527000 CVE-2025-31552,0,0,acadf09f28068f6285801331d50088e92d056876ddaa343a4a85705dae7fcdc2,2025-04-02T14:58:07.527000 CVE-2025-31553,0,0,6199a70f37d4afdcfde4b3b98835b0d5d706aa4eb9745f64e1076f503cf54fc9,2025-04-02T14:58:07.527000 CVE-2025-31554,0,0,a1a2dc7bf58a4e8c318f2f0660b6e56c52ce7f1db831c3ed35d7b054b1158ba2,2025-04-07T14:18:34.453000 -CVE-2025-31555,0,0,e4f5489c7d6c16406013ddf6370f6b2753787a0e05f4eb053937b8676af9f6d1,2025-04-01T20:26:30.593000 -CVE-2025-31556,0,0,ffd8b44ada98c45fb43c3ddacc338b323a23c11b474bf89cd83b57c85c8ba772,2025-04-01T20:26:30.593000 -CVE-2025-31557,0,0,d1e623ab7c6005b5877b937585402e22dcbb8e813463663efcf51e7de4f4edff,2025-04-01T20:26:30.593000 +CVE-2025-31555,0,1,ff14387c18b3cf6c101ea79d740b9ffc448825690633e10dd55e3b679beb30a4,2025-04-01T20:26:30.593000 +CVE-2025-31556,0,1,e22292e80f35bf368682d9d742874f73bcb30f5bd683c56b21ea3c8f54c3853e,2025-04-01T20:26:30.593000 +CVE-2025-31557,0,1,e5a6e976d594a292a95a15aef79b8bcf3c73a0902fdc936e7356b8f126cfe70c,2025-04-01T20:26:30.593000 CVE-2025-31558,0,0,4f9ab9df71a01b3edec7c9b6e12175606be553c7c4418449c810ee8495b4c937,2025-04-07T14:18:34.453000 -CVE-2025-31559,0,0,ab0701910464d2cd8453bd5084f505deb941889cffbe21c3faf4d7fbcc605bef,2025-04-01T20:26:30.593000 -CVE-2025-31560,0,0,4e04953665dfef88ebfcc30f7999484806221f559e26c71f45463b7679f46777,2025-04-02T14:58:07.527000 +CVE-2025-31559,0,1,41f201b8bcb6b562b908f794250b712a35b1349655dc3d5a536008c2f2bfc83c,2025-04-01T20:26:30.593000 +CVE-2025-31560,0,1,edb125bc18d38fb6072635ab9c061e4cacb1134550fd3851249227c263ec7c44,2025-04-02T14:58:07.527000 CVE-2025-31561,0,0,3491d1f7344c08c4ef3e0b71025b723d510b39b39ca933a00cd3e46db49b6060,2025-04-02T14:58:07.527000 -CVE-2025-31562,0,0,df119823e410a7a45f3a911427beaa496238dec20dff3dd6b501ec4e5cebad80,2025-04-01T20:26:30.593000 +CVE-2025-31562,0,1,c9f83d50f8736622879eaf2efa4f3a1f520dbddd9f9c99f22d513577500eeba5,2025-04-01T20:26:30.593000 CVE-2025-31563,0,0,9dbeb566529f2bf77ed2ce1cded916c338efc12b79101caea2e49ffdbfd5b0e3,2025-04-02T14:58:07.527000 CVE-2025-31564,0,0,bc4b1a81b867062682ca17e864a021dc58720c6c9d5e6767e2d55a23490e9751,2025-04-02T14:58:07.527000 CVE-2025-31565,0,0,ab650f2515950e6803444bc4e4e6a7dc659778e500908b78aff616180b51a691,2025-04-11T15:39:52.920000 -CVE-2025-31566,0,0,b73e751eaa24dec50a586ea1b2a436bd820fdbea10cd86a12b923f56028c09de,2025-04-01T20:26:30.593000 -CVE-2025-31567,0,0,a0f102972e5777803c97da78037ca5f46e8d48b9c8158fcab03807afa37a6534,2025-04-01T20:26:30.593000 +CVE-2025-31566,0,1,88a3f71f113bdaba8fbe381204ce988b72cbe89689e8e40c381813cabe74772c,2025-04-01T20:26:30.593000 +CVE-2025-31567,0,1,78490daa458580fb033702a5f75afa4ffaa6785b17749b98211ca6ecaf2596e3,2025-04-01T20:26:30.593000 CVE-2025-31568,0,0,3f5a817fe75216aaf0a70f4856e44cd7a47f3999e7330e8e409ac9d0d885a70e,2025-04-02T14:58:07.527000 -CVE-2025-31569,0,0,1588888632a40a33cfbca67fd49e63c704cc2f1eb6a5ef0347bb44f7bc2a5b6e,2025-04-01T20:26:30.593000 +CVE-2025-31569,0,1,fb55525696732c80c06cec1d75e96e7cb8a23f67c4d137f9eba8bf54d6f4e12c,2025-04-01T20:26:30.593000 CVE-2025-3157,0,0,64eceae13f39deeca2be6f9c8451e1126b30f7708b430426ba00968eb60754f7,2025-04-07T14:18:34.453000 -CVE-2025-31570,0,0,d2d79f92eec0429d8ea030d939616a626ba7384b80517d081c7f80ffe8aa7e3b,2025-04-01T20:26:30.593000 +CVE-2025-31570,0,1,4a7a3355031432bd1a7548f31ee4c0ec818f52e4d3f58fc1ff5b5ac3fab50d9c,2025-04-01T20:26:30.593000 CVE-2025-31571,0,0,bbe14a6883c75e5549a08f62a619350bcc03718973433a500d2843ac3bb3b470,2025-04-02T14:58:07.527000 -CVE-2025-31572,0,0,6bf7e4e9be33beb445a912dbd580597743ac85479fa03261111bfb879b7e568d,2025-04-01T20:26:30.593000 +CVE-2025-31572,0,1,d5eaa613d16494e2bf96d7431363c908593d4f02a9ae6428e377d6cc35f1c6fb,2025-04-01T20:26:30.593000 CVE-2025-31573,0,0,778d2c64cb245b77beb7a4dcb97b523ee494d8408b9c0d129b8d547bf599dbaa,2025-04-07T14:18:34.453000 -CVE-2025-31574,0,0,d1422c406f6f7cd5213ae0f500ba2eec7b7350d96ae86de4f821cda332f2afee,2025-04-01T20:26:30.593000 -CVE-2025-31575,0,0,ec8e02da7332fd6709e12a3dc98e0ca50c244a1b47bb55ebddd9242877c74133,2025-04-01T20:26:30.593000 -CVE-2025-31576,0,0,59d773c3bea0b5753f8d0dd82f8df8ba304ca51df8a576ccd9ff8afeb255c90f,2025-04-01T20:26:30.593000 -CVE-2025-31577,0,0,139e19e7a460958e53e390e49d40e4d69701a838ff7703dcf43e2a19b0c6f905,2025-04-01T20:26:30.593000 +CVE-2025-31574,0,1,2537e90c7bcc661ba13a07b78126c6a45d04a78538f07c9767ef17f07322b658,2025-04-01T20:26:30.593000 +CVE-2025-31575,0,1,12d66fb2a7dab2883e28a15d0e82a56283c9f3817e8adf7d312e3fe4b42427f5,2025-04-01T20:26:30.593000 +CVE-2025-31576,0,1,8f505ec035661ea34199b515507f749658a10b84db0ec2ff7c1c8e29b3401c24,2025-04-01T20:26:30.593000 +CVE-2025-31577,0,1,56d31358e39c4a54d9ec959c9c024f6ced7791722ab955eefe7463e1b118ef3b,2025-04-01T20:26:30.593000 CVE-2025-31578,0,0,8a05c06307b001f5af566c8e1381024e5580237037c235bed2704b52a36d5194,2025-04-02T14:58:07.527000 CVE-2025-31579,0,0,5592d2c36c4610f97e4e57769c0ccf2e64e4082ea1ab9472675c9542530e83e8,2025-04-02T14:58:07.527000 CVE-2025-3158,0,0,c449170260772bac14af44f85aa2e0a989c694f56e57bf19a54e000fbe6e9782,2025-04-07T14:18:34.453000 CVE-2025-31580,0,0,64a9beb50e4838aae07ca3a078bb90ed9d00706ef3f73f9389c75df1eaa3dff8,2025-04-02T14:58:07.527000 CVE-2025-31581,0,0,6d77e8cdaa2894f9f5d4608ec01533bd929f5980a82830c8706f7d58b0445e96,2025-04-07T14:18:34.453000 CVE-2025-31582,0,0,76b01e8ef2eaf1aaba8bba41d5c2bafb0d9e3375561870ca7c129180fe17981c,2025-04-07T14:18:34.453000 -CVE-2025-31583,0,0,90d82ee4656b57a761f2817868bccae2ca6bbce297f4daa33437962bd90d12b8,2025-04-01T20:26:30.593000 -CVE-2025-31584,0,0,8cda5ed8dcd05843324a667e51486919740bf4c2655cb39016928700a95220b8,2025-04-01T20:26:30.593000 -CVE-2025-31585,0,0,33646daed7b6285ae8a16fa0b7e0e73e2300e8adc4e0e2c9077b5da6a89a537e,2025-04-01T20:26:30.593000 -CVE-2025-31586,0,0,f9a8b86e11a4dfc55055870bf9d6b087b25d53693b98ffc21f45b60e2b403884,2025-04-01T20:26:30.593000 -CVE-2025-31587,0,0,7d7961cd22148bc05305c6b253a48704952f211bc9b34db615421a69fcf92565,2025-04-01T20:26:30.593000 -CVE-2025-31588,0,0,9ae8f9bbd463622144bdf8e1626fac9d4b115ac7acda27045ab5911244430015,2025-04-01T20:26:30.593000 -CVE-2025-31589,0,0,27c4f23fd09b2261cb4b0edd290f6d7c9ff569d6a4a29adf28c798871498cf1d,2025-04-01T20:26:30.593000 +CVE-2025-31583,0,1,8ea9fa472ba88192feb0ff41a20fe1d96be240ffd6b9c8dbda22777c4170df86,2025-04-01T20:26:30.593000 +CVE-2025-31584,0,1,26b0d654a297df993acb3e6327e37e5e675ec4aba93f55266b771e993413d97b,2025-04-01T20:26:30.593000 +CVE-2025-31585,0,1,58722eb80f11647f13b3e593da6267f41d4224bf1bc7fcdf19cdfc6f4997c58a,2025-04-01T20:26:30.593000 +CVE-2025-31586,0,1,9e626a86da26fc312dd89207d1d9ee0e903981a745192a4a475adcbe4ebb5101,2025-04-01T20:26:30.593000 +CVE-2025-31587,0,1,a23c934fc30b30f90e001e2ca7ccd5c02d915e2a739008bc41fcbe8b88ea8c1d,2025-04-01T20:26:30.593000 +CVE-2025-31588,0,1,83a650b1770d58ce457cd272aa9bdb3213e26d32653e5319bbe4b21f88a2e8f6,2025-04-01T20:26:30.593000 +CVE-2025-31589,0,1,aa1be9b9a1ea499d1ce0ebc342299b37b24950e4c213243c7e52bf28c2567aed,2025-04-01T20:26:30.593000 CVE-2025-3159,0,0,bb916317503013881605f601feaa5db1afe521b6ae6b774591a3853e18dd16db,2025-04-07T14:18:34.453000 -CVE-2025-31590,0,0,6a5012d1447e6ea6dce87148f22906cc4a87e586f53199f70e374e5784666f4f,2025-04-01T20:26:30.593000 -CVE-2025-31591,0,0,1b01bd67d24ad09ebfccb81e0b0825779d9a936826ffe0ce337fd0cffa9dab16,2025-04-01T20:26:30.593000 -CVE-2025-31592,0,0,55a33caa42a56c4e425871a8cdd7e2aa5e42d4640e483c3c4b2d02909e061b9e,2025-04-01T20:26:30.593000 -CVE-2025-31593,0,0,e20cca846edf83a3e97b982760a8d33fac411a175d586dcb2f1fea5b755cb6f2,2025-04-01T20:26:30.593000 +CVE-2025-31590,0,1,2a1d622154491fb294e5ccbc24e16e2d910b2f9d0edb05c651f4b17718d9c471,2025-04-01T20:26:30.593000 +CVE-2025-31591,0,1,d8364747155279afc80d8dd04d53f74c6151d02ab4359188029c65c6546c247f,2025-04-01T20:26:30.593000 +CVE-2025-31592,0,1,af2e140472bac688188b55d92ce0d839fcd88d1582c278e5cdf34cdee9138c8c,2025-04-01T20:26:30.593000 +CVE-2025-31593,0,1,f83ca6d7e726014a26b0cf09688db604fed88949cf0a6ce693981a1446eac87c,2025-04-01T20:26:30.593000 CVE-2025-31594,0,0,560924f5310e6ac566770c572c2e472eba43884d9fae4472d5f03da87cafeca5,2025-04-02T14:58:07.527000 -CVE-2025-31595,0,0,151880bf744232cbcbf1643421b37f666c4ea47688fec797419f5b8f81dc4a91,2025-04-01T20:26:30.593000 -CVE-2025-31596,0,0,e896459fbdcc607dd555d455165e1dc79d5e3d571b33b64b433edb030b97db64,2025-04-01T20:26:30.593000 -CVE-2025-31597,0,0,e106894e0dc3bf39aa4a6ca2be6508645bd2a0c5da98e3120e98f2075c99b617,2025-04-01T20:26:30.593000 -CVE-2025-31598,0,0,7986254df2fa61506e3cfd84c1fcbf6530f4be8c2c1793a5e7b53f7eb1927a9d,2025-04-01T20:26:30.593000 +CVE-2025-31595,0,1,0ff6afc184f612f5088f93ae3abc50eaa3084eb12b8b9073f469ce4c0e2f0af4,2025-04-01T20:26:30.593000 +CVE-2025-31596,0,1,aad9233bd8661e4684bc1b747f4725b59da28a821aa92819df948246637e5df5,2025-04-01T20:26:30.593000 +CVE-2025-31597,0,1,c56e5b07a5fc2150780127046f40e62759eb7a8d46108e70dda91bb8742c796c,2025-04-01T20:26:30.593000 +CVE-2025-31598,0,1,bd3436c70e2d5db5a619b2e38ad33250fd980b1cdfb05cddabe90aa959308415,2025-04-01T20:26:30.593000 CVE-2025-31599,0,0,38bcb19bf2c5eede796c279e32767556750bb43221a83379b81d6da3aeb1bd70,2025-04-11T15:39:52.920000 CVE-2025-3160,0,0,4464f8f76e84354c7af959c6e12663f048c590f7071bc6506e0245010bf2c7ca,2025-04-07T14:18:34.453000 -CVE-2025-31600,0,0,cc30e80be704f71efea0f7d65959971d15abc8d300b195f8537623679874e2eb,2025-04-01T20:26:30.593000 -CVE-2025-31601,0,0,d1204eb1e2da897f0e9c0df742ef423bbbd35a28b3b884fad892fc803b1a2f60,2025-04-01T20:26:30.593000 -CVE-2025-31602,0,0,6b1845881cf974604821c8a496eaf4f6e68acb193a340045e9523bb05ebc6a32,2025-04-01T20:26:30.593000 -CVE-2025-31603,0,0,27ea77198b0821a11bfa532846c853ee6ffc57d22c0401eea1f3491555a7419b,2025-04-01T20:26:30.593000 -CVE-2025-31604,0,0,76afbc7de681a91fe8468730694a548c08304d35cfa52249651619be2c2a72d5,2025-04-01T20:26:30.593000 -CVE-2025-31605,0,0,f6f87993e404c10bdfc6515d0507919442712a62e8c97b2a2390a494f9025713,2025-04-01T20:26:30.593000 -CVE-2025-31606,0,0,2633b39a6148f1adb80382c81f69fc24442acacdb4e9d984288979497d7a0874,2025-04-01T20:26:30.593000 -CVE-2025-31607,0,0,1b8e5e2c007b358c9604c3c94769e34f5d99b3dfc6ca70b74eaa51a4ac9075e9,2025-04-01T20:26:30.593000 -CVE-2025-31608,0,0,089bbe8403005729d598d3fe997aa6808f1aae2347d36e5cb01e56b6eb12919b,2025-04-01T20:26:30.593000 -CVE-2025-31609,0,0,1e718e53382f5520e74b9c0393e21ee2a02d1c1624eccb6a44d974229a0ece48,2025-04-01T20:26:30.593000 +CVE-2025-31600,0,1,fa3d2d8930591f08e1ea62eb988303b27aeb522138bbdadd3c3dc77855f43b20,2025-04-01T20:26:30.593000 +CVE-2025-31601,0,1,1be96b78c863db2d0139302f69a4c01f566a3eed2203ca6db215c01beffec314,2025-04-01T20:26:30.593000 +CVE-2025-31602,0,1,b28a3fde438f237c5fae6c21c5372f60467b2f78c531fbd7a5c322a5bf419a4a,2025-04-01T20:26:30.593000 +CVE-2025-31603,0,1,f0f6f41c9a796b36c19ce48f774bbbe937c56fe3adba323b7827ff62422790ec,2025-04-01T20:26:30.593000 +CVE-2025-31604,0,1,2c3a5d835932f23e3a97548d4789e00c41836fa6d12b7c87990cdbc8c95d5a51,2025-04-01T20:26:30.593000 +CVE-2025-31605,0,1,f6bfb3f2ca1efcd16c4d50398f2649ad81a783f2ed279a7af278d7b66cc7e6b0,2025-04-01T20:26:30.593000 +CVE-2025-31606,0,1,6caf26e9455b8539b8456a837a29a236d57af184ac7b5974d487f131ece9e403,2025-04-01T20:26:30.593000 +CVE-2025-31607,0,1,a6710f3896354569b692b49a3ba7d39cc63ec28b97b20c93c12ecfb89e1e7a22,2025-04-01T20:26:30.593000 +CVE-2025-31608,0,1,4a46e4f3e89515fb9bf4d54ed6b1c72c1e11770a6955368a6cbdaf21256972c0,2025-04-01T20:26:30.593000 +CVE-2025-31609,0,1,2078c2344398feb3711ea35a2c5611f791c9400631cb50ad84610402739469bb,2025-04-01T20:26:30.593000 CVE-2025-3161,0,0,6a109eeebe1916417664d78f7150c4a52e04aaa07f231097cff909d3c7633b80,2025-04-09T16:27:24.187000 -CVE-2025-31610,0,0,f925c93d13dc29a62be088b5592e22eb2405a996799c04ac1b5489b9a0066603,2025-04-01T20:26:30.593000 -CVE-2025-31611,0,0,b801d6a0a5cb6671117633105a3079fd0a14a203794ec88c29296e43b4d217ca,2025-04-01T20:26:30.593000 +CVE-2025-31610,0,1,910a4ea27d6f383cb456f92578c3b3a73614ec043f8fd497dedad8838e7be46a,2025-04-01T20:26:30.593000 +CVE-2025-31611,0,1,276efafc00c4b89bf0929d2b38a1884cbaef8fa4170e92c372bb52def1451c9a,2025-04-01T20:26:30.593000 CVE-2025-31612,0,0,a64f3fa04868fcb8f4974198b15f562b9e7e58ff2370154320def3462d55aac8,2025-04-02T14:58:07.527000 -CVE-2025-31613,0,0,195f5f26ae79cd1a7df0ffea8b44dc63e2a3ae292c57059fba47519490c6dbd6,2025-04-01T20:26:30.593000 -CVE-2025-31614,0,0,e78f73e52402ae64cc455d03a65ae890d1f6e255cc56c24faee5f29a5c12c468,2025-04-01T20:26:30.593000 -CVE-2025-31615,0,0,a4b84f068fe45de5d9b84ab1a1f972aea6198e70e576a6ebf454e56c21dd7a8d,2025-04-01T20:26:30.593000 -CVE-2025-31616,0,0,923207fb3a0f0b9ddaee7381bc1b9a84339a085f4a521b9ee90c6fdea8b59e12,2025-04-01T20:26:30.593000 -CVE-2025-31617,0,0,289af38a57306490db0ce009eeef62e692eab8593fc0ad2ea9fdaa7bfca5f616,2025-04-01T20:26:30.593000 -CVE-2025-31618,0,0,2b7981d7ef7a4f562ca6380de73ec29a77e2c40cae6e451a55977c1af6ab1dad,2025-04-01T20:26:30.593000 +CVE-2025-31613,0,1,28677ae3d939fba696d8c92ae0857c2136c34589309df3c239b4972535c968b5,2025-04-01T20:26:30.593000 +CVE-2025-31614,0,1,5f071c698b6574e5d223b56957d523007b4f31676191d8561f509f32192b111f,2025-04-01T20:26:30.593000 +CVE-2025-31615,0,1,6b2754a206157b07136a847d96efbab764d62e48b60186c926f2f10c755e62d3,2025-04-01T20:26:30.593000 +CVE-2025-31616,0,1,8d1e345bf111d893e40fd1f63be6d70ca5b971332c9b6a517f8c1d873c38d9d4,2025-04-01T20:26:30.593000 +CVE-2025-31617,0,1,d4863340fdbe85a74d17936746e5e818f5c823c40d90840fa63c78e3781f66c4,2025-04-01T20:26:30.593000 +CVE-2025-31618,0,1,2c716727c9e77f48bdcec6a46138e9971d716023938202c6958af9522f1da0db,2025-04-01T20:26:30.593000 CVE-2025-31619,0,0,0cfb63459aa17135ceca66b32342e8d258123bc685dd38ae82c3735baf311aa7,2025-04-02T14:58:07.527000 CVE-2025-3162,0,0,b63b7beeec8b2c67cccbb1e3c7ad15e2582de379d3ae0655d159b9c867fa0d1b,2025-04-07T14:18:34.453000 -CVE-2025-31620,0,0,8a9dca4d1e94abe86ed8ed4ded7c276053805167b2ac984aff5a19fc4220987c,2025-04-01T20:26:30.593000 -CVE-2025-31621,0,0,d99e923a46fbf21400011f9875895641f6caa4547ac5b51abafeba301dfcd6a4,2025-04-01T20:26:30.593000 +CVE-2025-31620,0,1,c73975d9c744a85596a4354b00aa902f7757d6b0f95021df0ad709c3af6981a0,2025-04-01T20:26:30.593000 +CVE-2025-31621,0,1,361fb2b3c54170e4ed612388be3d8a82ebdd813c69038700719d6f2a34493816,2025-04-01T20:26:30.593000 CVE-2025-31622,0,0,058c386cb9c58daf1b7beb608316a4e87cff48be1227195b155f7f97a1b49acb,2025-04-07T14:18:34.453000 -CVE-2025-31623,0,0,437b01469d6d28a612c9c0c80e6a95002669b00d2acb21afd0c728e6940e2f83,2025-04-01T20:26:30.593000 -CVE-2025-31624,0,0,54f82c7f57e2d8e7e051749383b1a2dc9df08136ea167642b382ac3be9b01bfa,2025-04-01T20:26:30.593000 -CVE-2025-31625,0,0,931db8514217929acbe45f4e0372129792b09a06f5ee98a4f18916c5473b7e2e,2025-04-01T20:26:30.593000 +CVE-2025-31623,0,1,4c5001d672a4caa108d111672b582a4124d2c6a1ba333627d87231e10c40a115,2025-04-01T20:26:30.593000 +CVE-2025-31624,0,1,7efa7d8cba8c66595cfb578b272aba90f5e423c9bcb5665c3c1be94fa5acf4b4,2025-04-01T20:26:30.593000 +CVE-2025-31625,0,1,12e3ebfb185f2f0413ca597a0e8979c2c94bd79df1456a9e3e1b5427370dc564,2025-04-01T20:26:30.593000 CVE-2025-31626,0,0,de759cd7ec1b2736387c0ae3826d280eef1850df761c5c88af43748707950ce1,2025-04-07T14:18:34.453000 -CVE-2025-31627,0,0,d40d380d357cf668d239701f7f787041ac1157122a2629382ee02d27b82843b5,2025-04-01T20:26:30.593000 +CVE-2025-31627,0,1,c4d27aeb4717542dfcd0ac53edf7d5896f1931036d03464b3c18830b5ea20d13,2025-04-01T20:26:30.593000 CVE-2025-31628,0,0,7d378824ca72e66ca4aa7cf2de136edcbc463f3e30bf37a427b83820ef5548fb,2025-04-02T14:58:07.527000 -CVE-2025-31629,0,0,e1295c2dd478df83cec62e5ba9e1144364b5b4cea68d8a5a8715502b51a0adef,2025-04-01T20:26:30.593000 +CVE-2025-31629,0,1,7feff55cf06b17a9b14d5e928a7330b9e036aea992741e33d5558d6e786b4183,2025-04-01T20:26:30.593000 CVE-2025-3163,0,0,1abd6db1045bbae70669f1f8c9907280a5478489e8b1ebabb8eb88b115451d71,2025-04-07T14:18:34.453000 CVE-2025-3164,0,0,524d9769a71affe8b81690c3ed0b562fd00f5c5232f9c0d91b2d9be6cf9796fb,2025-04-07T14:18:34.453000 CVE-2025-3165,0,0,2e02105ce99f3564dd878406ce8c0b7835d84010bc4a7c0c3ba88c3a6192f2c5,2025-04-07T14:18:34.453000 CVE-2025-3166,0,0,17028d9ea804572df4baaaae9408352ee57c738220a3aec0680e295f0ee3c81b,2025-04-08T19:54:38.830000 CVE-2025-3167,0,0,b34599c040918980d6f606e5670b68090d1729d06d9c44998cbb7c2b6c7b9e52,2025-04-08T13:50:05.433000 -CVE-2025-31672,0,0,175a7785fc20706c9519c996ab32c6a67f731c76b352e083bc2b7a4c50ed9eff,2025-04-09T20:02:41.860000 -CVE-2025-31673,0,0,4d87be6269b25250eebf5a9fce7cb9a2b88c94e00b9796d1018bcbd1dcf3b9cf,2025-04-01T20:26:22.890000 +CVE-2025-31672,0,1,dbd3fa2043f1cba55af7fa71f1f7e198def36b294c8a0580ce3ec06fe96c5aba,2025-04-09T20:02:41.860000 +CVE-2025-31673,0,1,7ae8d0b8cca7d726e09792cce0e208a4b0c68b5325d70b78ebe1afa6b490ac14,2025-04-01T20:26:22.890000 CVE-2025-31674,0,0,4c83b8fc56b3a5cdd09f994e999ba9d59f2e5140397359adac70c0dab25f825d,2025-04-03T18:15:47.417000 -CVE-2025-31675,0,0,49c705166752735d64cb862d463bc2edf7315c17b8526bfff696b889b2b4e1b7,2025-04-01T20:26:22.890000 -CVE-2025-31676,0,0,b4ef518dd01d0e3124eb369372d5673f02234c9260903d9137226c3e62a23d41,2025-04-01T20:26:22.890000 -CVE-2025-31677,0,0,601f3bbbad81d3eff828714e66d9d21f8b0aa231c8342139e89eb797ff16d46d,2025-04-01T20:26:22.890000 -CVE-2025-31678,0,0,0a537df7329ea0d6348642fe5852bd00bed0d2288a606cefcb8e27e618ad63b1,2025-04-01T20:26:22.890000 -CVE-2025-31679,0,0,ac4a789be07d1500a76578a8fefda08cfeac36228d361d58f3a8615db71e4be6,2025-04-01T20:26:22.890000 +CVE-2025-31675,0,1,1449e9636db63bb3b542fce2ce8687aa5100d9896959019d05c886ced03d10a1,2025-04-01T20:26:22.890000 +CVE-2025-31676,0,1,59ef0b67182283de273abc1b13fe68b708f3a71ee3a5288f70f8d2ebe7c61e33,2025-04-01T20:26:22.890000 +CVE-2025-31677,0,1,1727840cdfeefc45980ba1e1f7164934a3bd8829fd18dab3a720dfba87ac5966,2025-04-01T20:26:22.890000 +CVE-2025-31678,0,1,31cc4748c215f7a1153ba50ad081a917b07cd54eed27811cfcdbbca6a56bfdbd,2025-04-01T20:26:22.890000 +CVE-2025-31679,0,1,c6cbfc2b0a824147b3e648228c4146056e6a0cd96bb4a0967a67fb5677adc92a,2025-04-01T20:26:22.890000 CVE-2025-3168,0,0,fccf3c58c5bc764907e3d9f305bc256bd4eaba2ef08d7e9bbcbcf3366827f593,2025-04-07T14:18:34.453000 -CVE-2025-31680,0,0,c0c20c73f46bb8c2e2b97a1b8291b02069c8943c96eb1f6b924265e213eb1c25,2025-04-01T20:26:22.890000 -CVE-2025-31681,0,0,4035788a055becb008f8451f8af5091988ac6b2c662a075a57c40692cb60efdf,2025-04-01T20:26:22.890000 -CVE-2025-31682,0,0,3c6d273fab9a8a6e55ec3e251cfff2c3db1cb1d9fc320cc3dd4b5750adc835c3,2025-04-01T20:26:22.890000 -CVE-2025-31683,0,0,c8806c2dfca6ae9fb5163d3e061578ca60b0ac1b23baac6c858114e5952431c2,2025-04-01T20:26:22.890000 -CVE-2025-31684,0,0,d4d6844955cd3be122662b787d1471ee06951f531e10aa4124dc8beee36f4c2e,2025-04-01T20:26:22.890000 -CVE-2025-31685,0,0,14bfcf455722e249206def6e37f8438f16288637db7114ac80adfee79e7c4716,2025-04-01T20:26:22.890000 -CVE-2025-31686,0,0,2d2490763d305f40d92b922a7840fe2e5c384cbd1dd1d06a35ecd25785a1b465,2025-04-01T20:26:22.890000 -CVE-2025-31687,0,0,bbbb90be5972f25ed8b88e27f52eaf72dc0c3d41fb55a396267808fb7060ce41,2025-04-01T20:26:22.890000 -CVE-2025-31688,0,0,0a91c15df8cc6dd8e145eca47e2e5dc73cd3a6da662b9f9b5845a93f92e5369d,2025-04-01T20:26:22.890000 -CVE-2025-31689,0,0,a1c880f9d45d0dc67658aba94e4c42300c1b09385c268a99690c708c3094b3e4,2025-04-01T20:26:22.890000 +CVE-2025-31680,0,1,ac34f89796c5669a76aa6ea1098bf8e4c96e269e8e7d1f60923f0d7e62e29d30,2025-04-01T20:26:22.890000 +CVE-2025-31681,0,1,193be0e625c9ffb9e7b3aabd1c2eaf8ab7705d026a0e54a106096daf81733617,2025-04-01T20:26:22.890000 +CVE-2025-31682,0,1,a4de2fcfbafcf9468da80a15799ad5078f8a5ad74cf2ae8eb4607e211bc02e37,2025-04-01T20:26:22.890000 +CVE-2025-31683,0,1,4329ff4b22c3623a12481077f25dd31c9d342442a608c422e99811ebd634f6c7,2025-04-01T20:26:22.890000 +CVE-2025-31684,0,1,9245c47ddc41183e4d5ba10b4e465d30bfadfcfeacb8c98b8aa81446a2ee3424,2025-04-01T20:26:22.890000 +CVE-2025-31685,0,1,3d5a0d6ff69319ae2822a850e3ce90630529bccc7748cd44aca35c2d86f45d4c,2025-04-01T20:26:22.890000 +CVE-2025-31686,0,1,5edb707fee2454f3ac7833c69e1858bc273eaab2b64d11b96533146fa1d73b26,2025-04-01T20:26:22.890000 +CVE-2025-31687,0,1,454942e35849c96ac372946d3eda1ae955fd8821ce9afa6a141865a7a005752e,2025-04-01T20:26:22.890000 +CVE-2025-31688,0,1,2891ba6176c83a40b69925a3cf4506b7e8144ec4de196336543c7662a4331527,2025-04-01T20:26:22.890000 +CVE-2025-31689,0,1,f252e470a7f3ac2668685badc702a816e17b83a13580fa532e99061132ede50f,2025-04-01T20:26:22.890000 CVE-2025-3169,0,0,672f52f3293b7b14a23f48d691f3381597361fbb3213b3fd51098cd5f9c0e3a6,2025-04-07T14:18:34.453000 -CVE-2025-31690,0,0,acb4ce01da5baca8e1dbf28d894081f2a44de7ea70c9afe891cbe0a995d248bc,2025-04-01T20:26:22.890000 -CVE-2025-31691,0,0,cf4b29a92b9490c08b2c578bf4af51fb5f115e557d31fd3dd74e77914b8cd345,2025-04-01T20:26:22.890000 +CVE-2025-31690,0,1,76df65f2f12600b22746827b42743cb63b2968d3bb20e6b723a8c520572daded,2025-04-01T20:26:22.890000 +CVE-2025-31691,0,1,4e4123e7dd362552d63999170502b457ff76e7439925bd44d9f24bf332e7aa6e,2025-04-01T20:26:22.890000 CVE-2025-31692,0,0,30aebd95bc9705ebd291eaede4508c57a97f5b0cda490d706333e9a14328d63e,2025-04-03T18:15:47.570000 CVE-2025-31693,0,0,274cc6f24539aa7a87f81e36df7e0e48f94f6906a3e12a986f12abb0c7a115af,2025-04-03T18:15:47.763000 -CVE-2025-31694,0,0,b9baa741c5e3d5d5c05d5cbf595399863f5899fa527d695ec83538b0bab053cf,2025-04-01T20:26:22.890000 -CVE-2025-31695,0,0,8c919919ef384575a93cf56957486961227c853ae4ae946b5dea62c620860899,2025-04-01T20:26:22.890000 -CVE-2025-31696,0,0,086bbc48177642233c02282ad1d93db77dafc130911e8c40b4372a8466eb6c53,2025-04-01T20:26:22.890000 -CVE-2025-31697,0,0,927b127a1a7e2d35e9459702fdbe64f26854ece3ba627b9367d33b0ee273b4c4,2025-04-01T20:26:22.890000 +CVE-2025-31694,0,1,0d4e62a684c9a667fbf5f1fecd36fe87ec35e3ebf3f11b3b38de64706888f9f9,2025-04-01T20:26:22.890000 +CVE-2025-31695,0,1,cb12689cbb1300c5216e383f3d41732456aacf722b6d675b33ccf28f4fb9ebfc,2025-04-01T20:26:22.890000 +CVE-2025-31696,0,1,e67595495c63910473dce4fbe6b8a26b96ab5ad5c53e0f094a724e89862c513f,2025-04-01T20:26:22.890000 +CVE-2025-31697,0,1,404d91700f7cf29b61d8ddc69fd43a6f02ec904055742be9a4b3f772c271d470,2025-04-01T20:26:22.890000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 CVE-2025-3172,0,0,30e87904870fb7281a65c37665525acd4a3d1c12b0e1b13d031a33e5fa50c544,2025-04-07T14:18:34.453000 @@ -288933,190 +288934,190 @@ CVE-2025-31727,0,0,045cd2ff25e2279e1d693cad3fe65271ff9fa02298356c1b21e3ef6c2162f CVE-2025-31728,0,0,49fc88bc6049808ca35a5ab3eec01cd8e38b50728d3cc4b13cc1c48f377580d1,2025-04-07T14:18:49.830000 CVE-2025-31729,0,0,7457d8f244e08a81065167dca8f1fca6ecac1a98fe22f98a99dbb76a55f24385,2025-04-07T14:18:34.453000 CVE-2025-3173,0,0,8f8b841ba1e2f348266a5dff302d72d6ceab97ad01e9763c51d8621075cf2ebf,2025-04-07T14:18:34.453000 -CVE-2025-31730,0,0,423132361208c1004f96578250815b4ac47df250aa1950ed1d34e747f50c0305,2025-04-01T20:26:11.547000 -CVE-2025-31731,0,0,669d17a4a2cf22ed0440f0f1c846615701a5aa196ee56f4de53700e8257bf30f,2025-04-01T20:26:11.547000 -CVE-2025-31732,0,0,1c59351d72e4c11eeddbff6a0c8bc7b73030cdd4c5a30df75d9a35ec757c75ee,2025-04-01T20:26:11.547000 -CVE-2025-31733,0,0,9f9c83e562cc0dff90a94863cdf488bbb92d9fb06c34f120ca1f3e8507e59608,2025-04-01T20:26:11.547000 -CVE-2025-31734,0,0,036cb19969c78ee88bd6e6a03649c617fc8df14816e8c045394b9b48c8c30814,2025-04-01T20:26:11.547000 -CVE-2025-31735,0,0,a412ba2a2ead49b9a0f50fb8bb742b2b96890904071397853256cdc3c5249a65,2025-04-01T20:26:11.547000 +CVE-2025-31730,0,1,c46a9ab7d120c9ef66f21af38b1495f6e4beb4d8fa314019709e6a65f9fc57dc,2025-04-01T20:26:11.547000 +CVE-2025-31731,0,1,4b3850eefa2eda14e4078b4733dba4333b29414e0be1ef877a16d46f4531d71c,2025-04-01T20:26:11.547000 +CVE-2025-31732,0,1,39a41425a2eab4805be347cc919ad4d8aca24f939fc0d43252f011b866543b89,2025-04-01T20:26:11.547000 +CVE-2025-31733,0,1,c76c86a0c823f3b380d1352dc5a759f85daad17cba1e58f86314588b21cdf12a,2025-04-01T20:26:11.547000 +CVE-2025-31734,0,1,ce917767b89abef8401187449c9f5b97b7c6469deb797ec83bd29142e4d6585a,2025-04-01T20:26:11.547000 +CVE-2025-31735,0,1,b280536bf39cbae0361c0d6828ec764afa15e948cca740191d69e3dd5208eed7,2025-04-01T20:26:11.547000 CVE-2025-31736,0,0,91707e78ba690e5fd8c6e89119c667a82075c6b3ab7e18424abb72cecf8f7cf9,2025-04-07T14:18:34.453000 -CVE-2025-31737,0,0,8b93679a60c252e3260796d233191ca66d7fe6e5ae05c2a4d2d8d4857b407eb4,2025-04-01T20:26:11.547000 -CVE-2025-31738,0,0,d5598271016616c379f6bd8c26ccd47c863dc4b6d4265a0360471f74717b7daa,2025-04-01T20:26:11.547000 +CVE-2025-31737,0,1,d732110f813a8561449b2441d5d31a0e68a98ab7a0db4dba604ae847c865823b,2025-04-01T20:26:11.547000 +CVE-2025-31738,0,1,3162859f3271710ae6835f23d5642d4ae51a6ca6aa31e4556ac3d549cc13eaaf,2025-04-01T20:26:11.547000 CVE-2025-31739,0,0,69eb46939a8532bfc9b2af9028dba583c628c0a6d0547a1a23943e1fecf65da8,2025-04-07T14:18:34.453000 CVE-2025-3174,0,0,0a654ad1ae63dc0e85ff1c8b8d3f8aa0f70ee2fd44071a90a4d49a152db1f3aa,2025-04-07T14:18:34.453000 -CVE-2025-31740,0,0,b6fade2151e28c9ca44e5cac14b0ba385e430faa020d84ef71336aec2c700d31,2025-04-01T20:26:11.547000 -CVE-2025-31741,0,0,527a9fd081d8df8c0685a7df27bc64b43f18f45351e692f750a81037cdc9fa20,2025-04-01T20:26:11.547000 -CVE-2025-31742,0,0,7a6a3f6d7c0ff7c1a5b973e0852f8e153b519b2538104ee208675e106987196f,2025-04-01T20:26:11.547000 -CVE-2025-31743,0,0,7d382bdd41998a3d747cc87088be6a45881bb9f6acae116f99d14db7f05f4f99,2025-04-01T20:26:11.547000 -CVE-2025-31744,0,0,f134f5c8154ec0cd463573752f17133d60b5833540a5c90a49ae2f02a4d0ccf5,2025-04-01T20:26:11.547000 -CVE-2025-31745,0,0,972fb297c6fd01524c7762c6cef8684647213a5f9665a23b202d3af4ec9d0f21,2025-04-01T20:26:11.547000 +CVE-2025-31740,0,1,4edca67bcaa98f67cee2346591e1548e72d806c29d78aa3a51a279da023dd3c9,2025-04-01T20:26:11.547000 +CVE-2025-31741,0,1,2f568b175797515c951176261913694bf7ce1ba3a503f6334dbe2fafcd316fe5,2025-04-01T20:26:11.547000 +CVE-2025-31742,0,1,d1a5ddbf671714e46e9d90d5ce7ca47f1156fea863d7363efed7963cb684a447,2025-04-01T20:26:11.547000 +CVE-2025-31743,0,1,06e5aaa735f0bf02e357d335710d520cae5411db12cf74dd120576a23a963a94,2025-04-01T20:26:11.547000 +CVE-2025-31744,0,1,b9af5b06584d932f4ca311b5ccaca9bc2a1d683ee72682c594f813ca19f1591b,2025-04-01T20:26:11.547000 +CVE-2025-31745,0,1,8f9be3898ef2b221e323fc45efb8ccdb184ff620adc279406d175ef2df9b65cd,2025-04-01T20:26:11.547000 CVE-2025-31746,0,0,4da2c76ec51523ffab7018bcc6f003f4c6025ff1c8eab532127d9f2b93a6341b,2025-04-07T14:18:34.453000 -CVE-2025-31747,0,0,d66aa0f4b467b20619932c18b005b38b3653fb7bd9ac286448c808bdc9852a3d,2025-04-01T20:26:11.547000 -CVE-2025-31748,0,0,5ad5624efd3edafc2f9ddcd3c9b35552cd032776b8bd8959a0c1e3e20d5ae986,2025-04-01T20:26:11.547000 -CVE-2025-31749,0,0,d17713e9aa43d5336e7a7ce6d3748549dd6302001df94e12a9aafdecb6bbda9e,2025-04-01T20:26:11.547000 +CVE-2025-31747,0,1,9d0a74e5b38805bb004b68e6afb7edb0cbc97c0496c4f018cbd4c558fd2d6c5d,2025-04-01T20:26:11.547000 +CVE-2025-31748,0,1,9bc7443cec89d0ab01e2e107442f794e7d5833c0fb377d6b447f677446ad8534,2025-04-01T20:26:11.547000 +CVE-2025-31749,0,1,4584649f901a6a7593ff3055d961474850bd5cd4ca799f7dfbd0ada951025d99,2025-04-01T20:26:11.547000 CVE-2025-3175,0,0,e9f23b67fe4324f6bcff079286852e1417aa837462eea6f3771d3520b902948c,2025-04-07T14:18:34.453000 -CVE-2025-31750,0,0,9abf78169921efa61060fca843276b96efa6755b37d900c88193eea60c7cf606,2025-04-01T20:26:11.547000 -CVE-2025-31751,0,0,184a74b20dc432c5d5ff1f0734cdfd92cd05dfeac3ceb8dfbdb1dea580a2c1dc,2025-04-01T20:26:11.547000 -CVE-2025-31752,0,0,8d4920def6f3b767a191de1090e647da8455a8aa19f4a0a96938a465d36e0f23,2025-04-01T20:26:11.547000 +CVE-2025-31750,0,1,8d7c70a7845a438679bc3c6ff043649dfc256a51f71b7a02e4a8d754a4d73e9d,2025-04-01T20:26:11.547000 +CVE-2025-31751,0,1,3a11e01ec2632dc8c398ddf9a616ee713b0859bd47f355fcdf0f8e142b41639a,2025-04-01T20:26:11.547000 +CVE-2025-31752,0,1,8ea3e881160535c66a73dfe1eac526fa9e5339354eed52c60e764d775f52a1b1,2025-04-01T20:26:11.547000 CVE-2025-31753,0,0,744cbc84ec0b2613f577ad060488a01337a033dd42d99aca362f45becf388f97,2025-04-02T14:58:07.527000 -CVE-2025-31754,0,0,68ad665eb502f76de3c3ad523e50183865cdd7dccbf1ad8b8d565ad1b2618ff3,2025-04-01T20:26:11.547000 -CVE-2025-31755,0,0,33df2aaebe6e0bb0845700c51d8110e5d83d3a91ffff4118240da373cc7c0380,2025-04-01T20:26:11.547000 -CVE-2025-31756,0,0,afdc142c604679b35ae8daa92f5b2ac352e511fb1938cccc05161547abff6c10,2025-04-01T20:26:11.547000 -CVE-2025-31757,0,0,56461e0c1492ab8e6a694d9a2a93e76f8494cf4ebbf6d5d9b06b8856a48d72ca,2025-04-01T20:26:11.547000 +CVE-2025-31754,0,1,2a1a5903b3e0ed6fcab4be48fbf9915225517d32e04dbe0410055f146a4f6a09,2025-04-01T20:26:11.547000 +CVE-2025-31755,0,1,c60fdad255f1b5dd544a5e05f36e24fb2cd5fb53291d8bd72a615981f429e2c6,2025-04-01T20:26:11.547000 +CVE-2025-31756,0,1,40b957c1f06fca784c62a382c2b217400ddfd2c70071af8e56fea7a4869f7d66,2025-04-01T20:26:11.547000 +CVE-2025-31757,0,1,3f4d376ab0ec6914b01c23e2c3c4c0a0c1c1ac5b6a65cae8011859ee39a05500,2025-04-01T20:26:11.547000 CVE-2025-31758,0,0,e739d831d1146540f844d1ccd2d9a3445f512d894e1015d5c24dc30bea3bcb94,2025-04-07T14:18:34.453000 -CVE-2025-31759,0,0,30c93dfa1b23fad11f744341c7d67921cd7bbe495924befa6a67926749d07520,2025-04-01T20:26:11.547000 +CVE-2025-31759,0,1,1c40299b9cc5ad6cbbf1f2e5f6a397b9b46ac21167ab0a58eeaf3cab2b816275,2025-04-01T20:26:11.547000 CVE-2025-3176,0,0,e78fecbf78884f19a4288bc422daad452e417195516c8f5db246909cc99e9f5e,2025-04-07T14:18:34.453000 -CVE-2025-31760,0,0,19d31daf4701067e49f8874ff2aacd629b333d2d0d0e69a4fdf225227a1ac047,2025-04-01T20:26:11.547000 -CVE-2025-31761,0,0,755e31bf1f330e77038a66f7570ac257b12653774010c63992d5fc2a1fb60d8c,2025-04-01T20:26:11.547000 -CVE-2025-31762,0,0,c4043fe0d15cc4031326efa363949d40edea4f0a28d0dbee22988d1ead77813d,2025-04-01T20:26:11.547000 -CVE-2025-31763,0,0,64561334752fe0890c739d3663c982f4986bc0c4cf8c4a6a4b26df92baedc669,2025-04-01T20:26:11.547000 -CVE-2025-31764,0,0,ff985c7c38fb3e25d12b4c3fe60bc44434ef5281e6c77217ffe71fac3f340d6b,2025-04-01T20:26:11.547000 -CVE-2025-31765,0,0,6a59754a9f10f947110d7519937217746998d4c8e6f5eff9775ea668b80ed0aa,2025-04-01T20:26:11.547000 -CVE-2025-31766,0,0,bac0cf3ef8b9b3e9dce64bb5e50529facc61f9e0dc1535f24805753853f1032a,2025-04-01T20:26:11.547000 -CVE-2025-31767,0,0,d273eeee30994e164cd333960132367f35e22bc028e51a7f08600d8ef7fdf126,2025-04-01T20:26:11.547000 +CVE-2025-31760,0,1,c97cd36a2aef742198688f9c89c402ecb25f2237567acb733594f9a053e8ff14,2025-04-01T20:26:11.547000 +CVE-2025-31761,0,1,519ad50b4e2d3a1fbafd521c5fbe0520991dd55993d080c2162d66fc767a9702,2025-04-01T20:26:11.547000 +CVE-2025-31762,0,1,6437e1bfca5e2aa0095bbb277548470994de1261f23bd48ef64cbd1b434c21c1,2025-04-01T20:26:11.547000 +CVE-2025-31763,0,1,9cc814e3d0c748263a0943c35a9f386224769168679da537d56df003803bc283,2025-04-01T20:26:11.547000 +CVE-2025-31764,0,1,ebf1ddb06c7239a964c08022ad10ae927eaa16c603b0d48c73f93c92f1d19d6f,2025-04-01T20:26:11.547000 +CVE-2025-31765,0,1,d512e52cb18d5107443934a1f21e25a01680b13256386de31069ffeee864c87d,2025-04-01T20:26:11.547000 +CVE-2025-31766,0,1,11d86ebcec1f3b21a04b6255ca0a29b511d0595d039142c6f7b36990d113bcac,2025-04-01T20:26:11.547000 +CVE-2025-31767,0,1,12a5bf0020a2d9bbd1cb451846ecbfe62e80bc79f0e25342cf570ca3567826be,2025-04-01T20:26:11.547000 CVE-2025-31768,0,0,7f418a963dd1cb77799014afbc80e6edea8915b3e57ffabe594864a9d0f41303,2025-04-07T14:18:34.453000 -CVE-2025-31769,0,0,1c28c462a098800e2a03f2b792210a4909eb30d846053e64b7947ce7a6a0934f,2025-04-01T20:26:11.547000 +CVE-2025-31769,0,1,d1e27f8a0c9c61fd131d341f76ef7c1bcc63b7d3a44f2381c59de49e354910e6,2025-04-01T20:26:11.547000 CVE-2025-3177,0,0,8ba4be865a1af4ee6c75fade0b8a5d1e16d76be12ad8f6c931edc0538ec5d839,2025-04-08T19:40:08.587000 -CVE-2025-31770,0,0,b8156fdbdedc5e1284f2bea40650cfe77c4aad8872b74801d2d02fe3a5e36183,2025-04-01T20:26:11.547000 -CVE-2025-31771,0,0,c1f41205055b2df83d68228914dd271d8c54578bce5b117b64b2a387b3da3b70,2025-04-01T20:26:11.547000 -CVE-2025-31772,0,0,fdfd63b726bfca151c304d7a0a423dd060e317a518985cfc58fd6f5e7a697fff,2025-04-01T20:26:11.547000 -CVE-2025-31773,0,0,80afd11162da9d6453df5334eac5b9c2867d0a437ce446dc86bce66c183f6307,2025-04-01T20:26:11.547000 -CVE-2025-31774,0,0,06e5cdaae5ff93d0dea05bc93baa6bcb882f1499f96e2440b25b60ea8d005498,2025-04-01T20:26:11.547000 -CVE-2025-31775,0,0,1f441ce01a50febb9090c3eb3f0eb0f99b93a1eac78a371eb612c0e631872342,2025-04-01T20:26:11.547000 -CVE-2025-31776,0,0,f8c6a1aca3b42b92abdfcd385b63fa942fda99db314ba4a28e0398fdcadf3c00,2025-04-01T20:26:11.547000 -CVE-2025-31777,0,0,eb5c89acfd3c942159585e1a9e95bf695c15b4d9740dbbe6ce61edc0e65195c9,2025-04-01T20:26:11.547000 -CVE-2025-31778,0,0,683333874b7589916a8743ec6ef46284dafc36236ce525d0f97c7c91cb41aef0,2025-04-01T20:26:11.547000 -CVE-2025-31779,0,0,105cefd4d28aa39d75376185345286643356c755466e090a94054c9f3d57db5e,2025-04-01T20:26:11.547000 +CVE-2025-31770,0,1,ea5d9116500886bbcdd270fdbc48cd1f11cb7a10143cdbf529aada0bafcaa12b,2025-04-01T20:26:11.547000 +CVE-2025-31771,0,1,146c5b90a0bec063071ab7a7030e877daf95d7d6930921e63b2f8eaf1a576fc7,2025-04-01T20:26:11.547000 +CVE-2025-31772,0,1,5599a9c258967b929c71fd917af6f68474dc66068167c79c6def01bfb20807b1,2025-04-01T20:26:11.547000 +CVE-2025-31773,0,1,681c365a2d4325e3349394bbd2c99a7663b3dbb5d1b06f599299b9d7c35f3420,2025-04-01T20:26:11.547000 +CVE-2025-31774,0,1,3b1de1d9c1662799230c3f8f5258e0b743041e1f5aa09bd1fba2e8dca34e2c95,2025-04-01T20:26:11.547000 +CVE-2025-31775,0,1,f4c42b601caf89b830dde70dba1d63a03b238c1e5b58796cf5dfa89ab80b5c9c,2025-04-01T20:26:11.547000 +CVE-2025-31776,0,1,ab4a5e012c70bf7c7ca496ed05955a93fd1b1b2446292c8d92ace1d1cf2e3d49,2025-04-01T20:26:11.547000 +CVE-2025-31777,0,1,1c16e887948766876baf8c2133ccacc8806c5473fc61ec6a0dbf7ec7536b384d,2025-04-01T20:26:11.547000 +CVE-2025-31778,0,1,16d97810844b88c20029cfbc5f8044d4f99bf4187b305d550121739ec4bc63dc,2025-04-01T20:26:11.547000 +CVE-2025-31779,0,1,591eea602f137b5fba52dd7f0dd9227a1f6634520cc12fc255166886523c9649,2025-04-01T20:26:11.547000 CVE-2025-3178,0,0,92b2f99af98bc59113045ad7289373b0837382e2b6e90886506eb20123408365,2025-04-08T18:48:19.820000 -CVE-2025-31780,0,0,63b07d90cd76dec19d5fd4cbecbc6fbbbee17c5d3c2639f6ec364f5fce839af3,2025-04-01T20:26:11.547000 -CVE-2025-31781,0,0,e3d8f1fe3d272d505dbac68b80325c776eab6c65762aceee18a9f3c2f9b8fe13,2025-04-01T20:26:11.547000 -CVE-2025-31782,0,0,592d76ccd272e8c18ee4687d3efaa20d27111be69ea12897f613e85c39a016fd,2025-04-01T20:26:11.547000 -CVE-2025-31783,0,0,5d8fb4766bde94d1dda7767f6e6ee1971b5e371dae62e6aeb31435652871b2f3,2025-04-01T20:26:11.547000 -CVE-2025-31784,0,0,c0f1fa8d49b6669b3c11162b78e691ba05ee3f789363db5b2ef22c8525f75a81,2025-04-01T20:26:11.547000 -CVE-2025-31785,0,0,eada5f25652bd91f6938e49a06a8ad42223ae7e5abf9e14f31a7fe7e8deec084,2025-04-01T20:26:11.547000 -CVE-2025-31786,0,0,566847e7c0f1a4288d8527ab1c941df542409a3ec1d9c25aa3e52bba0054a5d2,2025-04-01T20:26:11.547000 -CVE-2025-31787,0,0,ab30dd34959ec0a870f7a64acbe500230442f15e90f4940b6f5f5e0718ca4eea,2025-04-01T20:26:11.547000 -CVE-2025-31788,0,0,ac7fffd893b869a4e6c483654a7a08a725be1827125cb0d5e431d678ec003ef1,2025-04-01T20:26:11.547000 +CVE-2025-31780,0,1,78f387daa164fe5a1052aa2afbe2656de791b54bbfb1a18bee1c9e87b2016cb2,2025-04-01T20:26:11.547000 +CVE-2025-31781,0,1,55459b23a4d301fdad9b0fd330a24ef9649a9aaa4317ad395f07bae02cf8d716,2025-04-01T20:26:11.547000 +CVE-2025-31782,0,1,bc2194bb5c0c0fe6cce8a5d610b16160d8fcd87652874011ece4c0f2cae40a9d,2025-04-01T20:26:11.547000 +CVE-2025-31783,0,1,417cf29e0c82497889fc1864f01619a8a92286914d0c41d1a7f8b2907defc5d6,2025-04-01T20:26:11.547000 +CVE-2025-31784,0,1,2fcbda2ca5f84c3226fb47cae55be7ea3c322d9c962985d4ee0fd519f2d1b893,2025-04-01T20:26:11.547000 +CVE-2025-31785,0,1,2d531841fa289767d903aaef5e1c522d9a9a8299af7fa71b72203183a2992010,2025-04-01T20:26:11.547000 +CVE-2025-31786,0,1,1aa399c959ae89b7c6103bf6266327c32fab7346f732a6fec3254c286cfa2e12,2025-04-01T20:26:11.547000 +CVE-2025-31787,0,1,f0038f89096e226e145a2f6b0dc3f1ca422b9f6f13c78b8153886af344fa1c3b,2025-04-01T20:26:11.547000 +CVE-2025-31788,0,1,059be06702324310343f152fde36e2de870d77c8774f1a84a40b8d983794fbaf,2025-04-01T20:26:11.547000 CVE-2025-31789,0,0,c8ecc89fbd634acc4ab8a99cfc36abf751148268fb91d3fedd76f71420adf7de,2025-04-07T14:18:34.453000 CVE-2025-3179,0,0,3819f70317477c9c3dcbad1055a460bfd3f3980c5cbed00eeb806dca97874b74,2025-04-08T18:38:52.487000 -CVE-2025-31790,0,0,4fb4e70e48bb0ad88948a6031b905cdf9b8087db474fef894fcc896296c130a7,2025-04-01T20:26:11.547000 -CVE-2025-31791,0,0,87edb942753d84b5a1015bbf984638e5398e78a8f9e4bfc2113a39b49bdd5475,2025-04-01T20:26:11.547000 -CVE-2025-31792,0,0,0e55b70c979e366179af36934d69cea795e070ff6f30abc2dc8605703f2b6712,2025-04-01T20:26:11.547000 -CVE-2025-31793,0,0,dd5c91bf0a88bc741555696b514b715bdab7521af56ac3bf7a242c05d0b54443,2025-04-01T20:26:11.547000 +CVE-2025-31790,0,1,aa4924a24e2450e3c4c47ef4c3af5dd7b0cb825b2c3f426bfd2b2a9767bc0102,2025-04-01T20:26:11.547000 +CVE-2025-31791,0,1,a0692eff0b957b0fd8dadecf74183600cbc06038b89deef7cd84737a9fd063ec,2025-04-01T20:26:11.547000 +CVE-2025-31792,0,1,44c9fc1ccece1dcb183f7380d2165be7911cb393ff19113c3a8193809ff14bd6,2025-04-01T20:26:11.547000 +CVE-2025-31793,0,1,460bd5ea0336ee38fae075b7476ebd1148c482d5a97f20908fb48a27e03dabc5,2025-04-01T20:26:11.547000 CVE-2025-31794,0,0,aeb9691eb69c0740cd25f5d6705b2dc230ca805dd22357e196514167dcc3bb67,2025-04-07T14:18:34.453000 CVE-2025-31795,0,0,772613839803fd5bdc0d8973cfaf3581a8c8048c03d529b3e0fb200fb9ffad03,2025-04-07T14:18:34.453000 -CVE-2025-31796,0,0,28eb3dee860a6e5729a755f094a57ce73e6b5e43b971b96b1345d50deee594ab,2025-04-01T20:26:01.990000 -CVE-2025-31797,0,0,b6513b6964fa057c9b76f9fbe9c88e6c4b0cde0e6e7f1b3ff8d7a99dc12ecb95,2025-04-01T20:26:01.990000 -CVE-2025-31798,0,0,0315f72cab21896230aa05e5938661e0e548f1ecdc084463861c8bedc61fae63,2025-04-01T20:26:01.990000 -CVE-2025-31799,0,0,11af5e399c230e7fe5684d483518c0f74879ea9263b82e47342967c063468646,2025-04-01T20:26:01.990000 +CVE-2025-31796,0,1,3277221438b5df6783240605d655c237c2b4918e27c1aec26cb8f7c43e70f73e,2025-04-01T20:26:01.990000 +CVE-2025-31797,0,1,9077ffd215f899bcee576582ed0424886028c080964b4110a67937cf4e85a103,2025-04-01T20:26:01.990000 +CVE-2025-31798,0,1,00b02f5228e1680e45eec4d9dce69da9d3217fe272c48d34a16931f78a022b71,2025-04-01T20:26:01.990000 +CVE-2025-31799,0,1,4a32d59db38632d290636bad34d75db505af4baea65e5519a0afe946ea6a818b,2025-04-01T20:26:01.990000 CVE-2025-3180,0,0,e8c4141d0261ab3ae92b12cee8d8e6a6df0c37cd0158997420076b1cf4a44358,2025-04-08T18:09:20.960000 CVE-2025-31800,0,0,7e1441c413ab06bd4bf18371e69ba9e22716daf77d16ace83ab9beca44ab9b76,2025-04-07T14:18:34.453000 -CVE-2025-31801,0,0,474eaa62c5bc1472551e0d4339b83e4d1b3fb414baa341bccfd27ce0222a4c21,2025-04-01T20:26:01.990000 -CVE-2025-31802,0,0,c613e642f85de93cc1e53b29eaada089b555fc8a1c40beeaa186983ea015937d,2025-04-01T20:26:01.990000 -CVE-2025-31803,0,0,08ba94d60eb111e81fd9394fa0de850e781cbd61695d9b120c626ebf7fc55605,2025-04-01T20:26:01.990000 -CVE-2025-31804,0,0,d358268b308ccbea0b5411260099486302eaa2d7caef1aec9dddbd62d64960b8,2025-04-01T20:26:01.990000 -CVE-2025-31805,0,0,7c907c6f735c111a6ab0725da9ec8dfa6e76c9ebae2a070ea0a8972916a6eb39,2025-04-01T20:26:01.990000 -CVE-2025-31806,0,0,fb016d74c16c473cc34dfc8f161674d1c927f6343477808084e2558d997858d4,2025-04-01T20:26:01.990000 -CVE-2025-31807,0,0,cf70b4476e3faee02761327733544ee7535407961d1cb5a0f779e207114fdfee,2025-04-01T20:26:01.990000 -CVE-2025-31808,0,0,39ccec9e437d2b5079f642e031cea2271056f2df07c53848865a403856cb9f6c,2025-04-01T20:26:01.990000 -CVE-2025-31809,0,0,8f2453efb7b138bcaa74e6b6ae959f03cfaf3b1b6ebe94bf405060724bc14503,2025-04-01T20:26:01.990000 +CVE-2025-31801,0,1,e59c7726caa26ef030f04d918ebd4a1cf8b47bd0992cbbe56b3d26af2070d41d,2025-04-01T20:26:01.990000 +CVE-2025-31802,0,1,b1955a5aad2e28e5dfc7cb3b3c0ab74f9b0f8042cebdee63c0c543617455cf48,2025-04-01T20:26:01.990000 +CVE-2025-31803,0,1,923ab6298ce1aff8a43f190112797448d722e7f41c41ee8db04353e708ddf22f,2025-04-01T20:26:01.990000 +CVE-2025-31804,0,1,daf634a1ada8a180e997ab8fb553833845c580c8ceab89a8f5481096b3af43d4,2025-04-01T20:26:01.990000 +CVE-2025-31805,0,1,4a785186b24a4f0088466536e0b984a7beeca63b8a0bfb346be4afb44fdd6104,2025-04-01T20:26:01.990000 +CVE-2025-31806,0,1,b90546fe747ffeced4d44aced92f273d225fc8c5d11ad57a051f41118eb2528a,2025-04-01T20:26:01.990000 +CVE-2025-31807,0,1,0e08e0604c12e5cea2f7379e458a3adca084c7a5855440b8d71ab1b1c7d9c1b6,2025-04-01T20:26:01.990000 +CVE-2025-31808,0,1,3d9d6e9f5669b82ca3d672e2ccfeb2c91afa925ae5dd54939c90b2dd85ccae35,2025-04-01T20:26:01.990000 +CVE-2025-31809,0,1,73058d0a46f7de7e061c7f5b0028f36e01d0870a364009415e4df7d474cd3f5d,2025-04-01T20:26:01.990000 CVE-2025-3181,0,0,c9f3a66d711acc9255fcdcd4ad5b67cdc340374187cabe4ddc28e6a6c506bd77,2025-04-07T17:15:37.707000 -CVE-2025-31810,0,0,ab1e8818ebbb5e2e962197fe94e3d3f28ddd4bb7c00fda51be904eb41c481a5b,2025-04-01T20:26:01.990000 -CVE-2025-31811,0,0,ad529684b4fa7dfc32d677d14bd1c9c71c356c2400c61b191e9d530b4a6a895e,2025-04-01T20:26:01.990000 -CVE-2025-31812,0,0,75f62457d8f10f45bb8288d68e64f6b009e42576b2cf3e5f8611e8e85e5e1b4b,2025-04-01T20:26:01.990000 -CVE-2025-31813,0,0,3150cdb006e8b756f17696faa1b89aa7f1de1263ffc8b80351f20a2ade119c48,2025-04-01T20:26:01.990000 -CVE-2025-31814,0,0,f39991895bfa005807a034d6bde7a59b131209b4291804d297db7a8872bc8257,2025-04-01T20:26:01.990000 -CVE-2025-31815,0,0,2fe090db9fef759ba12686c81551b9daa12c23e12ed8477798a09ec9243c0d0d,2025-04-01T20:26:01.990000 -CVE-2025-31816,0,0,51f95399a8b55833ba460b717b1ec7a0e3a192f13839adb17756cf148d6942a9,2025-04-01T20:26:01.990000 -CVE-2025-31817,0,0,6d0888cba8b32a92fe1ad06fcbf2aaeff2965f53ceecf83056b810bb456a8422,2025-04-01T20:26:01.990000 -CVE-2025-31818,0,0,73f6fb5a84419610496f6bbaafac0aeafec22285e0a53560c9ca981432c43eb7,2025-04-01T20:26:01.990000 +CVE-2025-31810,0,1,f3af702a8b20c4f987d774999a8ddd12aa571f2fe10a41ce20511ba1a2cacfb8,2025-04-01T20:26:01.990000 +CVE-2025-31811,0,1,400261866a9c810fccf624494bec07aa4768f10150af518e78ca29f4c60fdc8a,2025-04-01T20:26:01.990000 +CVE-2025-31812,0,1,9daf6fcddc98329956a0aa9d59258dcf41457c139f76ca9270f11e2c3a164bb0,2025-04-01T20:26:01.990000 +CVE-2025-31813,0,1,7d3df9624222a742b16f313206f2b01de6da4261e906388d38dfcbe154ae8a13,2025-04-01T20:26:01.990000 +CVE-2025-31814,0,1,b85c1e9e36d0426b8f8b218ec5089d76b9878bb060da7bcad61dfd70dbe67128,2025-04-01T20:26:01.990000 +CVE-2025-31815,0,1,71b0632f46bb5b0755c5798d68622e523609004f34ae4bfb710aa5c6760c690e,2025-04-01T20:26:01.990000 +CVE-2025-31816,0,1,64557a3d1239be530e2a1e62c66c0e81f7b944cab3496b9d59a67296fe2cd43f,2025-04-01T20:26:01.990000 +CVE-2025-31817,0,1,e5a966381f1315a5f1650cbed1e4b4a896efa49f06a649a2754cc3a33bee9532,2025-04-01T20:26:01.990000 +CVE-2025-31818,0,1,c51f2b827b99396fd7cd2ec2f2df7952fe64d8d16fea049001d5837be8a75ea2,2025-04-01T20:26:01.990000 CVE-2025-31819,0,0,ae2b21919b6c3224744ced52a20e06e6f2512a8bba29cab78af5df48acae8d55,2025-04-02T14:58:07.527000 CVE-2025-3182,0,0,39008f4be13c68bf5171775f35d7159f568ab981e7e534a483df290dcc77a074,2025-04-07T17:15:37.897000 -CVE-2025-31820,0,0,1d07aed7d065ef430262f4260bc6aec72407e4a0230f449977dd816d48e30816,2025-04-01T20:26:01.990000 -CVE-2025-31821,0,0,9d76bea675be279fc0a1881a1df41dcd1aaef4633c145c06052684ba88903718,2025-04-01T20:26:01.990000 -CVE-2025-31822,0,0,439a68daf07c5740376d25ca9f69f55938da0b9c8dad98fc9deabe1f00c8cf16,2025-04-01T20:26:01.990000 -CVE-2025-31823,0,0,1fa59d1cd9747a090e0e1db01e20b0030b6db4bd1d1ce1bb06a890a915c2bd49,2025-04-01T20:26:01.990000 -CVE-2025-31824,0,0,99b66dc0da6d8fd76e589cb658c69893c38617037a45ed0b71ff2dfded3737b6,2025-04-01T20:26:01.990000 +CVE-2025-31820,0,1,073d8c7b64eb5f396a123c1d65fdd10a7aa5293d8d2897e1e75c2b5d3c774bbc,2025-04-01T20:26:01.990000 +CVE-2025-31821,0,1,f2a9afee35932e5b060ddf98091c755b4debe0bcc4962f7543d3c50f47c0ce5a,2025-04-01T20:26:01.990000 +CVE-2025-31822,0,1,26a424b5398bc8e38e793525911b12f88341a03f98513c46361dc05f40c1ab33,2025-04-01T20:26:01.990000 +CVE-2025-31823,0,1,0524e87d297c4a87affadba63e6594e87e0356294e80c083617b8949acfb5eeb,2025-04-01T20:26:01.990000 +CVE-2025-31824,0,1,c3fd8cb7a54d7c3b2546c79018a88a08e5e690234d0d11a1778d4b1557626280,2025-04-01T20:26:01.990000 CVE-2025-31825,0,0,16787d8215ca624aa5b60a68b898f851c0ebe1141b0a85c694174b94413289e8,2025-04-07T14:18:34.453000 -CVE-2025-31826,0,0,f09c36845b4d759f28dfa0e365243a0d5ce7c458d51c494375ed222412243d85,2025-04-01T20:26:01.990000 +CVE-2025-31826,0,1,92cb877e2f47e3269630047239793a9ae7b3842d5a44a53ebe254b8162e5113c,2025-04-01T20:26:01.990000 CVE-2025-31827,0,0,ebcd02ffb546863b75e8fada9013048347d5ee958e0c25302ae3866720cfec17,2025-04-07T14:18:34.453000 -CVE-2025-31828,0,0,7e590a47999f3b88566df7a0a937f451727e018e5b7723b0ca719ea1fa4fdb65,2025-04-01T20:26:01.990000 -CVE-2025-31829,0,0,ef09b66ae47a93c77c590c8808712d74cb1793f543e57b1222d6ee63e7967595,2025-04-01T20:26:01.990000 +CVE-2025-31828,0,1,f10dbd563bef1cbe91ad1743a8128c22fa4a78229085f4eb0e1fd81caefa5935,2025-04-01T20:26:01.990000 +CVE-2025-31829,0,1,3bae247e220b234227ffb98516d715ad943da55df969b05e4c05a5c22fa7ebc2,2025-04-01T20:26:01.990000 CVE-2025-3183,0,0,bbe346c980c2e49c98d21f9417a079248655a451a250e9dbfe0668b87727dde5,2025-04-07T17:15:38.060000 -CVE-2025-31830,0,0,26eff49901edb20d05a7fd2e31965671b9d37854ab1d424d0b7534d8ad8b100f,2025-04-01T20:26:01.990000 -CVE-2025-31831,0,0,90ca67c08cd11e36742a48184ccbbb6758a63fe081a4969b5969c3b00c68734f,2025-04-01T20:26:01.990000 -CVE-2025-31832,0,0,7ad9ea4634d651fccf568214d00c7d2c1514d93088aeac89ccfa314bdae88f1a,2025-04-01T20:26:01.990000 -CVE-2025-31833,0,0,f9344c75dd3da1787a8bc79e2e365ec2492e8c6aebe246c066d9aa0aa4f1aa68,2025-04-01T20:26:01.990000 -CVE-2025-31834,0,0,141894639d56e2fef1fa5bda9ddc5fcc19330d8fba6804741440e3ece7ae20ff,2025-04-01T20:26:01.990000 -CVE-2025-31835,0,0,e31732d9206824117af31ba779a4a53089510580649f2ad7732611c773c7b8e8,2025-04-01T20:26:01.990000 -CVE-2025-31836,0,0,371df5daf093368412bd5b4e10b262be895d83a21b45b98689463139e46c211d,2025-04-01T20:26:01.990000 -CVE-2025-31837,0,0,e257f931bff2fbdfe99da539c380fe0c376b55a768908ebb3f2e8e88c8a0a30b,2025-04-01T20:26:01.990000 -CVE-2025-31838,0,0,328d5a58e5fc2af88b0631d8a27a83baf13dd242410b1074f6764b5f9ffec4cd,2025-04-01T20:26:01.990000 -CVE-2025-31839,0,0,439381729a895c42b3cacd2a53831096c1d0c7f85d2eaa8bb59faf866e335ecd,2025-04-01T20:26:01.990000 +CVE-2025-31830,0,1,f4005e0df03f5b0098410454de12d4db7f27adab38ff501fb628b8fa4644f0c2,2025-04-01T20:26:01.990000 +CVE-2025-31831,0,1,32b22e03b17ccff10b64f9f889e18c057b468d1d16e47914df96aad7d31270a7,2025-04-01T20:26:01.990000 +CVE-2025-31832,0,1,f16011b94562e6a31b6c983885f867c6190a9745ccaa48b253aed9b44065c37f,2025-04-01T20:26:01.990000 +CVE-2025-31833,0,1,8f00739be3b621ac6a864402a621f605186e1fe3c336e7cefacfb8315183b157,2025-04-01T20:26:01.990000 +CVE-2025-31834,0,1,66bd9135a22f62b2c6d06cccc0e09d27de09313fde55b803c88c28d660326b10,2025-04-01T20:26:01.990000 +CVE-2025-31835,0,1,e905bf0c7fd7b6b21bfe014eef0dd6e3e32574b6ce87f82582fabf27b0b50d51,2025-04-01T20:26:01.990000 +CVE-2025-31836,0,1,f38ab4f141614df19843869b6087bd0cbb9d51e26f9521e7f3276270d68c47b2,2025-04-01T20:26:01.990000 +CVE-2025-31837,0,1,ac402ad57f29f01cdba421eecbf01cbcb48ac88fb0c11f69fe4851c2ea6795c5,2025-04-01T20:26:01.990000 +CVE-2025-31838,0,1,b07f4080142cc3b3f849dceb582b25d45db6d7eacaa20c3a0858ff3728c8c6c8,2025-04-01T20:26:01.990000 +CVE-2025-31839,0,1,8ccc5e7f43a07fe39edff2259cd62f228dd6fa749fa65e1d8d7439add485f68d,2025-04-01T20:26:01.990000 CVE-2025-3184,0,0,3b1d34daed6408be59570b3fc960aadf2f9f75c25f4795aa79118329ba1cc358,2025-04-07T14:18:34.453000 -CVE-2025-31840,0,0,584e3beb5f5d5db3c6534fc137f57aa3206829d94efbe7ceb1e6f25d0441d79e,2025-04-01T20:26:01.990000 +CVE-2025-31840,0,1,7f2497c0b1a2d1900697a8ba0465553322e4710166db98ed0ebdab22a966869e,2025-04-01T20:26:01.990000 CVE-2025-31841,0,0,12e523c209a2ac942470692736ba7c8cc3060109d2c24eaadbeec5f4ea02536b,2025-04-07T14:18:34.453000 -CVE-2025-31842,0,0,6522034cba9be2136d01d1820a5552d6998d74a7fdfe2dd8ebcfe07520dfce9f,2025-04-01T20:26:01.990000 -CVE-2025-31843,0,0,fdddb42cdf86954f1eb9b82faa705db9ce06e0a3ccb213cce462bca98190ea55,2025-04-01T20:26:01.990000 -CVE-2025-31844,0,0,706ab3e21f4bd7ac1df483d703d8a2354e431fd60770e1d5c4151308e016c758,2025-04-01T20:26:01.990000 -CVE-2025-31845,0,0,72ee4481ccd63ff63d79852eca889738f0b0708b73013197d38fd3124824c060,2025-04-01T20:26:01.990000 -CVE-2025-31846,0,0,6d783d90307cca2e9bfa57c94edc95a98f68796f778bf61e5112366927ee0dfa,2025-04-01T20:26:01.990000 -CVE-2025-31847,0,0,39041ecb7496a3ed10ab6e9e41be6600864b99006d6cbadba9c0160bae245e68,2025-04-01T20:26:01.990000 -CVE-2025-31848,0,0,ea21b1e97fc1a68588ca68c3443a4c0d36a41aa6305244d5ab77ee1983715c20,2025-04-01T20:26:01.990000 -CVE-2025-31849,0,0,dc5a1d791040267ffa3b264ea0aed3aae827af3223e355dba550b1150ef4805f,2025-04-01T20:26:01.990000 +CVE-2025-31842,0,1,6dd948d22229910fbd0e6ced4abce6bec93f03f0e97782ed125f97ea96bd0524,2025-04-01T20:26:01.990000 +CVE-2025-31843,0,1,363db0200196dd4c20b69f11ad5cfa690598c3c77a8fafabac9703ed2ba3f971,2025-04-01T20:26:01.990000 +CVE-2025-31844,0,1,9e0658a408e6f0e2befd056cb33ba30607627a369b071963bb888b18327e5322,2025-04-01T20:26:01.990000 +CVE-2025-31845,0,1,275dee19d974285cb9562c01913611ebd3eb233c8349ef60dbbbe12206eae6b7,2025-04-01T20:26:01.990000 +CVE-2025-31846,0,1,4111964ab4f51b35422f5619862fd0b99b7ed3ea3b2568b878c698149f7e8da0,2025-04-01T20:26:01.990000 +CVE-2025-31847,0,1,c3570f8cb7be0dffdf13b7b228695374a87a8be3fd696ce7252872b67768a2d8,2025-04-01T20:26:01.990000 +CVE-2025-31848,0,1,2021508868f87d7b8489dffeb73d11798a698408887254b70cac3abfb891fb3d,2025-04-01T20:26:01.990000 +CVE-2025-31849,0,1,48374392c603a436f7cf6c787b5641066082ea5def2200cd6c4875cbed23144f,2025-04-01T20:26:01.990000 CVE-2025-3185,0,0,ac329edfbea1d42e07bd262523de8bec05538ff0191c9081db798f40b2e27005,2025-04-07T14:18:34.453000 -CVE-2025-31850,0,0,946a9eebd294213633b600bfa25a48562b2f9d453539c6bc71a47b29ad982ac4,2025-04-01T20:26:01.990000 -CVE-2025-31851,0,0,38d39411a4f2de839c257155e510c1995bc931e73eaec1c515ceb60b788daa45,2025-04-01T20:26:01.990000 -CVE-2025-31852,0,0,98902bfe4d67c7a86f91f3a949ca925bd710d5e94a5231f57633af6b63b94748,2025-04-01T20:26:01.990000 -CVE-2025-31853,0,0,e73b689b3c92ac6710a66348cae4bf6bd4501665b2244405da942d8b6afd296b,2025-04-01T20:26:01.990000 -CVE-2025-31854,0,0,a748ccea22c7fa8d63b7fb584d4a60f6a13a91c1d20130881602bfd9e4ddce73,2025-04-01T20:26:01.990000 -CVE-2025-31855,0,0,0150addfa10e63576c815d74ab3fd2b2d6be9b8ded73b76d5039224f2f4657fb,2025-04-01T20:26:01.990000 -CVE-2025-31856,0,0,34c9fc8d24de41c656ac2805eaf617d6f31f2944d882d6642faa0b19204f756f,2025-04-01T20:26:01.990000 -CVE-2025-31857,0,0,0eaa697196a3d1fb849532bc5f963b45750e7713342450c99d75dc836d65e978,2025-04-01T20:26:01.990000 +CVE-2025-31850,0,1,c1448f442836c08bf57589c331093d5e7c8ee77088fffa5b43d79a50ba79b571,2025-04-01T20:26:01.990000 +CVE-2025-31851,0,1,66b0b6f8be667b2aaa27ff4eee3680d1eb8ed9d74ce74eda64cf20f49bc8230c,2025-04-01T20:26:01.990000 +CVE-2025-31852,0,1,0563e048f300a482a69f323871ff66d0792aaf33c02aa55960611976e63349ae,2025-04-01T20:26:01.990000 +CVE-2025-31853,0,1,fd70a5174acec4923ccff0f563afef3544b749fe4c80313e53a5aef23db8656c,2025-04-01T20:26:01.990000 +CVE-2025-31854,0,1,66299bca69bedca273434655a3429f9171cd4a935dc27d1bf70a33adf46dd5f4,2025-04-01T20:26:01.990000 +CVE-2025-31855,0,1,d55c86d3560d96dde7a5179b32a0379cfce78ebdfaf1c7df8d7c3b8e79c8fdc0,2025-04-01T20:26:01.990000 +CVE-2025-31856,0,1,0248194a78eecf2d863abcad99ee94c931b3dcf86c540b294d40102a454fea41,2025-04-01T20:26:01.990000 +CVE-2025-31857,0,1,c85e0f3d20c02eebd816fd920d050000778bfbfa60b9a16a7a7c62aca289efce,2025-04-01T20:26:01.990000 CVE-2025-31858,0,0,c5ae3168254e6a4fa34c285f28cb290840c0f513ccc212e6e5acc0e6198fbd69,2025-04-07T14:18:34.453000 -CVE-2025-31859,0,0,0bd37faf5aa7bed594ef599c665cf9c14b44c1fc24cc20b3b4f8ae748baee81a,2025-04-01T20:26:01.990000 +CVE-2025-31859,0,1,6a673b1afe12d2abd1662e13634f15528b1d31cf6b940f498f8c3e14b35d6487,2025-04-01T20:26:01.990000 CVE-2025-3186,0,0,384e5a16dba57b8a5de30e6ceace74b50b440a544e36ab772c53943186c8f6c2,2025-04-07T14:18:34.453000 -CVE-2025-31860,0,0,a72f34979df5ea0f16f22d6be6f34791499b83fc474deeda184f29d5a3586f16,2025-04-01T20:26:01.990000 -CVE-2025-31861,0,0,270394a1ed801f34baac85043a0338629aceb9ea547e96b69925a7871f6f410f,2025-04-01T20:26:01.990000 -CVE-2025-31862,0,0,f5e26b03b1c6a9c746787b8f1eae5b285f09d6a5b285db236ae0ab62303f81e8,2025-04-01T20:26:01.990000 -CVE-2025-31863,0,0,4b3d2e27bbfb8d8da66c8a52310d3c19ef52cd58013d1c7ea87aa010266577d8,2025-04-01T20:26:01.990000 -CVE-2025-31864,0,0,bdd751ac11a5de4655312c3f0518dbe4ddfebd3401a467f8c21e0dcca3a1616c,2025-04-01T20:26:01.990000 -CVE-2025-31865,0,0,e9a67b20ab8d3b288780d572daff8cabaedb7c2661f3064106d4c236fb573b7d,2025-04-01T20:26:01.990000 -CVE-2025-31866,0,0,b1757216c5229111de47d2492109bf00959f5e0be1025ee53f11d9ac0ec4ea25,2025-04-01T20:26:01.990000 -CVE-2025-31867,0,0,f0d04afbe15fc797c7e0b952c07dd038cfc5bc6bd5ff6cc22332cb22442d474c,2025-04-01T20:26:01.990000 -CVE-2025-31868,0,0,7fce1b16d7319b670d91f083fb479d0ea901776dc979f5d9f4faa6e6dd75c63e,2025-04-01T20:26:01.990000 -CVE-2025-31869,0,0,c05b5c7524b97c44ec996697f88528e544d73226c1005b3bf22149344c275009,2025-04-01T20:26:01.990000 +CVE-2025-31860,0,1,76a3ba7f83b66ebb55fe84587ab2b108006b732aca8969b4b1620fb6c3c1a61f,2025-04-01T20:26:01.990000 +CVE-2025-31861,0,1,73f821b5e49dc31de4be6c94456199eec0b884624798216788a1fead1da33e7f,2025-04-01T20:26:01.990000 +CVE-2025-31862,0,1,98f8ddebcc3b2cd3f942d9ad1d1b16be02fdb54575bb80f1f14952db04bbd534,2025-04-01T20:26:01.990000 +CVE-2025-31863,0,1,bfd2ecf0d599938599d66638ec525c1610c27b7430befa3df0e39cdde29c44cd,2025-04-01T20:26:01.990000 +CVE-2025-31864,0,1,5d7fd15ad2df5d2a995eb565e69b35a0047defeab222473d256cf31d064cfdbb,2025-04-01T20:26:01.990000 +CVE-2025-31865,0,1,0e357ce5728a88e7b11f0610b095952588d33492f2a660ff11d4eeaade6afc32,2025-04-01T20:26:01.990000 +CVE-2025-31866,0,1,3a187d7caa8443645279653239e7e98088731d4658663b5af896a92eed5985c6,2025-04-01T20:26:01.990000 +CVE-2025-31867,0,1,3a9830786e38c4b943fe0eee8b593c9300e3353ccceaa00faf56adc203b4285e,2025-04-01T20:26:01.990000 +CVE-2025-31868,0,1,d0ee41aef48c43e5edd1d6df2e2829b6cf2990be2791a443b31785ad1f9fe4f4,2025-04-01T20:26:01.990000 +CVE-2025-31869,0,1,efc067136bc7e1846e5e8c650d9b6f640df3a5577bcba68bebb68cec1aaf5f44,2025-04-01T20:26:01.990000 CVE-2025-3187,0,0,6235a04bc0445f52d0ae47a3884a148a9ed4c7c135e899a616f7193735f37dbe,2025-04-08T18:03:15.570000 -CVE-2025-31870,0,0,516bd3dc92a9edf6d58adba078c340db9b751aeca60d06d50cd0c752e4124a6d,2025-04-01T20:26:01.990000 -CVE-2025-31871,0,0,ba3f6eb1f55d50280c63e646246ff297c2ab652772d382bd165365ac6ff5f543,2025-04-01T20:26:01.990000 -CVE-2025-31872,0,0,ad5fdb6bc0fce36e8acfc4372bef57c4855fa46763792dda7fb84307d174baec,2025-04-01T20:26:01.990000 -CVE-2025-31873,0,0,b195e9662289f537e9a70d6fb339648ce5e48d0504f5956a39cc59c691263e34,2025-04-01T20:26:01.990000 -CVE-2025-31874,0,0,af8c7bec2bd9c6bb94534188d786d1b96967ca9ba85d4f4b8565d9db702739a1,2025-04-01T20:26:01.990000 -CVE-2025-31875,0,0,eb79481d926cc3cd2cb5864b63ed253421850ba700d80b56c1c69dfc94e6d52b,2025-04-01T20:26:01.990000 +CVE-2025-31870,0,1,5f0dde890fe9ca5aa8f942af4487e5ca97f66a4d2c8e6eca82a4ce503505e74b,2025-04-01T20:26:01.990000 +CVE-2025-31871,0,1,17dc5a7f8db6bb89c4a67d11409f0fe3c862dba4807dcf627048deb24e3d23e6,2025-04-01T20:26:01.990000 +CVE-2025-31872,0,1,fd329f067744cc27d57dbb4a85bbaae774fb891e9da444e9104b1dc69edfe407,2025-04-01T20:26:01.990000 +CVE-2025-31873,0,1,0bc3c2088486e1bdf70b5a1890e73c816af64b2ea239b556695de8a08122d838,2025-04-01T20:26:01.990000 +CVE-2025-31874,0,1,eaa9d1a68a00476849387de9954b2261a36c36e8ce5959a41cd0583948f479c3,2025-04-01T20:26:01.990000 +CVE-2025-31875,0,1,2d4d9001a3ba69d3f10dc467cabb17b3764c95c4dfba5b3ccc11b24d1877e705,2025-04-01T20:26:01.990000 CVE-2025-31876,0,0,9b698d56e8863f401dc6b9fa7bd3bbca34a2104ca17ba28746599b305e1873f8,2025-04-07T14:18:34.453000 -CVE-2025-31877,0,0,6695fc81ae4f1608812de0df2a48f876e6c792399ee3aedfa35ef0d26c46b0b7,2025-04-01T20:26:01.990000 -CVE-2025-31878,0,0,48d3d84407e6a50771b12d94862e4dc2c6c01145b0177f720bd10d09e7973464,2025-04-01T20:26:01.990000 -CVE-2025-31879,0,0,56661b046add1cb143b689e63ff80e575b5ec72251c3b02615596b7e0eacf49f,2025-04-01T20:26:01.990000 +CVE-2025-31877,0,1,b705a648d79d24bb6db1d8e15ff76ac6ce5e4c133389eec2caa1e6ce70f5bd62,2025-04-01T20:26:01.990000 +CVE-2025-31878,0,1,b5b9c4b447a4458758d89670b09b953135f168df0d6fcb13ef91d912be14e56a,2025-04-01T20:26:01.990000 +CVE-2025-31879,0,1,0e72bbb48990a5d989927d3361e30250153f5f4550a9abbf7181cbf32b368f56,2025-04-01T20:26:01.990000 CVE-2025-3188,0,0,0d42691e89af072056c6229a82cae393d0c0846f3314f3fca3332f235a91c80c,2025-04-08T18:01:35.220000 -CVE-2025-31880,0,0,ab8b1e1580597ac2391b52f512ec6c6eeda0e71e614909309489b380e240716a,2025-04-01T20:26:01.990000 -CVE-2025-31881,0,0,3d55f1ccbab65b8ce874e09e49ea52fbaf130db5299085e44d6898ed9ca39fde,2025-04-01T20:26:01.990000 -CVE-2025-31882,0,0,6f2604863895c5b9f134ca2f29d6a3c3a81326b8e5a592764997fc22def30c3e,2025-04-01T20:26:01.990000 -CVE-2025-31883,0,0,a96b05a14b28d2b5f91ae41a716f7509ef22285f5544329d93fa9585d892c4f9,2025-04-01T20:26:01.990000 -CVE-2025-31884,0,0,773f59bbd6e9ecf976656f2b79fe725650a1c3d141b832f53ea1d041e0c5bae6,2025-04-01T20:26:01.990000 -CVE-2025-31885,0,0,63642547858d9893e8f1ee7c1d99dab3bcc8177293d919ad4565e5d7eb86ce87,2025-04-01T20:26:01.990000 -CVE-2025-31886,0,0,c73d86de86d3dc81b1c40f856db66f0a60956c38dbc4709d4ad0d4bf832e05b9,2025-04-01T20:26:01.990000 -CVE-2025-31887,0,0,d54c33d517591b302b00ebc4e45735e58a8050b413372297cdc25b43fb40c5f8,2025-04-01T20:26:01.990000 -CVE-2025-31888,0,0,6b4b44419e886eaa88230ec92a6476d580d8851b0d61dc8e06e42f2f45ce30b6,2025-04-01T20:26:01.990000 +CVE-2025-31880,0,1,68a61005dc46da44a8019cb1d85cda466a2c850ab1ccb1b6c3eb2cd96eab0fd2,2025-04-01T20:26:01.990000 +CVE-2025-31881,0,1,296b1016dbc029c7c112ddab3e904e519c297138ea78e5826e955794c9bba6f0,2025-04-01T20:26:01.990000 +CVE-2025-31882,0,1,dbf57367b9b4589f9d0035f96897cf57c01ad33b3a0eb6ff421349d9e136469a,2025-04-01T20:26:01.990000 +CVE-2025-31883,0,1,aac50422a0f60ee6926a273899462c9352e1b5b94a298f0ba2ce5b64391b9e40,2025-04-01T20:26:01.990000 +CVE-2025-31884,0,1,fc33416bd40292deec25e47095e11cfcc8ef198a29338433ae27a2c38ba94740,2025-04-01T20:26:01.990000 +CVE-2025-31885,0,1,6cd849359c2e65ce86013c00fd8e5ac2924f3b3e1b827563842700cd2ab4a71a,2025-04-01T20:26:01.990000 +CVE-2025-31886,0,1,b009398a6699b70ea40d6f92e743833b9c3c1350a4cf885d50bd229b0d0f1ebf,2025-04-01T20:26:01.990000 +CVE-2025-31887,0,1,9c00ad6c6dbf7e6e68ee4160fef38b0729bfdf1c91a54ce589c8391b9b1200f6,2025-04-01T20:26:01.990000 +CVE-2025-31888,0,1,ef889d714524eda18c47d51c4a761cfeea122cc0b8bf21128af55f4a39e6bd23,2025-04-01T20:26:01.990000 CVE-2025-31889,0,0,578b38d2dc9b6570f94ad6c848a3be4aed02c44ccbf0e3efa8a83b22f79d15a2,2025-04-02T14:58:07.527000 CVE-2025-3189,0,0,10f1cf2ca10542ba0e4be35f8447c266ef2a66edc6f98679e8ad978b4aba0fe2,2025-04-07T14:18:15.560000 -CVE-2025-31890,0,0,b65898ce0553e8ce7fd4ab06e6cf7313e7f14c0d47bfb9ba085b4557bfb68295,2025-04-01T20:26:01.990000 -CVE-2025-31891,0,0,0d5532363eae4a56d554bccc6fd0a90dca74503bbed8f03648dd943cb45d4007,2025-04-01T20:26:01.990000 -CVE-2025-31892,0,0,3486378412c30d4b31ffeaa1b02f9c09ebdef5d6229cdf9d3eb7c7c44d1231e7,2025-04-01T20:26:01.990000 +CVE-2025-31890,0,1,45e9934530ba25636c38c0ec1bd27d53d3708b0b58fa5a97fa9696b8dc4e4ef5,2025-04-01T20:26:01.990000 +CVE-2025-31891,0,1,f94588f0de1ffaf3bc92ebad943f5c2286fc8aafceb085524ae011c04bb8b1a5,2025-04-01T20:26:01.990000 +CVE-2025-31892,0,1,7ea339a038560b493293ff595711e55d25bd8893748ea260cd7ea5396ab46402,2025-04-01T20:26:01.990000 CVE-2025-31893,0,0,8818cd1a54be1ffcac68eec130e71195e83ca3457fac8e6f9802db5eea4e2971,2025-04-07T14:18:34.453000 -CVE-2025-31894,0,0,76bdca9b5a5670c8bfc06a66ccd0c8f92cd4f564e08a0f144ff5bcd3140092e8,2025-04-01T20:26:01.990000 -CVE-2025-31895,0,0,a61cde107698bcdb135d621408d5a5561390c91f738558adf7fdef58b275a416,2025-04-01T20:26:01.990000 +CVE-2025-31894,0,1,f3642dc024a031f3147269cdccd02d0156afdbbce891e8e5b1776710df7c2328,2025-04-01T20:26:01.990000 +CVE-2025-31895,0,1,f4ac5a819a8f3728d29102a528d8079d85894fcab8e87ba02ce0fee20984106c,2025-04-01T20:26:01.990000 CVE-2025-31896,0,0,d66b76555667b45c2d42780ba937f177feb8ace16582d45a891e529a6b4fedd1,2025-04-07T14:18:34.453000 -CVE-2025-31897,0,0,803c7f17ff8783c92426e5c71338e7fedde004ea30828e4b5807312624ae5479,2025-04-01T20:26:01.990000 +CVE-2025-31897,0,1,642449201010116a20cfc4b60f81055bdcbf1e9adad39ecc22c4416c57dc4243,2025-04-01T20:26:01.990000 CVE-2025-31898,0,0,71454e1330bd81ef0c292e2128ce0c853eb8594fcb5ca6b52ffc08066ba94e31,2025-04-07T14:18:34.453000 CVE-2025-31899,0,0,0bc3b0b0fcfba2edbc1837106ab94357ce5fb16f3fe7ac4d587876523aa12f85,2025-04-07T14:18:34.453000 CVE-2025-3190,0,0,fe498262e55b20aa25d31a25eaf122b1a94c6032c6b730f82898961d888a66d7,2025-04-03T15:15:53.467000 @@ -289124,14 +289125,14 @@ CVE-2025-31900,0,0,2287cde58e17e4c9f534bd2e22cf094530cbada3b64ec616b040fbdfeb3cc CVE-2025-31901,0,0,85a0dc7ecbcbbe3d1382dfe5f6794d27d07a3cc0a155b70ce894455c3798b814,2025-04-07T14:18:34.453000 CVE-2025-31902,0,0,cfa6b23abb329d94fd4de4891cec33ffd4607b3ebbdc2182298b0816d7bcec5c,2025-04-07T14:18:34.453000 CVE-2025-31903,0,0,7c09f80464703572bdc84989e341f41b2e0fb27224681ee9809d5fde0651cd5e,2025-04-07T14:18:34.453000 -CVE-2025-31904,0,0,6f4496a706563453f6a2a972583b83101aa08d953ff3764f9951e4b8144c9e79,2025-04-01T20:26:01.990000 +CVE-2025-31904,0,1,bbe5f28f287a3b8e4e6afba30858fa8c92ab022e3c232cfe8bb85a1533a23906,2025-04-01T20:26:01.990000 CVE-2025-31905,0,0,1ca5ade49a3ce29bbfbe00cd763bf0bcc164cfe28c82d32967e8a0db1ad7f3c2,2025-04-07T14:18:34.453000 -CVE-2025-31906,0,0,858ea326679f35199fd193b52e043ef137ef7190828e881910c02e1564073db4,2025-04-01T20:26:01.990000 +CVE-2025-31906,0,1,dfdb1d15fd1274369af5c437c0aa5a14daf3152d84fc9168ee2a65f576dbcacb,2025-04-01T20:26:01.990000 CVE-2025-31907,0,0,1ca4bfbf59462ce7ba5c2189413fc5663b6b0ae647025bbfd2dcefae763b853e,2025-04-07T14:18:34.453000 -CVE-2025-31908,0,0,eb42864180a2f3ae29ca7fcb7b1369893cc75fb1cfe5c6047b9b04c7be11c526,2025-04-01T20:26:01.990000 +CVE-2025-31908,0,1,64f1a9f899a026e6331efe4c146ac65ff0a2579a8d188d246de09cf95e5f89da,2025-04-01T20:26:01.990000 CVE-2025-31909,0,0,ef5a77ff7c56cdb7af1e7c60541f13ea1b65af313a23517a86ab080f1625b7b8,2025-04-07T14:18:34.453000 CVE-2025-3191,0,0,564fd863d7dc4a59badb3cc3f317c5960c015b84bd605de924f05a0141415dd2,2025-04-07T14:18:15.560000 -CVE-2025-31910,0,0,b832932727781de50b17852301cd5a5c89392213265492ff6ff074f0ba795d9f,2025-04-01T20:26:01.990000 +CVE-2025-31910,0,1,f90306bb3a5ca866ba4ad6c3e2e3265ac1aee43de585a8755ddbdfd5d848a42d,2025-04-01T20:26:01.990000 CVE-2025-31911,0,0,a3e8c05d42eb38721b859fcb5e3e84e7f358ba837d299b49c2c70eab8912fd09,2025-04-07T14:18:34.453000 CVE-2025-3192,0,0,14f88a64f4f058599196fb894b7652f55d55387666faa45a3d02f24f7d0ecfe8,2025-04-07T14:18:15.560000 CVE-2025-31932,0,0,362dfb3dede0e01aeba8ae3f507453eedf01ad64b58b11b9af4da649bce815d6,2025-04-11T15:39:52.920000 @@ -289144,16 +289145,16 @@ CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f4934 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 CVE-2025-32013,0,0,b9e014f5fd31f7e573b509bf40d04ff5548b21d354f26d5a5266036bb938dc7e,2025-04-08T18:54:07.337000 CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 -CVE-2025-32016,0,0,5e6a0e269d4967bb9ce20bdc4b65ab6bf216e566f732ab5842eba9a6ceff7cfc,2025-04-09T20:02:41.860000 +CVE-2025-32016,0,1,210d54eeb85679dba0aa0fa591ab7524396a1833fed6c42b9666ce95c8071335,2025-04-09T20:02:41.860000 CVE-2025-32017,0,0,8a0f7f2a3dc0f318bf58248c4fe2f160ba48033de9c615edbc9d5ce3722cce81,2025-04-09T18:15:47.233000 -CVE-2025-32018,0,0,1844fc30427a0e5f1340a0d4b2b491b8b816d80738a0411934b5070b71fc43ae,2025-04-08T18:13:53.347000 +CVE-2025-32018,0,1,f9a9dd5168ecc7953ffdea2ce7e4019a350eb30fd43b370fc3c1a5f23e1a320f,2025-04-08T18:13:53.347000 CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000 -CVE-2025-32020,0,0,ed835337550d1af022a25ead8719b48fd0278920ca3f4a50f9110c3e9fc9d9d5,2025-04-08T18:13:53.347000 -CVE-2025-32024,0,0,2a81731508ada31033e0ed17d363191b7de1193dfd25aa413da57e238448c738,2025-04-08T18:13:53.347000 -CVE-2025-32025,0,0,9a8e0ba71c5c58cfcb63aac85316a9e9fbe8da1a7c23472c5263f4edeecb30e1,2025-04-08T18:13:53.347000 -CVE-2025-32026,0,0,2817c17c9b67154465e50755eb75afac2e1fad6c410e70ae29181f48c50d4e11,2025-04-08T18:13:53.347000 +CVE-2025-32020,0,1,5b7d2613617c9ad4e941ba7e2b1cf1f147b7a3d7b6c82162fb86d6a3786c79d3,2025-04-08T18:13:53.347000 +CVE-2025-32024,0,1,aaff324cba06ca8f03c4a4173bee9b2afa9dec13a6b5d5f449993fc4b6eea500,2025-04-08T18:13:53.347000 +CVE-2025-32025,0,1,5b101f2fdaeb4bea12aa8eb2f822059db81531c623e382758e69fd88182cc8e2,2025-04-08T18:13:53.347000 +CVE-2025-32026,0,1,a3f057cbd474338c495f1d95a560978a772ad4f2f87d9883afb826980afa64ff,2025-04-08T18:13:53.347000 CVE-2025-32027,0,0,132ba2c5196b266cbf1f912d4e5dbb05aa9fc214c035e497f4895edb1febaa07,2025-04-11T15:39:52.920000 -CVE-2025-32028,0,0,4d343b4b19700f3048576053ca777023aaefc1792bc5382f0cd9a709002a9a6c,2025-04-08T20:15:28.090000 +CVE-2025-32028,0,1,fad24bfc02199301f7b41b5a6bc0498b6597755916a480f41a3b468ef260ee4a,2025-04-08T20:15:28.090000 CVE-2025-32029,0,0,17f3d7a62a02d1dc2d4090ad588ece96dc4489035c1ba2500bd43578a1dba423,2025-04-08T18:13:53.347000 CVE-2025-3203,0,0,78b57c278226d9f3a2b475550553a6fb17775b43c46bacbb60b11f6ff85b8c2e,2025-04-08T13:41:35.810000 CVE-2025-32030,0,0,5b3dbaf8c498f868c300120d758eb67bca2ae26349bd33c2564d5f037b74ca5d,2025-04-08T18:13:53.347000 @@ -289198,7 +289199,7 @@ CVE-2025-32113,0,0,e7db690820e60516e7c6d486df6b4a9cb3e0deb6e179d05676b0064d8d011 CVE-2025-32114,0,0,d4f6e00f0a22d92beca9617a566d39d5ed1de364c6d3c710cb195903ecf376e3,2025-04-11T15:39:52.920000 CVE-2025-32115,0,0,a222c3098bde8efd25abd47494b5a7440771f88b95f30cc582d1a90da5e96415,2025-04-11T15:39:52.920000 CVE-2025-32116,0,0,72da76db75ccb947973ad42c16600dba8269c3e8c605699fe2efe7ab6affde4d,2025-04-11T15:39:52.920000 -CVE-2025-32117,0,0,b7d6a1729ca786393f16429b29d329802061f39a4ba256fc44295557fe4cc8b7,2025-04-08T18:13:53.347000 +CVE-2025-32117,0,1,8f82714c0f41e3e7fdf3216cb397b557daa6cea40775e556a66b7c79943ce6b7,2025-04-08T18:13:53.347000 CVE-2025-32118,0,0,8f0374a38abacc2da6332a1f76a9f5b8bd3a7b7fff2011293f9ae6b670f53f78,2025-04-07T14:18:15.560000 CVE-2025-32119,0,0,4fd52014e990c0736c5f682daf554efce8fc596d9fc81ac52c5797f2cceb7103,2025-04-11T15:39:52.920000 CVE-2025-32120,0,0,01d2b20382bdb828f787840ea9e1e3056675c528b77efb1580c1f6fa8893bf9e,2025-04-07T14:18:15.560000 @@ -289248,7 +289249,7 @@ CVE-2025-32160,0,0,9c1395fb2ec6e205976f09a90b0718066c82ed16a1c9579e0f8012ece6bfd CVE-2025-32161,0,0,9f369787356e75d953d09b35cf63430e5c96f379da3051f0dd353c65846a9eff,2025-04-07T14:18:15.560000 CVE-2025-32162,0,0,3f31d378fd232f88d11090e5787f7832a879d2a60d3a8f94219b359fabd09969,2025-04-07T14:18:15.560000 CVE-2025-32163,0,0,8ed2955d51a0bce692043782e954ddfe3fe0894e130dbcdb7e2f953e2f499edc,2025-04-07T14:18:15.560000 -CVE-2025-32164,0,0,def1362e23e994d5b344ca2ab4bf94ec0b915de813ec7403c6cfaa67b93f0620,2025-04-08T18:13:53.347000 +CVE-2025-32164,0,1,42d56330ca07be229f7ae83b05fad4b43176894ee08111e085cc364271e8ef03,2025-04-08T18:13:53.347000 CVE-2025-32165,0,0,d1d497853aa0436f0422acfab7eea0ac1c50388efe047ce13e43e232de75e3e5,2025-04-07T14:18:15.560000 CVE-2025-32166,0,0,e28a64c3736c6121faba78540c859b9f0ac75ebb87722f3c9e0b9a192f2f6acb,2025-04-07T14:18:15.560000 CVE-2025-32167,0,0,a7011f0720bd874049366903b84f623bab33217f15f862346f3cb6f81e2efe33,2025-04-07T14:18:15.560000 @@ -289297,7 +289298,7 @@ CVE-2025-32207,0,0,eb72e016d55b2976a29a6912bfeda1ec133bcea7c0b3d85d9579f149b9503 CVE-2025-32208,0,0,74f5bb61f4badcb3838dc80e5a4de29a24815b82dd6915e693a853b66c764b1d,2025-04-11T15:39:52.920000 CVE-2025-32209,0,0,1603135c9f53e36672a2ecef5661757da06cf7fd037cfe0a5c5773e8ba3447eb,2025-04-11T15:39:52.920000 CVE-2025-32210,0,0,0aa80c08dbeed0bc267b2a2253de1fd195755c49a910f167ea6c73944bcc0957,2025-04-11T15:39:52.920000 -CVE-2025-32211,0,0,b18a82b3f85ad207775d1cd37d7284800f47738dd09c10642178e6dd3e7a4375,2025-04-08T18:13:53.347000 +CVE-2025-32211,0,1,6bdc795ecc956ed82519c7a7f09aa44b466e95a997d47ca56b16a7040e169471,2025-04-08T18:13:53.347000 CVE-2025-32212,0,0,eb12d63e8a0a0e6749e0d2b8363cb81f92f2abb0e8486b3076c409d31db2137b,2025-04-11T15:39:52.920000 CVE-2025-32213,0,0,b03e4e6a53a238212a9de9a257af4f38a21def8a328edcba1b7bf756e73eb6d6,2025-04-11T15:39:52.920000 CVE-2025-32214,0,0,14e84e143e63b37241afbf29cb43e9e7ca1b2ae783e105618e2d6a4e23faa08e,2025-04-11T15:39:52.920000 @@ -289358,11 +289359,11 @@ CVE-2025-32271,0,0,9fbd8c287d18a7fdcbecec1f68bf28db33e450ae2930193d3112f73e124b1 CVE-2025-32272,0,0,94cc9160174845bb5d667fcb1fbdea45ff406fc4e1b26142be412d9fc8572fa0,2025-04-07T14:17:50.220000 CVE-2025-32273,0,0,9c22eab1b89ff91a4f3663ce8b356fa4af4b702c1b0085a936338c0c086adbf3,2025-04-07T14:17:50.220000 CVE-2025-32274,0,0,0eca68fbad040b4858c60bf1e368b1919e5128143f7bda40b1bca9fd3149e1ec,2025-04-07T14:17:50.220000 -CVE-2025-32275,0,0,41a7f6e25d2a1fb4ba5a3ff02ea70514e1731532d1a32fe885cf3a186c01a300,2025-04-11T15:39:52.920000 +CVE-2025-32275,0,1,f0d882da0ae3cd33f53d061162e84e5df82662d368edbbf34cd3cac268d51906,2025-04-11T15:39:52.920000 CVE-2025-32276,0,0,2d58307e46b7067efedf11f095121f96b501a153603912c43d4654278d1c5d86,2025-04-07T14:17:50.220000 CVE-2025-32277,0,0,4c5beb804b84b7552a54d4404f6c409936619f520f5ab7f2060d18f52aa242ee,2025-04-07T14:17:50.220000 CVE-2025-32278,0,0,211d6ed6ada58eb335634d812d6f25038c2a3c7f1bf1fde12b2879747a714849,2025-04-07T14:17:50.220000 -CVE-2025-32279,0,0,b450ca72abb8c6d424cee28279d72c7d5d2ac489159d2bce752077d570c6ff96,2025-04-08T18:13:53.347000 +CVE-2025-32279,0,1,c8621d6c038bd552e5f86ac94833c9e696ca47f07d059658ea9fd536b7f0199a,2025-04-08T18:13:53.347000 CVE-2025-32280,0,0,51a846a5a42c043aab0e6fac915214336a31c77ee73a0ba45d8879819031b4bd,2025-04-09T16:24:47.373000 CVE-2025-32282,0,0,4c53220555eedeae13ce6f318e3c3f0db70bd45e8d4e3f3e7970ecccd4879e13,2025-04-11T15:39:52.920000 CVE-2025-3229,0,0,601e3d3bbee98b6c8d411bef361231118b9ba6394db4f244736698e0ae8f6293,2025-04-07T14:18:15.560000 @@ -289381,16 +289382,16 @@ CVE-2025-32367,0,0,be8f17c16ec5be781415d13ccb8fb34086cbfd7ecda47a075999340e22fc7 CVE-2025-32369,0,0,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000 CVE-2025-32370,0,0,52539d7c5e40c96e3c6580caaac756c4f836d7993783b3dbdb4c110f6e19f5e4,2025-04-08T18:54:51.523000 -CVE-2025-32371,0,0,0ee3f04e31cfe56c2f8efd86690152691b8d0638c7f6c7c7d01bbc1165685192,2025-04-09T20:02:41.860000 -CVE-2025-32372,0,0,dfffb29d11c95a90c1826c739313bb2882a5ba128e8b426dc0090d95a2b51084,2025-04-09T20:02:41.860000 -CVE-2025-32373,0,0,d7eebdf6268acdaab9f11077d8581e25221c7d3302f5a8f6e69ef9b68b8be512,2025-04-09T20:02:41.860000 -CVE-2025-32374,0,0,8f128e24eba61344d987b2fd40118501756fd43974bfa07586abcdd92affdffb,2025-04-09T20:02:41.860000 -CVE-2025-32375,0,0,57aa23969c6f6c30c22c2fc60981fa50740929b50174f07696426f015b423dbc,2025-04-09T20:02:41.860000 -CVE-2025-32378,0,0,2b3ad40544f3cc860a964750b8b0cd83606548c3a50e6a8f2faeaffcc0a85f25,2025-04-09T20:02:41.860000 -CVE-2025-32379,0,0,7f1cfe7e309f09c759a83cd8df33cd9a42ad7618497c3490f3bf29b730cfa592,2025-04-09T20:02:41.860000 +CVE-2025-32371,0,1,ebc6ef46ca34de1b39dc40b2a7c78ddd9e7f2413be444dbe4b9e9f179d8a1a8a,2025-04-09T20:02:41.860000 +CVE-2025-32372,0,1,22fa8cd3b893bf372ec04eb7ac8472eb8e3dd42f66fa10fd7098be2daa4abc83,2025-04-09T20:02:41.860000 +CVE-2025-32373,0,1,025c5269a7b1b1129fc7ffc74fdb2837ddf73799e72d1d730dc03f5987178867,2025-04-09T20:02:41.860000 +CVE-2025-32374,0,1,9ba0f888a2a53259377f24776eaa5d5e6e9d144402901507c323139add50fa45,2025-04-09T20:02:41.860000 +CVE-2025-32375,0,1,d8b37a9db524ff7cbabe2073447fcc9ce8c17e0c54295984c81db2b4bbe88b4d,2025-04-09T20:02:41.860000 +CVE-2025-32378,0,1,38997789d174dd718c93596d5b05906382d079ef3dfbe80e93c65d87083adb91,2025-04-09T20:02:41.860000 +CVE-2025-32379,0,1,ae2c164887e722d2185678f110673598ee5e1eaa1abf29e9367b358c40092899,2025-04-09T20:02:41.860000 CVE-2025-3238,0,0,273f0c8b3980a53c04674d23c4dc81b848f12a18d8a02a7425c58d0764474f6e,2025-04-07T14:18:15.560000 -CVE-2025-32380,0,0,3b67cd7140a780880cd9a365fb7c65e3844121c9df502fb9e347277a2990b10e,2025-04-09T20:02:41.860000 -CVE-2025-32381,0,0,706776f7375b65e6513a0234be6a05508bb5b72755cc79b008c9277f6ea13ecf,2025-04-09T20:02:41.860000 +CVE-2025-32380,0,1,c8e502ca2a1d7848aa29488649458187bb1c1a319841e66316c941fb4f151993,2025-04-09T20:02:41.860000 +CVE-2025-32381,0,1,9a021bccb8055e9ac06ab545154eb07d7cb170bef3ba75a0a61768987e904be0,2025-04-09T20:02:41.860000 CVE-2025-32382,0,0,500e2233bfdde4ca81f1cd7422b1483ead79a7537a8327f54eb95ab0c00c34d0,2025-04-11T15:39:52.920000 CVE-2025-32383,0,0,0af06fa6169ce711a7266c3fcbd3f7c3bdf408f8bfe0c4ec49d8139c73ec676b,2025-04-11T15:39:52.920000 CVE-2025-32386,0,0,35fa478ec866097c61376bec0ef1c1b1fc66dbd01bb69c1c6b6e024f68419ecd,2025-04-11T15:40:10.277000 @@ -289399,7 +289400,7 @@ CVE-2025-3239,0,0,d82817b34dd7b66d6aa65a93073be6dc4033b0ef23e651c8d1c7428dd5441e CVE-2025-32391,0,0,01a08115ae4cefd9de1b9aefec1b85980241d6513f3292da97678ea6370f601e,2025-04-11T15:39:52.920000 CVE-2025-32395,0,0,a161f016c761dba18a6390dd5da5792bac2d2e42803818db2da92c349d4b75cd,2025-04-11T15:39:52.920000 CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000 -CVE-2025-32406,0,0,c36ab6ae7e1e7303aa3eb42ed946f7d4900320595ae089bfc4f9d1df0d82382a,2025-04-08T18:16:08.917000 +CVE-2025-32406,0,1,c67cbc23c83784ef10125f3cffbec33dfd15266df68765e80fc3a95cd3a58377,2025-04-08T18:16:08.917000 CVE-2025-32409,0,0,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d38d1,2025-04-08T18:13:53.347000 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 CVE-2025-32413,0,0,264a0d1d6affdc64cee850b499944750da36d787f6454e6724a671c6b9cc8e84,2025-04-08T18:13:53.347000 @@ -289413,40 +289414,40 @@ CVE-2025-3245,0,0,396ea3bbe154112d349f915c8c28a6610578699cecf486191d9d012a69d9c5 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 CVE-2025-32464,0,0,90ecf00992aa935a1ec172382a80a6a814adef224b6842ca8a80c5ebbf6d56cf,2025-04-09T20:02:41.860000 -CVE-2025-32476,0,0,5077fb066a1c1c8bd9222909c968e14fd4e05051500fab6d3c97e3ed88ca42bc,2025-04-09T20:02:41.860000 -CVE-2025-32477,0,0,653ba5ea3f1c64a147a1553af930c1d9312cfe68ea1d995bb35b3b9219d44291,2025-04-09T20:02:41.860000 -CVE-2025-32478,0,0,e490ccdec3bf2c78f22a036d0b09662eed3f438e6c23329b9ba391430e6ba44e,2025-04-09T20:02:41.860000 -CVE-2025-32479,0,0,5ec6bdc32de22ea3d7b88d0ccd2113c6208d77dc2db5f48b33eb3ba8300d5e1a,2025-04-09T20:02:41.860000 +CVE-2025-32476,0,1,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000 +CVE-2025-32477,0,1,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000 +CVE-2025-32478,0,1,dda56302d340936b33be9b172f0f1b3962b76b9c83b1ee4199324d81c031ab47,2025-04-09T20:02:41.860000 +CVE-2025-32479,0,1,b7d955b884b51a00603f651098d158492571ad29bb823a91954e608a7b99ddc0,2025-04-09T20:02:41.860000 CVE-2025-3248,0,0,9c54239426075f54251b799b9a99dbcd0f6c85534f10393ee8caadd1da693a4b,2025-04-09T19:15:50.270000 -CVE-2025-32480,0,0,cfe85bc52cfe7ad5fdb76001c653227d3a5d99df83228f680be0e60560b9bcf1,2025-04-09T20:02:41.860000 -CVE-2025-32481,0,0,e942ad882c51c591ee613921cd1a9a1795676db067a94f784141b097127b16e0,2025-04-09T20:02:41.860000 -CVE-2025-32482,0,0,3b3100d2765d5d76303b6bdadc1b635a18c1484b146318d260d032eec70ad40e,2025-04-09T20:02:41.860000 -CVE-2025-32483,0,0,ad93c95b302b29f0161f9decb1ea373c597a6910d456a14bcfa21edc59bd6fba,2025-04-09T20:02:41.860000 -CVE-2025-32484,0,0,3c90cd6a78a98d7f2572377f9b1d46a55b3296e08f716132f46dfd5592abbe0f,2025-04-09T20:02:41.860000 -CVE-2025-32485,0,0,2802ece458b896d61f0030494366937925f28be40e6f137da7c0165a0e10cd5f,2025-04-09T20:02:41.860000 -CVE-2025-32487,0,0,6c7e404f6c15f5cdf956927cb37117332e2b269da382e2ed0077d8185a63fea3,2025-04-09T20:02:41.860000 -CVE-2025-32488,0,0,aefa035fd17c341716a8c7e9d520f0198e450069edec2b49945c682ada9be9fb,2025-04-09T20:02:41.860000 -CVE-2025-32489,0,0,fb078ca96e031d3703e1f27ddde042653dc6e6024daf7470ff250f3687b5a66d,2025-04-09T20:02:41.860000 +CVE-2025-32480,0,1,711afe2b796a1e44af9b699c2c595c3275aeda4b147d8a6b27d1097823c9bac0,2025-04-09T20:02:41.860000 +CVE-2025-32481,0,1,7097fbbfdba3ba35ffac1b5fb186ad1f4f1fd486b4c20c65ebbc9171d9d517f1,2025-04-09T20:02:41.860000 +CVE-2025-32482,0,1,96ee5109c29a9fe3d3a067d0337de6dae0242f5696eaf770868728cdae675792,2025-04-09T20:02:41.860000 +CVE-2025-32483,0,1,e5ff0b8eb834db8e4a267d5c904f4a61b4e95799d6b3018a1b6a87f5f6bd0628,2025-04-09T20:02:41.860000 +CVE-2025-32484,0,1,4c7dc88f6723370c9e7ab61605c306e2157738c0dff464a3d0ea8a26fd9623a0,2025-04-09T20:02:41.860000 +CVE-2025-32485,0,1,2dd1945856cfb0add8d285fb44da0462fbc2e695874468f96a85ef43fd998039,2025-04-09T20:02:41.860000 +CVE-2025-32487,0,1,c4a61a7cb9dfb6a8be1ecdde613eb72a3ae196518a9ac12c07fd1657a76392b0,2025-04-09T20:02:41.860000 +CVE-2025-32488,0,1,2d89331aac2029ae581b68f375e8a0456b559e8a079fe44dfa383e53ba42dbb4,2025-04-09T20:02:41.860000 +CVE-2025-32489,0,1,a8c9c6b52675f172504cba113597ca1113b27ac7e08ac671a750191beccf02e8,2025-04-09T20:02:41.860000 CVE-2025-3249,0,0,733737203692403dc364c9398a90d84cb34e7925fec94f7c4725b719e6f271e1,2025-04-07T14:18:15.560000 CVE-2025-32491,0,0,7ca25a36af00963f97ad2f9328447a993025bc16b08623b955e1c4ad52154f7f,2025-04-11T15:39:52.920000 -CVE-2025-32492,0,0,756f9d07d7543ee222468be0478471694a667ef162bcb28350837eb0c5457083,2025-04-09T20:02:41.860000 -CVE-2025-32493,0,0,4053ee93b878da03862c6141a6281b14f478df2a009e97175cd70cb475f97b50,2025-04-09T20:02:41.860000 -CVE-2025-32494,0,0,136b57298ca329f22955e29f943bd3b1cbc01a50d39c9f29352726f6fab0a369,2025-04-09T20:02:41.860000 -CVE-2025-32495,0,0,b92cdc09e508db77f634ee99b6a99f5b8ee1c036a79f1e74bae860c85c0b2271,2025-04-09T20:02:41.860000 -CVE-2025-32496,0,0,905faacd5bf5b6daa2eb467826fa593d2adc13a9c6c748d7b21f4f72aa7ff930,2025-04-09T20:02:41.860000 -CVE-2025-32497,0,0,4e988f8def0287676145b1f57e23a9b47aa009995fafb709f11681069fbabed7,2025-04-09T20:02:41.860000 -CVE-2025-32498,0,0,6a3795728c73d64a38affd426accec1968e05e568746c5b25901d07bfe9fc143,2025-04-09T20:02:41.860000 -CVE-2025-32499,0,0,d6b35d212528672601278047e460ffdbae215ed7e8d1514b87311df5124cf4d0,2025-04-09T20:02:41.860000 +CVE-2025-32492,0,1,8777f4129f9365ebca81234313a2859ddc6169e4ed8a91658a3200ff4e1b6912,2025-04-09T20:02:41.860000 +CVE-2025-32493,0,1,b8d6d0ac660c953509a5b2eaab559380f4c6beb74ababf1f6bb316990dc45d16,2025-04-09T20:02:41.860000 +CVE-2025-32494,0,1,d5c1fba9bf5d267b4e88eb5c1df676e02d2b3cd1acf8cbe3c752229d29783c5f,2025-04-09T20:02:41.860000 +CVE-2025-32495,0,1,db5165846b8e485ccb1a397d7c68626327c6b4333aa8cfbb2852af76d1551fd5,2025-04-09T20:02:41.860000 +CVE-2025-32496,0,1,a2a5738b8aee5fc523faca2b1d836afa582d265d42edbf28804ce23e6a64e64f,2025-04-09T20:02:41.860000 +CVE-2025-32497,0,1,608551ec66521fcc5291b7bc163b14f74b689cc684fcdf3c85e64f54cc1c1269,2025-04-09T20:02:41.860000 +CVE-2025-32498,0,1,b1e8716e892d7b312e7f4aab96ba028bf6c9d1cce5c419a6d5942fae98605db2,2025-04-09T20:02:41.860000 +CVE-2025-32499,0,1,68335b8d55eaeef1485abb6d9a171ce6f088795f021098e6edd48c3c4271bd3b,2025-04-09T20:02:41.860000 CVE-2025-3250,0,0,86c9421f263345a046bec996216d445d7aebcf0cefe445ca2d4279fffb4f74bd,2025-04-07T14:18:15.560000 -CVE-2025-32500,0,0,8df233addabd7d4196349af7e2b2f0c3d3f8b39e6bccb4323b831cca6c44453a,2025-04-09T20:02:41.860000 -CVE-2025-32501,0,0,07737988125e9e8f84b77b372f79992963b0761a09f5e541596fc263f6b01a41,2025-04-09T20:02:41.860000 -CVE-2025-32502,0,0,768476dfa7328187554c7b85d7c9fe637dc8582e78ce1476481027c918967626,2025-04-09T20:02:41.860000 -CVE-2025-32503,0,0,c150b47bddeebc4c8156e564db72d2f6acc04877f2b60e3a35be4348580d8520,2025-04-09T20:02:41.860000 -CVE-2025-32505,0,0,e0b07056e3460165faf62951ad016097d119ec9fcd8c147e24c58e19a40af4a0,2025-04-09T20:02:41.860000 +CVE-2025-32500,0,1,d76f4b016c4143b5675175d800eae3709f59a84a0723480b653df8f8abdead40,2025-04-09T20:02:41.860000 +CVE-2025-32501,0,1,8ea0b9de76cc778a3d29cf82cd71b628cbc4f922d519dca3c2a1eea411745051,2025-04-09T20:02:41.860000 +CVE-2025-32502,0,1,f9af112ce58f5ab3be4860166d630b2963f580c6cce584418ad208614511ef77,2025-04-09T20:02:41.860000 +CVE-2025-32503,0,1,2e1433747861ed8ce62fe1171f5dcafc2208210b27da1f97e8c0c8b8e64dc0b9,2025-04-09T20:02:41.860000 +CVE-2025-32505,0,1,32f43fca3d5100e5f79824fce97e90e8ff3da234aa5d4f43fd8adbfe63b1f25e,2025-04-09T20:02:41.860000 CVE-2025-32509,0,0,ecb483df86b066705aa236b66cf761eb622f1d1fe441630337ff9d3bb84d04e9,2025-04-11T15:39:52.920000 CVE-2025-3251,0,0,40d0b8ce477fd906963245c3f47c46ed7c4260a43feb20789c6a6db271395106,2025-04-07T14:18:15.560000 CVE-2025-32517,0,0,858d88a0ab16e0761aa3e0ff0f31512fd584c83d5434f991538af030f180767c,2025-04-11T15:39:52.920000 -CVE-2025-32518,0,0,614c71891568de0829ec63430eeb590167a08493c6cb7dac774f07bab3f9bdc2,2025-04-09T20:02:41.860000 +CVE-2025-32518,0,1,c5d18b032b88d7705ae4139538571a594e6c803fcfcb9dd18df6c82edde16c88,2025-04-09T20:02:41.860000 CVE-2025-32519,0,0,5190b2cc892e9a70904204ff0411530bb734a8920b365dc77f459d2852496121,2025-04-11T15:39:52.920000 CVE-2025-3252,0,0,4c10de8b3cb60d5dfb9be1c6a515e4b2cff1e60b913ad0965a444629ee6bbad5,2025-04-07T14:17:50.220000 CVE-2025-32523,0,0,1fc7b3071ad2c634ef30f406d059623be1c186baa1f7468cb08df43e1272df3f,2025-04-11T15:39:52.920000 @@ -289461,99 +289462,99 @@ CVE-2025-32539,0,0,e5bf8d78a20b7dffea7527a3592bcb554cb1f9054399bbed0f41e50b22814 CVE-2025-3254,0,0,48928c45868aa81d54aac82548f85d57c79f7bb7f98d123408d27256cf914e0c,2025-04-07T14:17:50.220000 CVE-2025-32541,0,0,9d6860f84c7d5d94ae5a97177fa1e753ece982d78ef0a7232a4af47d1e600af7,2025-04-11T15:39:52.920000 CVE-2025-32542,0,0,a8a2c4d462d81473af5ae5571f0a81079d1c7981d5018aabdd03267d242aacb5,2025-04-11T15:39:52.920000 -CVE-2025-32543,0,0,d050165252e86d2799dc53e2bbb81b0dbc85fef67b19a057fbeded735059c568,2025-04-09T20:02:41.860000 -CVE-2025-32547,0,0,972184e533faca4526064acb0f983957804491440de409b5f8309b7935acb12d,2025-04-09T20:02:41.860000 +CVE-2025-32543,0,1,a0ec98623149f1faf000ff90071d5a44b21fe39e340fceafd35caf07c20ca884,2025-04-09T20:02:41.860000 +CVE-2025-32547,0,1,5c89f4f081a50da795aed38cf58a1893dffebbf046663f20795b9a5873e64eb2,2025-04-09T20:02:41.860000 CVE-2025-3255,0,0,d5353c58983edc47cfd68b6813d92152b05623ed0e06ed0dacfb65f3d812b06b,2025-04-07T14:17:50.220000 -CVE-2025-32550,0,0,6aab19aaca5b164fcc7407dac1e301c7e2f368ae8071ceee7d76d49c266c8de3,2025-04-09T20:02:41.860000 +CVE-2025-32550,0,1,0d4c615097256a13cc479ea60d0d4d2caeab929e7fcd6b0932b9a19b45f1a275,2025-04-09T20:02:41.860000 CVE-2025-32551,0,0,28cd9e7a2983ff8ec815d18ebb86efac9600b285820b5afab7a5b6c87d080cd5,2025-04-11T15:39:52.920000 CVE-2025-32553,0,0,2f7156823ec5258b0cc23b3c1513fada4e8842975bbfecc511e99e8fe15f2bb2,2025-04-11T15:39:52.920000 -CVE-2025-32555,0,0,7b60a026f07761c55d85498959f4cabb90b525fe6170c9e9d5a3be4d0a275575,2025-04-09T20:02:41.860000 -CVE-2025-32556,0,0,03611315d89a49c9f0dc81909f7355075f5c2265ddd38852e3def659a3349a29,2025-04-09T20:02:41.860000 +CVE-2025-32555,0,1,0a7c9e2c1c845d6198d5b4f9f837e1ae7878e89b18294ef15dbb0aaea928178a,2025-04-09T20:02:41.860000 +CVE-2025-32556,0,1,11f6b21408a67b77be665e8d5a60c7dff1e3179fa92e048ba402b95b4905efc2,2025-04-09T20:02:41.860000 CVE-2025-32558,0,0,cfd0da4f08b10f84bfd1ff4df90206170eaaa9077e48a7337e358049cd93d097,2025-04-11T15:39:52.920000 -CVE-2025-32559,0,0,33ee8b4fb18181edb7883dffbe83974b2747e59c0f49de6506d018442da457b1,2025-04-09T20:02:41.860000 +CVE-2025-32559,0,1,44534358b3bdacf0a15d17ec0dc2bcf5f03de48f15cb4acab01891d94e681177,2025-04-09T20:02:41.860000 CVE-2025-3256,0,0,cba4962816ca9028f309f7d49dc62bb1e7562a0c6842a2b632328c7e8082b66d,2025-04-07T14:17:50.220000 -CVE-2025-32563,0,0,264f345e68fed8749b434a4a100ada5d461e24ca5b313797841acb8034263428,2025-04-09T20:02:41.860000 +CVE-2025-32563,0,1,20d8af6efd9413fcc0a758d9147bf9be8014b979df7435a0a5eeea273d9083bb,2025-04-09T20:02:41.860000 CVE-2025-32565,0,0,d45a3e51a0e03ec513853e7c4c24b1fee2564bd0fb3e3a7df6b1dac1eeaf5ff1,2025-04-11T15:39:52.920000 CVE-2025-32567,0,0,34d62116ffabe56dafbc306f269930a343738562d337f554da088047a262ca14,2025-04-11T15:39:52.920000 CVE-2025-32568,0,0,bbcccaa757bc480c308a08abdee2efd19a89e86e66d409755954b789b388ebce,2025-04-11T15:39:52.920000 CVE-2025-32569,0,0,2e20f28428ace98ef4089ff7b40b962e3ae506f272e00a7ff3ae4333dfa9d7f9,2025-04-11T15:39:52.920000 CVE-2025-3257,0,0,d0dbe0934bee18c46d2eb221ac503819fe8076798dceb149ed2cab72d50f437a,2025-04-07T14:17:50.220000 -CVE-2025-32570,0,0,d5b4bad5227b9367d571ddbd1949a2129504ddec547daadd7701c137e8cece46,2025-04-09T20:02:41.860000 -CVE-2025-32575,0,0,d95070275bcada3e610fc9640cb9f32fd604c0f6173f8dd48dda009e662c3d47,2025-04-09T20:02:41.860000 -CVE-2025-32576,0,0,c1d6c7191b747d748a6f450876322eab79ad2a3ef2f5dff3705a78cb7af3f3c1,2025-04-09T20:02:41.860000 +CVE-2025-32570,0,1,af08789ee25aaf69b20b46d400a50332d17ca87fa93d745cbc7a58dd5b3b17f5,2025-04-09T20:02:41.860000 +CVE-2025-32575,0,1,69bb9f98ff6a6129f348d9ad9a926d1203cf521b2dd9ef8bd68b9f530896aeaf,2025-04-09T20:02:41.860000 +CVE-2025-32576,0,1,ffe27a600e858356a861f93503e6d772ecbaa7838fe71d5614aabcbed9ffb406,2025-04-09T20:02:41.860000 CVE-2025-32577,0,0,0f080877e2f41d6d6c0f07a397e0ceb897a2e6d27d190efc0486ec12ea4d5d93,2025-04-11T15:39:52.920000 CVE-2025-32579,0,0,4488ee3852fa0c6cb4f2ae168d9681e4637b4bd3b2fa1a20129a1d03a81a563a,2025-04-11T15:39:52.920000 CVE-2025-3258,0,0,3615f8f7ebcf8c8b7786ba6b57f5dc9d63bf8e77b09fe3537a64410ab7050162,2025-04-07T14:17:50.220000 -CVE-2025-32580,0,0,0779c4c7545a37afcd019dc542da5b02685fe4074b6ae465584500bd9c455251,2025-04-09T20:02:41.860000 -CVE-2025-32581,0,0,0ff013e49ea00af2fc95f87c588af9630af6553a43356251b5a5af26809b4656,2025-04-09T20:02:41.860000 -CVE-2025-32584,0,0,68bb00ee489509d942d41ed89905597661ec4f3a38d32988bef35836216f2de3,2025-04-09T20:02:41.860000 +CVE-2025-32580,0,1,d418c714451dca743193e90b7004cf9b97091be2a270cd8c017077f92dc411d3,2025-04-09T20:02:41.860000 +CVE-2025-32581,0,1,e24d8871b8feb37ffa356b93972082d0619310ad8ca519e03bb498a4315e23e2,2025-04-09T20:02:41.860000 +CVE-2025-32584,0,1,a0422078682d2bb2a020bdf57d1d057dfa8f823a6d5935a4865db70656dce7cd,2025-04-09T20:02:41.860000 CVE-2025-32585,0,0,d60501b5eac7238a6e4fbbb5aa27c4b02e43211423f06ca48cd5b24add3108ae,2025-04-11T15:39:52.920000 CVE-2025-32586,0,0,568c68d078f8b39d27913a05c0d577a07c508917cef4288a94cef978879b6384,2025-04-11T15:39:52.920000 CVE-2025-32587,0,0,abdbce43f67286246b6ed9267c47d0d04bcc7f881e0367fad5ed30af19c9fc16,2025-04-11T15:39:52.920000 CVE-2025-32589,0,0,d52a7c889387b7588bff725d5613fb4cdf91c47aaafe68663e122f2804f2aed3,2025-04-11T15:39:52.920000 CVE-2025-3259,0,0,e705e50caf2174f59dfb699e4aa759ceb69dcda3b3d546c93e1b05690cc687ca,2025-04-07T18:19:20.090000 -CVE-2025-32591,0,0,fd8ba4bf1a72e360674a8fe6204340fb9d6c3440cb5ce780c7835f0636ef0487,2025-04-09T20:02:41.860000 -CVE-2025-32597,0,0,96fc415ce2407738ed408ad01b04109f892c8ebeb7179dfc5cf7363ebc87d494,2025-04-09T20:02:41.860000 +CVE-2025-32591,0,1,1887d5992cae09a24596028d383d3f28ff6066f40b63e68f60c03fd2c0bcc865,2025-04-09T20:02:41.860000 +CVE-2025-32597,0,1,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 CVE-2025-32598,0,0,be8017105729dd6b6995cb6d7bde7b16173b70f281a88c3d096e3e4658a4c141,2025-04-11T15:39:52.920000 CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000 CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000 CVE-2025-32601,0,0,684526a644a2d5bc9b83c4eb6c253fb64f18b24d4f5112267400e5345b8fc15c,2025-04-11T15:39:52.920000 CVE-2025-32603,0,0,8385616a4c5ff327375aef17c0bc8f885670c8a6ca5e0493841c9313fe8f8ac6,2025-04-11T15:39:52.920000 CVE-2025-32607,0,0,38265bc8bf31e950ce0d9eddaae6c331e6d40d95828b1da783164822fca5392c,2025-04-11T15:39:52.920000 -CVE-2025-32610,0,0,dc9fb659de83670c7c33be214fe09b7737ca428457ab3f71ece1458f518c12f6,2025-04-09T20:02:41.860000 -CVE-2025-32612,0,0,2ca59969dacb02baf4d8154f1c272d9b1103df0b2ef0d4006fa6af5914c3c1a2,2025-04-09T20:02:41.860000 +CVE-2025-32610,0,1,a25ad45796b5f5acd8ab3402331ea34b381a9f321b1c6d3cdae0171ab188d6c3,2025-04-09T20:02:41.860000 +CVE-2025-32612,0,1,efa99a2dabb352d1a38ccde079a19aeda5059b5f0692fc1193c5fbb5935c1e14,2025-04-09T20:02:41.860000 CVE-2025-32614,0,0,0c267d6fcb12c4fc9947a4387c716851781dc5b6af0dad0c590e672b67c059ed,2025-04-11T15:39:52.920000 -CVE-2025-32616,0,0,2e563f58b0e6b0772785bac3eaa9ec9a78ae954484a2c3aa1fb02d6e868b4cb6,2025-04-09T20:02:41.860000 -CVE-2025-32617,0,0,71d3ec745715f4618004af83a345c1e36da6cc1017adbb46f67d801506ef1931,2025-04-09T20:02:41.860000 +CVE-2025-32616,0,1,60896a25617451753658cf2cd6019c47ed9948e1a164f38e18b95e9ff80206a5,2025-04-09T20:02:41.860000 +CVE-2025-32617,0,1,9661b5a949800c62844427fa5e646378c73c47d1848559445bcbac54968a81d7,2025-04-09T20:02:41.860000 CVE-2025-32618,0,0,3e2dffa868b047a20340a7319c6706a3dde352ae7874207c3d70a1597ad9a558,2025-04-11T15:39:52.920000 -CVE-2025-32619,0,0,40a399def20506b990a5b9b8ca489d44c848da1caa4928159d10d8cdbf1d7bcc,2025-04-09T20:02:41.860000 -CVE-2025-32621,0,0,9d88f036911502a4d01b04e887bdfff30790926c188434148672296f334eb2ce,2025-04-09T20:02:41.860000 -CVE-2025-32623,0,0,9c4a61b53a0aad0c6b2024143a2f6f05bbee238508cc7a45df54750e9078afdf,2025-04-09T20:02:41.860000 -CVE-2025-32624,0,0,bdf1e4504695fcf5573bf65f3a823ba2ad5adfc364b0a8a82084be8af29ad9d3,2025-04-09T20:02:41.860000 +CVE-2025-32619,0,1,04b1be8036bf1c25a4e2653334fbdb6d637490b7f9c97555a40f71ef05d59815,2025-04-09T20:02:41.860000 +CVE-2025-32621,0,1,9afac0f9430fb7aa06a88042a84e3d0fdf6ad0626a0d9442f17bea6025ffa1ae,2025-04-09T20:02:41.860000 +CVE-2025-32623,0,1,a19ab0e664b534d2592451cb5de87da1f7935b58975458209ce84e50abe97bd2,2025-04-09T20:02:41.860000 +CVE-2025-32624,0,1,2d99316e1e4efab56b5c02b7a21808d35b3190975142ba1f83cd2a781aec51a0,2025-04-09T20:02:41.860000 CVE-2025-32627,0,0,2ce05adac593c463246ee439e6e044a763c1c4fc0542c6bc6722a701c6ebfac4,2025-04-11T15:39:52.920000 CVE-2025-32629,0,0,a92f9907d30b0b6db2afce1e3db24313c9b35b2708ccf75f8c93c0c10a9249d1,2025-04-11T15:39:52.920000 CVE-2025-32631,0,0,98a4a957df97acffc58c06a08d29807a3e2ddf6d4d4dfbf07dcb3cd84a59cb05,2025-04-11T15:39:52.920000 CVE-2025-32632,0,0,26e39bc54319c3de0a0c10d557b9f9955da9030c6dcde1ffebb8eaee6fe7bfaa,2025-04-11T15:39:52.920000 CVE-2025-32633,0,0,4511b96ee939e61d3f20938de8db535603d07e2e1f7c857a29d2da3ed618a891,2025-04-11T15:39:52.920000 -CVE-2025-32640,0,0,4faaa8e90e12217c66a4114327933133c6f08418147e1ef08f8b2d3b9f259249,2025-04-09T20:02:41.860000 -CVE-2025-32641,0,0,a7e875658bf04002a0f0ff2d8ed205c3e62723306ba92b913fa8b3da4737f4b4,2025-04-09T20:02:41.860000 -CVE-2025-32642,0,0,7ada1176e299944cf4984e04ec32597fcad8956fb8b07508c19b98987a43b7e5,2025-04-09T20:02:41.860000 -CVE-2025-32644,0,0,8d77ffb90d6541e311c07c2f45ed6a06f20b0ee590798253e68c0a42396292a1,2025-04-09T20:02:41.860000 -CVE-2025-32645,0,0,fb62da3f3a1988bda24134062715132c5261d9674bf6f1734f8b456b41a59035,2025-04-09T20:02:41.860000 +CVE-2025-32640,0,1,cf49f8ad76a904999cf27486d117c795b1de02a1d0b705263cab94cab97b30be,2025-04-09T20:02:41.860000 +CVE-2025-32641,0,1,d04a6f9084570cae3bdbe21b3d3e6cbeacbb39d50f117e6bae39942bd0102f2b,2025-04-09T20:02:41.860000 +CVE-2025-32642,0,1,aa532dd331e1bd53f2e3ad431d5751486f9683adee9f60d6fbaabda798c828d0,2025-04-09T20:02:41.860000 +CVE-2025-32644,0,1,a8b5c6deaaa33a247e29a30ae12d5a0ed896af93ae59fcf06602b2311ea32835,2025-04-09T20:02:41.860000 +CVE-2025-32645,0,1,8037d68896c131632a8e2cff649d68359b8cea9c000bc77c2416246a22591d10,2025-04-09T20:02:41.860000 CVE-2025-3265,0,0,1b08405cf7862a0d70f0211001bee004fe3d504e775eb888b6c2102dc0c554e7,2025-04-07T18:19:07.777000 CVE-2025-32650,0,0,2253df9d6db542766ebb245b55048147fbc35dd9b1adfc6a1c5afc95c8017415,2025-04-11T15:39:52.920000 CVE-2025-32654,0,0,112b25e433b99a7584fad0c05ac3ddf191218f57c077c655570df70d13ef099b,2025-04-11T15:39:52.920000 CVE-2025-32656,0,0,f78d451c9cc8ba03e960f053f1149961135101a940f08c9977cabd6ee6246bb5,2025-04-11T15:39:52.920000 -CVE-2025-32659,0,0,717c5d0222a54fd481e76a076103445f1121d11434ddfac7ba32fd0a96b70d87,2025-04-09T20:02:41.860000 +CVE-2025-32659,0,1,66310045ef3f9234d128da05ad843397fa2e56b3874a7141374ea700ac6b90be,2025-04-09T20:02:41.860000 CVE-2025-3266,0,0,72c61d5f89eeb94b30f634ae19d189745b893dd05829140f6047e84fafa81bf8,2025-04-07T18:18:56.247000 -CVE-2025-32661,0,0,9129275d86d90732365a50f1fd023acf25687ca6a30d36ee8767c87e6ef69f25,2025-04-09T20:02:41.860000 +CVE-2025-32661,0,1,9341c4bc9606fa47b2bcbd94f68672289bd63cc1a4a7f44741e54a69c2fab811,2025-04-09T20:02:41.860000 CVE-2025-32663,0,0,b0d8523ff6751b4be4d65bca3491c6f7bca2d1bc35acb6483867fb4827391cce,2025-04-11T15:39:52.920000 -CVE-2025-32664,0,0,2223730a60ed1fe558c38ad32fdbcf8b25e2266ff023b63d74e71a84be192208,2025-04-09T20:02:41.860000 -CVE-2025-32667,0,0,67342f2d09edcff434d9d589fa729388e7a3fdaf31499c98da4542746ee22eef,2025-04-09T20:02:41.860000 +CVE-2025-32664,0,1,8321365ed43b5b654a4f8309fdf2412d26e01c7df00f99c6a02dcb93b06851e2,2025-04-09T20:02:41.860000 +CVE-2025-32667,0,1,6e3acab76d981cba160f75b36598b3966b235b7469aa7f71f5081c3426350239,2025-04-09T20:02:41.860000 CVE-2025-32668,0,0,757b85de6a07e907d3afe54fe1d4d4e6c2d15a036ec8c1d1a9caa38457897713,2025-04-11T15:39:52.920000 -CVE-2025-32669,0,0,5ee4004046a9925c22bcdaa7275b534b428fe00ab9efd060f46d22bf87b484fd,2025-04-09T20:02:41.860000 +CVE-2025-32669,0,1,2a7fdc1c148e808891cb022354ae46588131d55f9acb8b725ee06fe9802de7f1,2025-04-09T20:02:41.860000 CVE-2025-3267,0,0,5957e45c3f258189da3aec49a626cf5736069fd66df3c72b04267cdc97a2b74c,2025-04-07T18:18:41.523000 CVE-2025-32671,0,0,3f4addf34bbd623f6a2176cbf1ca339d8ca0f972f87f1e70949526f484b21662,2025-04-11T15:39:52.920000 CVE-2025-32672,0,0,4cb45793faa20687804201b43fe37c0540fbd03771cd92fd2b56c9015c9da363,2025-04-11T15:39:52.920000 -CVE-2025-32673,0,0,e04e543b05b99f72995e2bef56793f9632a1f3cc90a21636a75204e2e23934f5,2025-04-09T20:02:41.860000 -CVE-2025-32675,0,0,548891b87ee449854d51f60483cb5815736a358fddef98f05bd38028cd885ffe,2025-04-09T20:02:41.860000 -CVE-2025-32676,0,0,b937d2c54242c8d4db371f528e52df43f1a969973b2fcf2bf1151a558909c315,2025-04-09T20:02:41.860000 -CVE-2025-32677,0,0,714496a2814bb30411c1b1c295f32ec45c02266f4dd014f4906b4fca99468be7,2025-04-09T20:02:41.860000 -CVE-2025-32678,0,0,f90148935e7dcdc424e798fece0ab3f8bdaea00a714a9915675ffbcdcf79ca1f,2025-04-09T20:02:41.860000 -CVE-2025-32679,0,0,88e5b85177a720ee5de776ab05d453dd5eb26275ea535d4b5fa355cb9dc18099,2025-04-09T20:02:41.860000 +CVE-2025-32673,0,1,9f7b948558fad9139b9bffb7b7f7f5f978b9ba1d0445a709d9c2bf74cf08de50,2025-04-09T20:02:41.860000 +CVE-2025-32675,0,1,a6db5e48e42f4d41fa425ed9017708708d49574166f59c8b547023bcdc6200d0,2025-04-09T20:02:41.860000 +CVE-2025-32676,0,1,edda31a85e1e80659335a7efad0b821388c6101e9c57483f203af2d11a96043c,2025-04-09T20:02:41.860000 +CVE-2025-32677,0,1,0b939f0f09bcf370798b3499511e1cd5b67829e82339dbf16d6568ab4594c213,2025-04-09T20:02:41.860000 +CVE-2025-32678,0,1,b26975d5301172a858e1419f4271d362484ba209a53510009c67669d6a8ccdd9,2025-04-09T20:02:41.860000 +CVE-2025-32679,0,1,bbacc21ac08d6f239be64c42a4ea3343b4ba4c7e91e4c5b5d593c74f30e94152,2025-04-09T20:02:41.860000 CVE-2025-3268,0,0,13ebb75f155606fc18a6c469dfd2e1dc92481b7d2a4b4f437c20095a77a45083,2025-04-07T16:15:26.430000 -CVE-2025-32680,0,0,7e83253b789e22794ff15c175ac5222320ee1d5aeead675a8299f4d4dd7a8e97,2025-04-09T20:02:41.860000 +CVE-2025-32680,0,1,bc0affb980c692e69e1b16cd9ed3b08eb8a8e88380b613fe1b873470370c2164,2025-04-09T20:02:41.860000 CVE-2025-32681,0,0,b73a09092179362c2d35eeda6d2b86a162194059b3bd047b5c27fcf6d5113deb,2025-04-11T15:39:52.920000 -CVE-2025-32683,0,0,4737dc851cbc361679102d01731ea65b5abe3ae9073ec363ee786b4e1a2533bb,2025-04-09T20:02:41.860000 -CVE-2025-32684,0,0,2dfb6a557da23140d893ceefbb39bc58555bc5e6d1a5fd6ac3c564f83604d2e7,2025-04-09T20:02:41.860000 -CVE-2025-32685,0,0,e1edc9c0eeffd8569f1c3dee56fbb2ffc492f927f4ddc538006bdbf6674bc433,2025-04-09T20:02:41.860000 +CVE-2025-32683,0,1,71df892e31c90ddca338a0ce6ee84a7c1953f8dfb51683093e291d7f70cdbd8e,2025-04-09T20:02:41.860000 +CVE-2025-32684,0,1,dfb4225c2c4be07452b77013b7ae7311cec98258ec99abea9378583b537d5bd9,2025-04-09T20:02:41.860000 +CVE-2025-32685,0,1,710fee57ff8bce91dcfc691dce8ab6341cf17f7f891549aaee17cdf6f7306ba6,2025-04-09T20:02:41.860000 CVE-2025-32687,0,0,f86bdd2c773d6895ee601fe15f63817568cb85f8c3a968335caffa628947d382,2025-04-11T15:39:52.920000 -CVE-2025-32690,0,0,9edd7544f6a091be113393618bac31b1cd15577e02926d3aa7e1339374d574da,2025-04-09T20:02:41.860000 -CVE-2025-32691,0,0,1d87e27bae4facbf51601864f542f033bf644476eb77714ce66a203bf74ea09d,2025-04-09T20:02:41.860000 -CVE-2025-32692,0,0,c5377d751270c75bb15d28fe8902897bceed087aac59fc72b43d33627d1568b0,2025-04-09T20:02:41.860000 -CVE-2025-32693,0,0,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f181ec,2025-04-09T20:02:41.860000 -CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000 -CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000 +CVE-2025-32690,0,1,7fbb45150f9ca61163034b8e092b6a5fa472ca63b481236b3b6e149a7dc3a91e,2025-04-09T20:02:41.860000 +CVE-2025-32691,0,1,1e68a30c62b2482023e6169f8574206a21acc26827cccf23f4dd537548ffc2c2,2025-04-09T20:02:41.860000 +CVE-2025-32692,0,1,ab2764434fb650bd8aa814f66dc8cc78bd78b63a4404acc4c43848e133c91e34,2025-04-09T20:02:41.860000 +CVE-2025-32693,0,1,41a1807f2df012a8a538d93aa4bafaf618a20320c9b9377e1a66a556655ae76b,2025-04-09T20:02:41.860000 +CVE-2025-32694,0,1,9e7ab37f582a027283a0296e2f04d0cb00b2ec80d9d0b336c2011e76cf4f8aa7,2025-04-09T20:02:41.860000 +CVE-2025-32695,0,1,960308342fd742ba835e7477e696dda4e8809bfd6d552e25e42e7691f8b3f79e,2025-04-09T20:02:41.860000 CVE-2025-32696,0,0,fdc65c0f42eb71796d4f73d2c5298cd42fa91210073a472abe20fef63b4320a2,2025-04-11T15:39:52.920000 CVE-2025-32697,0,0,19fee2a61856ee4a7320f7190e69e8ccea7572ac4306df698c960a26103f7d2d,2025-04-11T15:39:52.920000 CVE-2025-32698,0,0,16466f8b695d6edbf317b0af563ba9f209d642f17ecdd1954cc311df468a6223,2025-04-11T15:39:52.920000 @@ -289588,11 +289589,11 @@ CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767a CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000 CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000 CVE-2025-3282,0,0,6163a59fd68c6efb444994c0160024cc299c7afde3bbcc464fb769baba72cd14,2025-04-12T07:15:27.003000 -CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000 -CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000 -CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000 -CVE-2025-3288,0,0,6c3436c1bb9a5ae79382862f9efeedd904207179bae65402a0755339708c80d4,2025-04-08T18:13:53.347000 -CVE-2025-3289,0,0,827f59b01ecb1240cc36827fa98bfacb84591c8b915a26513129f42996d37d73,2025-04-08T18:13:53.347000 +CVE-2025-3285,0,1,118d23b715223007d53f885f6e6272e3e1077c4b2e9b8e92fc3197ffc0e6e14a,2025-04-08T18:13:53.347000 +CVE-2025-3286,0,1,8139d6e6df664199f354424e68610fbc2f4bc55f3ac9ae6ea11f766fff222a31,2025-04-08T18:13:53.347000 +CVE-2025-3287,0,1,506736b5e0376194047aa5beabc2406cc40c6682d560c154acdc11c5838ee81f,2025-04-08T18:13:53.347000 +CVE-2025-3288,0,1,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 +CVE-2025-3289,0,1,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000 CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 @@ -289637,22 +289638,22 @@ CVE-2025-3342,0,0,a658af572dac36d420f981c7a655bd41788a35b688c79fcb5c0f562141609d CVE-2025-3343,0,0,5bb73d588314dedd5422b69d77e619922b27dd344ad4b6ccb3d4630f3ab563c2,2025-04-07T14:17:50.220000 CVE-2025-3344,0,0,97bfd9900ef6c4eb109478479ad465f51b8231dd17edb9388d3603477eb7f817,2025-04-07T14:17:50.220000 CVE-2025-3345,0,0,c9ad69ca7236cb20c05e7db7a0f51e10a55722df93ee124d21eaf2954f1fada3,2025-04-07T14:17:50.220000 -CVE-2025-3346,0,0,16665ddf0b7525ed34ddd89bd5c651df2074e6948576ac4b46d962e9a4135133,2025-04-07T14:17:50.220000 -CVE-2025-3347,0,0,65599165dcf6da74ac963bfd798f99ab7277709ecf7375798caee7159e0be53c,2025-04-07T14:17:50.220000 -CVE-2025-3348,0,0,483be2d746d55d364c58a376b4662b8a9326882f831c09fbff0a63eb17a3e329,2025-04-07T14:17:50.220000 -CVE-2025-3349,0,0,91c41bc846cb09598bbdfd6c37b0c2444180c07a1f260ce8e740b131c8b68606,2025-04-07T14:17:50.220000 -CVE-2025-3350,0,0,c721c574ed4a8419898b876d6ca130cb27ab999827e347fd829c12d2c7214d08,2025-04-07T14:17:50.220000 -CVE-2025-3351,0,0,5856310a50dff41ab6e3db91c56449b659c0c5b5ac51383681f8b89d53231b5a,2025-04-07T14:17:50.220000 -CVE-2025-3352,0,0,a9e364b417d4c1b9bcf70be1114bee2321f25df05acf5e2e7d6d36702a994691,2025-04-07T14:17:50.220000 +CVE-2025-3346,0,1,d48cf13758ab7228b47d48e98a1bf981fda53d3ec4136a5137d60b6090ed43dd,2025-04-07T14:17:50.220000 +CVE-2025-3347,0,1,28e9b5e41d2b9aa84b204e414f803911e93712b64da57a68e7123d621b38c28d,2025-04-07T14:17:50.220000 +CVE-2025-3348,0,1,443fb44b45d0c58dba3a1cac369e49865cc36af72e63315c8f352345cb48c6f2,2025-04-07T14:17:50.220000 +CVE-2025-3349,0,1,f6d8132f4d279756710db0fbe2ddf58b4b5f40f24c6addf7bd79d01d07ad32c9,2025-04-07T14:17:50.220000 +CVE-2025-3350,0,1,6778660d8bb22a3e581423c59f1d6baeda247cd9816f9a16854d2c7d930d375f,2025-04-07T14:17:50.220000 +CVE-2025-3351,0,1,75d173e50fe13168cdd19d26c865bf0928f2f75c26c1a14aec760a5844bf689a,2025-04-07T14:17:50.220000 +CVE-2025-3352,0,1,c6cfb3216143a7ec970b5c4f1e54b733e0ef74e4ed2381db01e6f7672b9d3e99,2025-04-07T14:17:50.220000 CVE-2025-3353,0,0,9a3a0526e92697556541e5bcfa649004dd818da06b323f35a5c71a34f78996a7,2025-04-11T12:55:09.550000 -CVE-2025-3359,0,0,310397201643add7035d3dfe451e133ed75bc9a9599c95f2a8d2e8611e141127,2025-04-07T14:17:50.220000 -CVE-2025-3360,0,0,00a8b0fe3c658775c0c228780a1e555aca09d51a98f5810881cf1b98d72242b6,2025-04-07T14:17:50.220000 +CVE-2025-3359,0,1,f3e98ccd04870ba3c6cba92a4ead09c0ba209f3867b79e029c9424afb29b2a1e,2025-04-07T14:17:50.220000 +CVE-2025-3360,0,1,906ca811100ba7867bd8a230719a5ff94e1f511c66c1345400cf65740bf3463f,2025-04-07T14:17:50.220000 CVE-2025-3361,0,0,1fe2ec8a64bc635c81624d6e5c98311c550cae1314a855e35bf93ef979c92b53,2025-04-08T18:13:53.347000 CVE-2025-3362,0,0,f2596ce87f1b2ee767410b87c3d50eab6e0dd63bddff8a5282aeb95847ff2bc3,2025-04-08T18:13:53.347000 CVE-2025-3363,0,0,0bfec75432dde717fba421cd754f82c62be00bc647a979275627a87dda1e3b02,2025-04-08T18:13:53.347000 CVE-2025-3364,0,0,52e815ba5bfb5fe0409468beb50ec169d2973da5550914ad63b94a6a1fadff1c,2025-04-08T18:13:53.347000 -CVE-2025-3369,0,0,9bfab61711c9bf7f6a8c870d9df6b844b16be953ff70535930a493b686277665,2025-04-07T14:17:50.220000 -CVE-2025-3370,0,0,3ca9a9bd8cfc457fadd94e88b3803dfeedb7934bde407602fa694d4cec7fa434,2025-04-07T14:17:50.220000 +CVE-2025-3369,0,1,768c6d120f4336ee49db516c38a53d64910a9dd6076d29fe2e2a71d47a523cc1,2025-04-07T14:17:50.220000 +CVE-2025-3370,0,1,7cbc09eebe335faf7275b292aa74b44ac62c9a32f7f7719c7f4aca7923fbf019,2025-04-07T14:17:50.220000 CVE-2025-3371,0,0,a6a0065603aada5d4ba78a78811213f4674807b77633adc55e5b432a3640d5b7,2025-04-08T18:14:17.307000 CVE-2025-3372,0,0,b58da848efdf4686d80f28c70dd080debfd3e881526eafb4360d1110ccc0aa46,2025-04-08T18:14:17.307000 CVE-2025-3373,0,0,b9a3bcf5f8be84e23eab48c66498a32f84f47c5ae4f9722f760eafe8de48b371,2025-04-08T18:14:17.307000 @@ -289713,7 +289714,7 @@ CVE-2025-3437,0,0,e73b4884af1e4c5b90938b61853540dd90f98780db8cdd9f4d702d9b75697d CVE-2025-3439,0,0,5a45d3a4e5746a323275efd17cc6f0776b222d5dbffb626174e7480f10014b98,2025-04-11T15:39:52.920000 CVE-2025-3442,0,0,2a59e6aeb9a7ce85db231c9e4252568faabc9932311aa3489ec1af959c55a52f,2025-04-09T20:02:41.860000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 -CVE-2025-3474,0,0,f8e71c46703e14cca85d8e407ff995fe29213506f600ff4c3b6065d1079e537c,2025-04-09T20:02:41.860000 -CVE-2025-3475,0,0,bb4bc227f15a0b277f9580dd5137093b362fd6a8b2970e4968b5dd8302443ad1,2025-04-09T20:02:41.860000 +CVE-2025-3474,0,1,86c754cf553decd220dba53e5d0d63448d8121da39946fc69feccec714981904,2025-04-09T20:02:41.860000 +CVE-2025-3475,0,1,443d35ed0e717701a1888d83d8695b8f16fb37648583a3e79025b880997d544a,2025-04-09T20:02:41.860000 CVE-2025-3489,0,0,67fcd6c9f94bb6bf638f4e8bb2240b0887ef71aca32f3728fb5180eccf26711c,2025-04-11T15:40:10.277000 CVE-2025-3512,0,0,036d013cd0e3204c7e29f8f12826d9befccf940571ea0ad101dc3475585d72f8,2025-04-11T15:39:52.920000